[Samba-it] R: R: R: R: R: R: richiesta consigli su aggiornamento samba all'ultima versione
Piviul
piviul at riminilug.it
Thu Dec 8 07:56:54 UTC 2022
Il 08/12/22 08:22, Piviul ha scritto:
> Il 07/12/22 10:14, Corrado Ravinetto ha scritto:
>>> mi viene un dubbio... è necessario un restart o è sufficiente un
>>> reload dopo aver cambiato le direttive in smb.conf? ...io ho sempre
>>> fatto un reload.
>> Ogni modifica fatta a smb.conf genera automaticamente un restart di
>> samba
> non ho ben capito cosa intendi ma ho provato anche a fare il restart
> di smb, nmb e winbind dopo aver applicato quelle modifiche ma non è
> cambiato nulla, l'errore è sempre lo stesso e se qualcuno avesse
> qualche altra idea...
Nel caso qualcuno avesse tempo da perdere questa è la configurazione di
smb.conf del DC:
[global]
client min protocol = NT1
deadtime = 10080
domain master = Yes
kerberos method = secrets and keytab
log file = /var/log/samba/log.%m
map to guest = Bad User
max log size = 50
netbios aliases = SERVERCSA
ntlm auth = mschapv2-and-ntlmv2-only
obey pam restrictions = Yes
password server = nsdc-servercsa.ad.csaricerche.com
preferred master = Yes
realm = AD.CSARICERCHE.COM
security = ADS
server min protocol = NT1
server string = NethServer 7.9.2009 final (Samba %v)
workgroup = DOMINIOCSA
idmap config dominiocsa : range = 200000-2147483647
idmap config dominiocsa : backend = nss
idmap config * : range = 10000-99999
idmap config * : backend = tdb
inoltre dando un'occhiata ai logs del client XP che ha fatto il join
sembra vada tutto bene finché non trovo:
[...]
[2022/12/08 08:19:19.629577, 4, pid=16796, effective(0, 0), real(0, 0),
class=auth] ../../source3/auth/pampass.c:483(smb_pam_start)
smb_pam_start: PAM: Init user: admin at csaricerche.com
[2022/12/08 08:19:19.644870, 4, pid=16796, effective(0, 0), real(0, 0),
class=auth] ../../source3/auth/pampass.c:492(smb_pam_start)
smb_pam_start: PAM: setting rhost to: 192.168.70.242
[2022/12/08 08:19:19.644948, 4, pid=16796, effective(0, 0), real(0, 0),
class=auth] ../../source3/auth/pampass.c:501(smb_pam_start)
smb_pam_start: PAM: setting tty
[2022/12/08 08:19:19.644994, 4, pid=16796, effective(0, 0), real(0, 0),
class=auth] ../../source3/auth/pampass.c:509(smb_pam_start)
smb_pam_start: PAM: Init passed for user: admin at csaricerche.com
[2022/12/08 08:19:19.645038, 4, pid=16796, effective(0, 0), real(0, 0),
class=auth] ../../source3/auth/pampass.c:646(smb_internal_pam_session)
smb_internal_pam_session: PAM: tty set to: smb/1023763770
[2022/12/08 08:19:19.673060, 4, pid=16796, effective(0, 0), real(0, 0),
class=auth] ../../source3/auth/pampass.c:465(smb_pam_end)
smb_pam_end: PAM: PAM_END OK.
