[Samba] Ubuntu client ddns failure

L.P.H. van Belle belle at bazuin.nl
Wed May 21 03:14:34 MDT 2014


and check this file 

 /run/nm-dns-dnsmasq.conf 

does it have YOUR AD dns servers in it? 
This file should have you dns servers provided by the dhcp server.

if not then dnsmask/network-manager sure you problem. 

Gr. 

Louis
 

>-----Oorspronkelijk bericht-----
>Van: steve at steve-ss.com [mailto:samba-bounces at lists.samba.org] 
>Namens steve
>Verzonden: woensdag 21 mei 2014 11:08
>Aan: samba at lists.samba.org
>Onderwerp: Re: [Samba] Ubuntu client ddns failure
>
>On 20/05/14 15:35, Rowland Penny wrote:
>> On 20/05/14 14:12, steve wrote:
>>> Hi
>>> I'm trying to get an Ubuntu 14.04 client to update its rr 
>to a working
>>> bind dns DC with Samba 4.1.7. The setup is the same as with our
>>> openSUSE clients with sssd 1.11.15
>>> sssd.conf
>>> id_provider = ad
>>> auth_provider = ad
>>> access_provider = ad
>>> ldap_id_mapping = False
>>>
>>> /etc/hosts
>>> 127.0.0.1    lubuntu-laptop.hh3.site lubuntu-laptop
>>> 127.0.1.1 localhost
>>>
>> Don't know if this is your problem, but you have got 
>/etc/hosts wrong,
>> shouldn't it be:
>>
>> 127.0.0.1    localhost
>> 127.0.1.1    lubuntu-laptop.hh3.site    lubuntu-laptop
>>
>> Rowland
>>
>>> But it is sending a request for the wrong zone:
>>>
>>> Kerberos: ENC-TS Pre-authentication succeeded --
>>> LUBUNTU-LAPTOP$@HH3.SITE using arcfour-hmac-md5
>>> Kerberos: AS-REQ authtime: 2014-05-20T14:01:35 starttime: unset
>>> endtime: 2014-05-21T00:01:35 renew till: 2014-05-21T14:01:35
>>> Kerberos: Client supported enctypes: aes256-cts-hmac-sha1-96,
>>> aes128-cts-hmac-sha1-96, arcfour-hmac-md5, des3-cbc-sha1, 25, 26,
>>> using arcfour-hmac-md5/arcfour-hmac-md5
>>> Kerberos: Requested flags: renewable-ok
>>> Kerberos: TGS-REQ LUBUNTU-LAPTOP$@HH3.SITE from
>>> ipv4:192.168.1.22:40240 for ldap/hh16.hh3.site at HH3.SITE 
>[canonicalize,
>>> renewable]
>>> Kerberos: TGS-REQ authtime: 2014-05-20T14:01:35 starttime:
>>> 2014-05-20T14:01:35 endtime: 2014-05-21T00:01:35 renew till:
>>> 2014-05-21T14:01:35
>>> Terminating connection - 'kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED'
>>> single_terminate: reason[kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED]
>>> Kerberos: TGS-REQ LUBUNTU-LAPTOP$@HH3.SITE from
>>> ipv4:192.168.1.22:40241 for DNS/a.root-servers.net at HH3.SITE
>>> [canonicalize, renewable]
>>> Kerberos: Searching referral for a.root-servers.net
>>> Kerberos: Returning a referral to realm ROOT-SERVERS.NET for server
>>> DNS/a.root-servers.net at HH3.SITE that was not found
>>> Failed find a single entry for
>>> 
>(&(objectClass=trustedDomain)(|(flatname=ROOT-SERVERS.NET)(trus
>tPartner=ROOT-SERVERS.NET))):
>>> got 0
>>> Kerberos: samba_kdc_fetch: could not find principal in DB
>>> Kerberos: Server not found in database:
>>> krbtgt/ROOT-SERVERS.NET at HH3.SITE: no such entry found in hdb
>>> Kerberos: Failed building TGS-REP to ipv4:192.168.1.22:40241
>>> Terminating connection - 'kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED'
>>> single_terminate: reason[kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED]
>>> Kerberos: TGS-REQ LUBUNTU-LAPTOP$@HH3.SITE from
>>> ipv4:192.168.1.22:40242 for DNS/a.root-servers.net at HH3.SITE 
>[renewable]
>>> Kerberos: Server not found in database:
>>> DNS/a.root-servers.net at HH3.SITE: no such entry found in hdb
>>> Kerberos: Failed building TGS-REP to ipv4:192.168.1.22:40242
>>> Terminating connection - 'kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED'
>>> single_terminate: reason[kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED]
>>> Kerberos: TGS-REQ LUBUNTU-LAPTOP$@HH3.SITE from
>>> ipv4:192.168.1.22:40243 for DNS/a.root-servers.net at HH3.SITE
>>> [canonicalize, renewable]
>>> Kerberos: Searching referral for a.root-servers.net
>>> Kerberos: Returning a referral to realm ROOT-SERVERS.NET for server
>>> DNS/a.root-servers.net at HH3.SITE that was not found
>>> Failed find a single entry for
>>> 
>(&(objectClass=trustedDomain)(|(flatname=ROOT-SERVERS.NET)(trus
>tPartner=ROOT-SERVERS.NET))):
>>> got 0
