[Samba] Re: Samba with AD

Franz Pfoertsch franz.pfoertsch at brose.net
Mon Nov 6 14:45:33 GMT 2006


Have you configured kerberos?

have a look at http://wiki.samba.org/index.php/Samba_%26_Active_Directory

"ads_connect preauthentication failed" means there is something wrong with
authenication or the machine account already exists.

regards
Franz

Pashii B wrote:

> I am stuck with Samba -Active Directory communication. Trying to bring my
> SUSE 10.0 to speak with AD Domain.
> 
> net rpc testjoin - brings a unable to find suitable server message
> 
> net join -  kerberos_kinit_password preauthentication failed and
> ads_connect preauthentication failed
> 
> wbinfo -u works fine
> wbinfo -t works fine
> getent passwd/group works too
> 
> smb is running
> nmb is running
> winbindd is running
> nscd is not running
> 
> Here my smb.conf
> 
> [global]
> workgroup = (netbios name of mydomain)
> realm = mydomain.local
> netbios name = sambaservername
> server string =
> security = ads
> template shell = /bin/bash
> idmap uid = 150000-250000
> idmap gid = 150000-250000
> idmap backend = ldap://192.168.5.15 ldap://10.0.0.210
> winbind use default domain = yes
> printing = cups
> printcap name = cups
> printcap cache time = 750
> cups options = raw
> map to guest = Bad User
> include = /etc/samba/dhcp.conf
> logon path = \\%L\profiles\.msprofile
> logon home = \\%L\%U\.9xprofile
> logon drive = P:
> add machine script = /sbin/yast /usr/share/YaST2/data/add_machine.ycp %m$
> domain logons = no
> domain master = No
> ldap admin dn =
> ldap delete dn = No
> #ldap filter = (uid=%u)
> ldap group suffix =
> ldap idmap suffix =
> ldap machine suffix =
> ldap passwd sync = No
> ldap replication sleep = 1000
> ldap ssl = Start_tls
> ldap suffix =
> ldap timeout = 5
> ldap user suffix =
> passdb backend = ldapsam:ldap://192.168.5.15  ldapsam:ldap://10.0.0.210
> security = user
> debug level = 5
> log level = 5
> 
> 
> my nsswitch.conf
> 
> #
> # /etc/nsswitch.conf
> #
> # An example Name Service Switch config file. This file should be
> # sorted with the most-used services at the beginning.
> #
> # The entry '[NOTFOUND=return]' means that the search for an
> # entry should stop if the search in the previous entry turned
> # up nothing. Note that if the search failed due to some other reason
> # (like no NIS server responding) then the search continues with the
> # next entry.
> #
> # Legal entries are:
> #
> #       compat                  Use compatibility setup
> #       nisplus                 Use NIS+ (NIS version 3)
> #       nis                     Use NIS (NIS version 2), also called YP
> #       dns                     Use DNS (Domain Name Service)
> #       files                   Use the local files
> #       [NOTFOUND=return]       Stop searching if not found so far
> #
> # For more information, please read the nsswitch.conf.5 manual page.
> #
> 
> # passwd: files nis
> # shadow: files nis
> # group:  files nis
> 
> passwd:       files ldap
> group:        files ldap
> shadow:       files
> 
> hosts:        files dns
> networks:     files dns
> 
> services:     files
> protocols:    files
> rpc:  files
> ethers:       files
> netmasks:     files
> netgroup:     files
> publickey:    files
> 
> bootparams:   files
> automount:    files nis
> aliases:      files
> 
> 
> my krb5.conf
> 
> [libdefaults]
> default_realm = mydomain.local
> clockskew = 300
> 
> [realms]
> mydomain.local = {
> kdc = (FQDN of AD Domain Controller)
> default_domain = mydomain.local
> admin_server = (FQDN of AD Domain Controller)
> }
> 
> [logging]
> kdc = FILE:/var/log/krb5kdc.log
> admin_server = FILE:/var/log/kadmin.log
> default = FILE:/var/log/krb5lib.log
> 
> [domain_realm]
> .mydomain.local = mydomain.local
> [appdefaults]
> pam = {
> ticket_lifetime = 1d
> renew_lifetime = 1d
> forwardable = true
> proxiable = false
> retain_after_close = false