[2022/12/08 08:19:19.673161, 5, pid=16796, effective(0, 0), real(0, 0)]
../../lib/dbwrap/dbwrap.c:130(dbwrap_lock_order_lock)
dbwrap_lock_order_lock: check lock order 1 for
/var/lib/samba/lock/smbXsrv_session_global.tdb
[2022/12/08 08:19:19.673222, 10, pid=16796, effective(0, 0), real(0, 0)]
../../lib/dbwrap/dbwrap.c:116(debug_lock_order)
lock order: 1:/var/lib/samba/lock/smbXsrv_session_global.tdb 2:<none>
3:<none>
[2022/12/08 08:19:19.673291, 10, pid=16796, effective(0, 0), real(0, 0)]
../../lib/dbwrap/dbwrap_tdb.c:61(db_tdb_log_key)
db_tdb_log_key: Locking key 3D05653A
[2022/12/08 08:19:19.673395, 10, pid=16796, effective(0, 0), real(0, 0)]
../../lib/dbwrap/dbwrap_tdb.c:150(db_tdb_fetch_locked_internal)
db_tdb_fetch_locked_internal: Allocated locked data 0x55aa3dcf3dc0
[2022/12/08 08:19:19.673507, 5, pid=16796, effective(0, 0), real(0, 0)]
../../lib/dbwrap/dbwrap.c:159(dbwrap_lock_order_unlock)
dbwrap_lock_order_unlock: release lock order 1 for
/var/lib/samba/lock/smbXsrv_session_global.tdb
[2022/12/08 08:19:19.673568, 10, pid=16796, effective(0, 0), real(0, 0)]
../../lib/dbwrap/dbwrap_tdb.c:61(db_tdb_log_key)
db_tdb_log_key: Unlocking key 3D05653A
[2022/12/08 08:19:19.674565, 3, pid=16796, effective(0, 0), real(0, 0)]
../../source3/smbd/reply.c:2509(reply_ulogoffX)
ulogoffX vuid=11138
[2022/12/08 08:19:19.674660, 5, pid=16796, effective(0, 0), real(0, 0)]
../../source3/lib/util.c:185(show_msg)
[2022/12/08 08:19:19.674700, 5, pid=16796, effective(0, 0), real(0, 0)]
../../source3/lib/util.c:195(show_msg)
size=39
smb_com=0x74
smb_rcls=0
smb_reh=0
smb_err=0
smb_flg=136
smb_flg2=51207
smb_tid=0
smb_pid=65279
smb_uid=11138
smb_mid=4352
smt_wct=2
smb_vwv[ 0]= 255 (0xFF)
smb_vwv[ 1]= 0 (0x0)
smb_bcc=0
[2022/12/08 08:19:19.674947, 10, pid=16796, effective(0, 0), real(0, 0)]
../../lib/util/util.c:511(dump_data)
[2022/12/08 08:19:19.675155, 10, pid=16796, effective(0, 0), real(0, 0)]
../../source3/lib/util_sock.c:248(read_smb_length_return_keepalive)
got smb length of 35
[2022/12/08 08:19:19.675237, 6, pid=16796, effective(0, 0), real(0, 0)]
../../source3/smbd/process.c:1946(process_smb)
got message type 0x0 of len 0x23
[2022/12/08 08:19:19.675291, 3, pid=16796, effective(0, 0), real(0, 0)]
../../source3/smbd/process.c:1948(process_smb)
Transaction 12 of length 39 (0 toread)
[2022/12/08 08:19:19.675343, 5, pid=16796, effective(0, 0), real(0, 0)]
../../source3/lib/util.c:185(show_msg)
[2022/12/08 08:19:19.675380, 5, pid=16796, effective(0, 0), real(0, 0)]
../../source3/lib/util.c:195(show_msg)
size=35
smb_com=0x71
smb_rcls=0
smb_reh=0
smb_err=0
smb_flg=24
smb_flg2=51207
smb_tid=47178
smb_pid=65279
smb_uid=11138
smb_mid=4417
smt_wct=0
smb_bcc=0
[2022/12/08 08:19:19.675596, 10, pid=16796, effective(0, 0), real(0, 0)]
../../lib/util/util.c:511(dump_data)
[2022/12/08 08:19:19.675663, 3, pid=16796, effective(0, 0), real(0, 0)]
../../source3/smbd/process.c:1541(switch_message)
switch message SMBtdis (pid 16796) conn 0x55aa3dcf5ff0
[2022/12/08 08:19:19.675724, 4, pid=16796, effective(0, 0), real(0, 0)]
../../source3/smbd/sec_ctx.c:320(set_sec_ctx_internal)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2022/12/08 08:19:19.675777, 5, pid=16796, effective(0, 0), real(0, 0)]
../../libcli/security/security_token.c:53(security_token_debug)
Security token: (NULL)
[2022/12/08 08:19:19.675829, 5, pid=16796, effective(0, 0), real(0, 0)]
../../source3/auth/token_util.c:866(debug_unix_user_token)
UNIX token of user 0
Primary group is 0 and contains 0 supplementary groups
[2022/12/08 08:19:19.675964, 5, pid=16796, effective(0, 0), real(0, 0)]
../../source3/smbd/uid.c:504(smbd_change_to_root_user)
change_to_root_user: now uid=(0,0) gid=(0,0)
[2022/12/08 08:19:19.676056, 4, pid=16796, effective(0, 0), real(0, 0)]
../../source3/smbd/sec_ctx.c:320(set_sec_ctx_internal)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2022/12/08 08:19:19.676109, 5, pid=16796, effective(0, 0), real(0, 0)]
../../libcli/security/security_token.c:53(security_token_debug)
Security token: (NULL)
[2022/12/08 08:19:19.676159, 5, pid=16796, effective(0, 0), real(0, 0)]
../../source3/auth/token_util.c:866(debug_unix_user_token)
UNIX token of user 0
Primary group is 0 and contains 0 supplementary groups
È normale quel security token NULL e quel Primary group is 0 and
contains 0 supplementary groups?
Piviul
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.samba.org/pipermail/samba-it/attachments/20221208/d3564e83/attachment-0001.htm>
More information about the samba-it
mailing list