[Samba] Howto setup SLES 9 w/Samba 3.04 in a Domain & SSL SWAT
Neil Proctor
neil at firstvolunteer.com
Mon Aug 16 18:02:11 GMT 2004
I'd imagine document will answer many prayers for stumped admins
These are my notes to setup SuSE Linux Enterprise Server v9
and how to configure Samba v3.04-SuSE to work as a member server in a
domain
Also, this document contains FULL instructions on how to setup SSL
Secured SWAT (Samba Web Administration Tool)
This document is a step by step guide to installing SLES and Samba. Of
course you don't need a RAID configured system like mine, but I'm going
to assume you know how to at least load linux and can plug in your own
stuff where you need it.
Hope this helps many of you.. Good Luck, if you have questions, please
feel free to contact me.
Loaded using SLES 9 Samba 3.04-SuSE
You will need CDs SLES1-SLES3 to complete this install.
Make sure the RAIDs are in an OPTIMAL state before you start
installation
Create 2 Containers, Container 0 named SLES9 and is 10gb, Container 1
named NAS
and is the remaining space, approx. 1.6TB
Boot from CD1
Select Installation
Software agreement click I agree
Language - English
Select New Installation
Partioning
Create Custom Partition
Custom Partition for experts
Create
Select SDA
Primary
Do Not format, Change File System ID to Linux Swap
Click format
Size, End = +1gb
Ok
Create
Select SDA
Primary
Ok
Create
Select SDB
Primary
Mount Point = /nas
Ok
Next
Software
Default
Detailed Selection
Select all of the following
LSB
C/C++
Analizing Tools
Uncheck SNORT
Uncheck AIDE
File Server
Check all Samba entries
Click Accept
Click Continue for dependancy Changes
Time Zone
Eastern
Hardware clock set to Local time
Accept
Click accept
Click Yes Install
Install starts
After CD swaps are done, the system reboots
Install continues
Root Password = (whatever you want)
Next
Click Network Interfaces
Click Change
Click Edit
Click STATIC Ip = Static ip for this box (ie. 192.168.1.2)
Click Host Name
Host name = nas1
Domain = yourdomain.com
name server = your dns name servers IP
name server = your dns name servers IP
Ok
Routing
default gateway = your gateway IP
Ok
Next
Finish
Next
Select Yes, Test Connection, Next
Result should = Success if network is config'd properly
Next
Yes Run Online Update
Change location from .de to .com in Location line
Click Next
Username = your suse portal username
Password = your suse portal password
Login
Select all security & Recommended, except Linux Kernel
Select Optional Update for Yast2-installation\
Click accept
Updates will start to download
Click Finish
Click Next
Authentication Method = LDAP
Next
LDAP Client Config = use all defaults, Click Next
Create LDAP User = username deleteme
Next
Accept warning for password and continue
Release notes, read, then click Next
Click Graphics Cards
Click Monitor
Change configuration
Properties
Dell M770
Finish
Click Color and Resolution
Change configuration
Properties
Resolution Tab
Click 1280x1024
Click Ok
CliCk Finish
finalize
click Test
make sure you can see the screen and click save
Click ok
Click Next
Click Finish
Linux boots
login as root
Go into Yast
Click online update
Click Next
enter SLES portal user and pass, click keep Authentication data,
login
Select any kernel updates available as well as any other
security or recommended updates.
If kernel updates are available you will get a warning,
after you have read the warning click
install patch.
Click Finish
If you installed a kernel update, reboot
login as root
Install Stunnel
Open YAST, software, Install & Remove Software
Filters, Search, Input Stunnel
Install Stunnel v4.05
Configuring SWAT over Stunnel
1. We generate a private key (1024 bit size) :
/usr/sbin/openssl genrsa -out /etc/stunnel/swat.key 1024
2. Generate a certificate signing request (csr) using the server key
generated above(output will be PEM formatted.)
/usr/sbin/openssl req -new -key /etc/stunnel/swat.key -out
/etc/stunnel/swat.csr
3. Create a self-signed certificate (X509 structure) the output will be
PEM formatted.
/usr/sbin/openssl x509 -req -days 365 -in /etc/stunnel/swat.csr
-signkey /etc/stunnel/swat.key -out /etc/stunnel/swat.crt
4. Prepare certificate for stunnel. According to samba / stunnel
documentation says that a blank line is needed between private key and
certificate and another blank line at the end of the file
echo "" > ~/blankline.txt
cat /etc/stunnel/swat.key ~/blankline.txt /etc/stunnel/swat.crt
~/blankline.txt > /etc/stunnel/swat.pem
5. Set the file permissions so no one but root has access to the file
chmod 700 /etc/stunnel/swat.pem
6. Configure STUNNEL to start at boot
vim /etc/stunnel/swat.conf
copy the following into this file:
cert = /etc/stunnel/swat.pem
pid = /var/run/stunnel.swat
service = swat
[swat]
accept = 901
exec = /usr/sbin/swat
execargs = swat
TIMEOUTclose = 0
Save & Exit vim
vim /etc/init.d/boot.local
add the following line
stunnel /etc/stunnel/swat.conf
Save & Exit
Start Stunnel Manually
stunnel /etc/stunnel/swat.conf
Open Yast
Network Services
Samba Server
*** PLEASE NOTE, if this is a re-installation, DELETE the Samba Host
computer completely from the
your domain(s)
click status
ensure that all 3 processes are running, if not, start them, and
then click restart all
Workgroup = Your NT/2k/AD Domain Name
No Domain Controller, Next
Enable on Boot
Shares Tab
disable all shares
Click add
Share name = Nas
Share Description = Check Imaging
Share Type = Directory
Share path = (select a mount point ie. /nas or
/home/bob/smbshare, etc.)
Ok
Identity Tab
remote wins server name = (Input your WINS
server IP here, We run wins on seperate box)
Click Advanced Settings, Expert Global
Click Add
idmap uid = 10000-11000 (if you have
more than 1000 users change the 11000 to whatever)
Click Add
idmap gid = 10000-11000 (if you have
more than 1000 users change the 11000 to whatever)
Click Ok
Click Advacned Settings, LDAP Settings, Click
Ok
Click Advacned User Authentication Sources
Click Add
smbpasswd File, ok
Click Add
ldap
Join the domain = Yes
username = someone your domain administrator
group
Prompted for root user password for samba
use same password as root user in linux
System
Runlevel editor
Change NSCD to disable
winbindd to enable
To test winbind
open a terminal window
type wbinfo -u
you should see a list of members in your domain, this may take a
few moments
Now, open a browser
login to https://IP.Wins.or.DNS.name.of.your.Samba.Server:901
username is root user
click shares, click advanced
choose share = nas
change admin users to = '@Yourdomain\Domain
Administrators Group Name' (use quotes, or just individual usernames
like Yourdomain\joebob without
quotes), seperate by comma's
Click commit changes
Click Status, and Restart All
Neil Proctor
First Volunteer Bank IT Dept
More information about the samba
mailing list