> minimum_uid = 0
> try_first_pass = true
> }
> 
> 
> my pam.d/login
> 
> #%PAM-1.0
> auth     required       pam_securetty.so
> auth     sufficient     pam_winbind.so use_first_pass_use_authtok
> auth     sufficient     pam_unix2.so
> auth   required       pam_stack.so use_first_pass
> auth     required       pam_nologin.so
> auth     required       pam_mail.so
> account  sufficient     pam_winbind.so use_first_pass use_authtok
> account  required       pam_stack.so service=system-auth
> account  sufficient     pam_unix2.so
> password sufficient     pam_winbind.so use_first_pass use_authtok
> password required       pam_pwcheck.so
> password sufficient     pam_unix2.so
> session  required       pam_stack.so service=system-auth
> session  optional       pam_console.so
> session  sufficient     pam_winbind.so use_first_pass use_authtok
> session  required       pam_mkhomedir.so skel=/etc/skel/ umask=0022
> session  sufficient     pam_unix2.so
> session  required       pam_limits.so
> 
> and finally /etc/ldap.conf
> 
> #
> # This is the configuration file for the LDAP nameservice
> # switch library, the LDAP PAM module and the shadow package.
> #
> 
> # Your LDAP server. Must be resolvable without using LDAP.
> host 192.168.5.15 10.0.0.210
> 
> # The distinguished name of the search base.
> base dc=mydomain,dc=local
> 
> # The LDAP version to use (defaults to 3
> # if supported by client library)
> ldap_version 3
> 
> # The distinguished name to bind to the server with.
> # Optional: default is to bind anonymously.
> rootbinddn (DN of administrator)
> 
> # The credentials to bind with.
> # Optional: default is no credential.
> bindpw secret
> 
> # The distinguished name to bind to the server with
> # if the effective user ID is root. Password is
> # stored in /etc/ldap.secret (mode 600)
> rootbinddn (DN of administrator)
> 
> # The port.
> # Optional: default is 389.
> #port 389
> 
> # The search scope.
> #scope sub
> #scope one
> #scope base
> 
> # Search timelimit
> #timelimit 30
> 
> # Bind timelimit
> #bind_timelimit 30
> 
> # Idle timelimit; client will close connections
> # (nss_ldap only) if the server has not been contacted
> # for the number of seconds specified below.
> #idle_timelimit 3600
> 
> # Filter to AND with uid=%s
> #pam_filter objectclass=account
> 
> # The user ID attribute (defaults to uid)
> #pam_login_attribute uid
> 
> # Search the root DSE for the password policy (works
> # with Netscape Directory Server)
> #pam_lookup_policy yes
> 
> # Check the 'host' attribute for access control
> # Default is no; if set to yes, and user has no
> # value for the host attribute, and pam_ldap is
> # configured for account management (authorization)
> # then the user will not be allowed to login.
> #pam_check_host_attr yes
> 
> # Group to enforce membership of
> #pam_groupdn cn=PAM,ou=Groups,dc=padl,dc=com
> 
> # Group member attribute
> #pam_member_attribute uniquemember
> 
> # Specify a minium or maximum UID number allowed
> #pam_min_uid 0
> #pam_max_uid 0
> 
> # Template login attribute, default template user
> # (can be overriden by value of former attribute
> # in user's entry)
> #pam_login_attribute userPrincipalName
> #pam_template_login_attribute uid
> #pam_template_login nobody
> 
> # Do not hash the password at all; presume
> # the directory server will do it, if
> # necessary. This is the default.
> #pam_password clear
> 
> # Hash password locally; required for University of
> # Michigan LDAP server, and works with Netscape
> # Directory Server if you're using the UNIX-Crypt
> # hash mechanism and not using the NT Synchronization
> # service.
> pam_password crypt
> 
> # Remove old password first, then update in
> # cleartext. Necessary for use with Novell
> # Directory Services (NDS)
> #pam_password nds
> 
> # Update Active Directory password, by
> # creating Unicode password and updating
