[Samba] Issues on Samba4 AD DC GPO's with Sites and Winbind

Achim Gottinger achim at ag-web.biz
Wed Dec 4 07:28:27 MST 2013


Am 29.11.2013 02:24, schrieb Achim Gottinger:
> Am 28.11.2013 22:00, schrieb Achim Gottinger:
>> Hello Samba-List,
>>
>> Recently I ran into a few access rights problems with GPO's.
>> I have an test environment running with four samba4 AD DC's (sernet 
>> 4.1.2/debian wheezy). Used the Script's from the samba wiki for 
>> sysvol replication. The AD Database is comming from an classic 
>> upgrade and i have "idmap_ldb:use rfc2307 = yes" in my smb.conf.
>> Some groups like for example "Domain Guests" did not exist in my old 
>> db so they got there uid from winbind. Same goes for the internal 
>> groups like "Autheticated Users".
>> The assigned UID's from winbind differ between the four servers.
>> On the main site GPO's applied just fine an test on an client with 
>> "gpupdate /force" reported no errors. However on the other sites the 
>> GPO's did not apply and gpupdate /force mentioned no read access to 
>> \\domain.local\sysvol\domain.local\{GUID}\gpt.ini. The mentioned 
>> files where perfectly accessible via the explorer.
>> I compared the acl's on the servers and they showed identical gid's 
>> on the servers, however the gid 3000003, which was assigned to 
>> "Autheticated Users" on the main server was assigend to "Domain 
>> Guests" on an site server. Looking into idmap.ldb on that server i 
>> found "Autheticated Users" S-1-5-11 used 3000011 on that server.
>> I stopped samba on the server took an vm snapshot copied idmap.ldb 
>> from the main server (restarted unscd), started samba again and now 
>> the GPO's applied just fine.
>> The "Autheticated Users" group can be found in Active Directory Users 
>> and Groups in the ForeignSecurityPrincipals section but assigning 
>> UNIX attributes (gid's) does not work here.
>> So having identical mappings in idmap.ldb for all the internal groups 
>> in ForeignSecurityPrincipals seems to be mandatory for proper working 
>> GPO's. Guess sssd would not help here.
>>
>> achim~
> As an follow up, i tested it on the other two site's servers and as 
> soon as i copied the idmap.ldb from the main server the GPO's worked 
> without issues. I had also tested running
> samba-tool ntacl sysvolreset on the site's server before but that did 
> not work it applied the same uid's and gid's as on the main server and 
> not the ones used in the local idmap.ldb.
>
> For the GPO's with standard rights atleast these SID should have 
> identical idmap.ldb entries:
>
> S-1-5-18 Local system
> S-1-5-11 Authenticated Users
> S-1-5-9   Enterprise Domain Controllers
>
> And also these which can be handles via gidNumebr
>
> S-1-5-21-[DOMAIN PART]-519 [DOMAIN]\Enterprise Admins
> S-1-5-21-[DOMAIN PART]-512 [DOMAIN]\Domain Admins
>
> Wouldn't it make sense to precreate mappings for all the well known 
> windows sid's? http://support.microsoft.com/kb/243330/en-us
>
> achim~
>
>
Finaly applying this Hotfix to XP clients fixed a few remaining issues 
with some GPO's not beeing applied correct

http://www.microsoft.com/en-us/download/details.aspx?id=3628



More information about the samba mailing list