https://bugs.winehq.org/show_bug.cgi?id=55159
Bug ID: 55159 Summary: [ms-mpi] mpiexec is unable to connect to the smpd service Product: Wine Version: 8.0.1 Hardware: x86-64 OS: Linux Status: UNCONFIRMED Severity: normal Priority: P2 Component: secur32 Assignee: wine-bugs@winehq.org Reporter: christian.friedl@gmx.at Distribution: Ubuntu
Created attachment 74727 --> https://bugs.winehq.org/attachment.cgi?id=74727 Output of `smpd.exe -d` and `mpiexec -d -hosts 1 127.0.0.1 notepad`
Running applications with MS-MPI does not work. In order to circumvent https://bugs.winehq.org/show_bug.cgi?id=50341 I started smpd.exe manually with:
$ wine 'C:\Program Files\Microsoft MPI\Bin\smpd.exe' -d
In a second shell I ran mpiexec:
$ wine mpiexec -d -hosts 1 127.0.0.1 notepad
The problem is that mpiexec.exe could not connect to smpd.exe because both kerberos and ntlm authentication fail.
I have the version 2:4.15.13+dfsg-0ubuntu1.1 of the winbind package installed. The installed MS-MPI version is v10.1.2. Logs including the debug channels `+kerberos,+ntlm,+secur32,+wininet,+seh,+tid` are attached.
https://bugs.winehq.org/show_bug.cgi?id=55159
--- Comment #1 from Hans Leidekker hans@meelstraat.net --- 012c:trace:kerberos:acquire_credentials_handle gss_acquire_cred returned 0x20000 minor status 0x96c73ae0 012c:trace:kerberos:trace_gss_status_ex GSS-API error: 0x20000: "An invalid name was supplied" 012c:trace:kerberos:trace_gss_status_ex GSS-API error: 0x96c73ae0: "Configuration file does not specify default realm"
Kerberos needs a working setup of the host machine. The Negotiate provider should fall back to NTLM however if Kerberos authentication fails, which seems to happen in your log.
NTLM also fails, possibly because no password was given. Perhaps passing it to mpiexec would work (/pwd)?
https://bugs.winehq.org/show_bug.cgi?id=55159
Christian Friedl christian.friedl@gmx.at changed:
What |Removed |Added ---------------------------------------------------------------------------- URL| |https://www.microsoft.com/e | |n-us/download/details.aspx? | |id=100593
--- Comment #2 from Christian Friedl christian.friedl@gmx.at --- I have tried to provide a password to NTLM. However, I don't know what it might be or how I would set up an NTLM password in wine. Meanwhile, you should be able to reproduce my output. MS-MPI is freely available from https://www.microsoft.com/en-us/download/details.aspx?id=100593. The sources can be found at https://github.com/microsoft/Microsoft-MPI.
https://bugs.winehq.org/show_bug.cgi?id=55159
--- Comment #3 from Hans Leidekker hans@meelstraat.net --- (In reply to Christian Friedl from comment #2)
I have tried to provide a password to NTLM. However, I don't know what it might be or how I would set up an NTLM password in wine. Meanwhile, you should be able to reproduce my output. MS-MPI is freely available from https://www.microsoft.com/en-us/download/details.aspx?id=100593. The sources can be found at https://github.com/microsoft/Microsoft-MPI.
It looks like there's no way to pass credentials so this tool depends on the user having authenticated before it's started. There's no user management in Wine so to make this work you'd need to set up Kerberos on the host, as I mentioned earlier.
Do you intend to run both smpd and mpiexec on Wine?
https://bugs.winehq.org/show_bug.cgi?id=55159
--- Comment #4 from Christian Friedl christian.friedl@gmx.at --- (In reply to Hans Leidekker from comment #3)
It looks like there's no way to pass credentials so this tool depends on the user having authenticated before it's started. There's no user management in Wine so to make this work you'd need to set up Kerberos on the host, as I mentioned earlier.
Do you intend to run both smpd and mpiexec on Wine?
Yes, I do intend to run both smpd and mpiexec on Wine and even on the same machine. MPI is a standardized cross-platform way to enable communications between multiple processes. It would be nice if MS-MPI would run on Wine as some simulation codes depend on MPI.
I would be more than happy if I had some hack that could make authentication (either Kerberos or NTLM) pass.