> # unicodePwd attribute.
> #pam_password ad
> 
> # Use the OpenLDAP password change
> # extended operation to update the password.
> #pam_password exop
> 
> # Redirect users to a URL or somesuch on password
> # changes.
> #pam_password_prohibit_message Please visit http://internal to change your
> #password.
> 
> # RFC2307bis naming contexts
> # Syntax:
> # nss_base_XXX                base?scope?filter
> # where scope is {base,one,sub}
> # and filter is a filter to be &'d with the
> # default filter.
> # You can omit the suffix eg:
> # nss_base_passwd     ou=People,
> # to append the default base DN but this
> # may incur a small performance impact.
> #nss_base_passwd      ou=People,dc=padl,dc=com?one
> #nss_base_shadow      ou=People,dc=padl,dc=com?one
> #nss_base_group               ou=Group,dc=padl,dc=com?one
> #nss_base_hosts               ou=Hosts,dc=padl,dc=com?one
> #nss_base_services    ou=Services,dc=padl,dc=com?one
> #nss_base_networks    ou=Networks,dc=padl,dc=com?one
> #nss_base_protocols   ou=Protocols,dc=padl,dc=com?one
> #nss_base_rpc         ou=Rpc,dc=padl,dc=com?one
> #nss_base_ethers      ou=Ethers,dc=padl,dc=com?one
> #nss_base_netmasks    ou=Networks,dc=padl,dc=com?ne
> #nss_base_bootparams  ou=Ethers,dc=padl,dc=com?one
> #nss_base_aliases     ou=Aliases,dc=padl,dc=com?one
> #nss_base_netgroup    ou=Netgroup,dc=padl,dc=com?one
> 
> # attribute/objectclass mapping
> # Syntax:
> #nss_map_attribute    rfc2307attribute        mapped_attribute
> #nss_map_objectclass  rfc2307objectclass      mapped_objectclass
> 
> # configure --enable-nds is no longer supported.
> # For NDS now do:
> #nss_map_attribute uniqueMember member
> 
> # configure --enable-mssfu-schema is no longer supported.
> # For MSSFU now do:
> #nss_map_objectclass posixAccount User
> #nss_map_attribute uid msSFUName
> #nss_map_attribute uniqueMember posixMember
> #nss_map_attribute userPassword msSFUPassword
> #nss_map_attribute homeDirectory msSFUHomeDirectory
> #nss_map_objectclass posixGroup Group
> #pam_login_attribute msSFUName
> #pam_filter objectclass=User
> #pam_password ad
> 
> # configure --enable-authpassword is no longer supported
> # For authPassword support, now do:
> #nss_map_attribute userPassword authPassword
> #pam_password nds
> 
> # For IBM SecureWay support, do:
> #nss_map_objectclass posixAccount aixAccount
> #nss_map_attribute uid userName
> #nss_map_attribute gidNumber gid
> #nss_map_attribute uidNumber uid
> #nss_map_attribute userPassword passwordChar
> #nss_map_objectclass posixGroup aixAccessGroup
> #nss_map_attribute cn groupName
> #nss_map_attribute uniqueMember member
> #pam_login_attribute userName
> #pam_filter objectclass=aixAccount
> #pam_password clear
> 
> # Netscape SDK LDAPS
> #ssl on
> 
> # Netscape SDK SSL options
> #sslpath /etc/ssl/certs/cert7.db
> 
> # OpenLDAP SSL mechanism
> # start_tls mechanism uses the normal LDAP port, LDAPS typically 636
> ssl start_tls
> #ssl on
> 
> # OpenLDAP SSL options
> # Require and verify server certificate (yes/no)
> # Default is "no"
> #tls_checkpeer yes
> 
> # CA certificates for server certificate verification
> # At least one of these are required if tls_checkpeer is "yes"
> #tls_cacertfile /etc/ssl/ca.cert
> #tls_cacertdir /etc/ssl/certs
> 
> # SSL cipher suite
> # See man ciphers for syntax
> #tls_ciphers TLSv1
> 
> # Client certificate and key
> # Use these, if your server requires client authentication.
> #tls_cert
> #tls_key
> 
> 
> 
> Any Tips what I am missing out on ?????  I am trying to get authentication
> working with SAMBA through to AD
> 
> Regards
> 
> Pashii
> _____________________________________________________________________
> Der WEB.DE SmartSurfer hilft bis zu 70% Ihrer Onlinekosten zu sparen!
> http://smartsurfer.web.de/?mc=100071&distributionid=000000000066
> 




More information about the samba mailing list