>>> Kerberos: samba_kdc_fetch: could not find principal in DB
>>> Kerberos: Server not found in database:
>>> krbtgt/ROOT-SERVERS.NET at HH3.SITE: no such entry found in hdb
>>> Kerberos: Failed building TGS-REP to ipv4:192.168.1.22:40243
>>> Terminating connection - 'kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED'
>>> single_terminate: reason[kdc_tcp_call_loop:
>>> tstream_read_pdu_blob_recv() - NT_STATUS_CONNECTION_DISCONNECTED]
>>> Kerberos: TGS-REQ LUBUNTU-LAPTOP$@HH3.SITE from
>>> ipv4:192.168.1.22:40244 for DNS/a.root-servers.net at HH3.SITE 
>[renewable]
>>> Kerberos: Server not found in database:
>>> DNS/a.root-servers.net at HH3.SITE: no such entry found in hdb
>>> Kerberos: Failed building TGS-REP to ipv4:192.168.1.22:40244
>>>
>>> The worrying thing is that we can still get tickets even 
>though it has
>>> the wrong A record in DNS.
>>> What is this, 'a.root-servers.net' business? Why not our domain?
>>> What have we overlooked?
>>> Thanks,
>>> Steve
>>>
>>
>OK
>It works fine with nsupdate on the Administrator's tgt:
>
>Kerberos: AS-REQ Administrator at HH3.SITE from 
>ipv4:192.168.1.22:35207 for 
>krbtgt/HH3.SITE at HH3.SITE
>Kerberos: Client sent patypes: 149
>Kerberos: Looking for PKINIT pa-data -- Administrator at HH3.SITE
>Kerberos: Looking for ENC-TS pa-data -- Administrator at HH3.SITE
>Kerberos: No preauth found, returning PREAUTH-REQUIRED -- 
>Administrator at HH3.SITE
>Kerberos: AS-REQ Administrator at HH3.SITE from 
>ipv4:192.168.1.22:60295 for 
>krbtgt/HH3.SITE at HH3.SITE
>Kerberos: Client sent patypes: encrypted-timestamp, 149
>Kerberos: Looking for PKINIT pa-data -- Administrator at HH3.SITE
>Kerberos: Looking for ENC-TS pa-data -- Administrator at HH3.SITE
>Kerberos: ENC-TS Pre-authentication succeeded -- 
>Administrator at HH3.SITE 
>using arcfour-hmac-md5
>Kerberos: AS-REQ authtime: 2014-05-21T10:51:46 starttime: 
>unset endtime: 
>2014-05-21T20:51:46 renew till: 2014-05-22T10:51:42
>Kerberos: Client supported enctypes: aes256-cts-hmac-sha1-96, 
>aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, 25, 
>26, using 
>arcfour-hmac-md5/arcfour-hmac-md5
>Kerberos: Requested flags: renewable-ok
>Kerberos: TGS-REQ Administrator at HH3.SITE from ipv4:192.168.1.22:57157 
>for DNS/hh16.hh3.site at HH3.SITE [canonicalize, renewable]
>Kerberos: TGS-REQ authtime: 2014-05-21T10:51:46 starttime: 
>2014-05-21T10:52:50 endtime: 2014-05-21T20:51:46 renew till: 
>2014-05-22T10:51:42
>
>and named responds:
>R
>2014-05-21T10:52:50.315641+02:00 hh16 named[1965]: samba_dlz: starting 
>transaction on zone hh3.site
>2014-05-21T10:52:50.319042+02:00 hh16 named[1965]: samba_dlz: allowing 
>update of signer=Administrator\@HH3.SITE name=lubuntu-laptop.hh3.site 
>tcpaddr=192.168.1.22 type=A key=3111087606.sig-hh16.hh3.site/160/0
>2014-05-21T10:52:50.321707+02:00 hh16 named[1965]: samba_dlz: allowing 
>update of signer=Administrator\@HH3.SITE name=lubuntu-laptop.hh3.site 
>tcpaddr=192.168.1.22 type=A key=3111087606.sig-hh16.hh3.site/160/0
>2014-05-21T10:52:50.322267+02:00 hh16 named[1965]: client 
>192.168.1.22#48170/key Administrator\@HH3.SITE: updating zone 
>'hh3.site/NONE': deleting rrset at 'lubuntu-laptop.hh3.site' A
>2014-05-21T10:52:50.325538+02:00 hh16 named[1965]: samba_dlz: 
>subtracted 
>rdataset lubuntu-laptop.hh3.site 
>'lubuntu-laptop.hh3.site.#0113600#011IN#011A#011192.168.1.22'
>2014-05-21T10:52:50.326263+02:00 hh16 named[1965]: client 
>192.168.1.22#48170/key Administrator\@HH3.SITE: updating zone 
>'hh3.site/NONE': adding an RR at 'lubuntu-laptop.hh3.site' A
>2014-05-21T10:52:50.329767+02:00 hh16 named[1965]: samba_dlz: added 
>rdataset lubuntu-laptop.hh3.site 
>'lubuntu-laptop.hh3.site.#0113600#011IN#011A#011192.168.1.22'
>2014-05-21T10:52:50.644113+02:00 hh16 named[1965]: samba_dlz: 
>committed 
>transaction on zone hh3.site
>
>Note, that via sssd, nothing is logged by bind, I suppose because the 
>KDC throws it out before it gets there.
>
>So, can we now point the blame at whatever Ubuntu have done with sssd 
>1.11.5? The sssd guys tell me that all they do is call out to nsupdate 
>for the ddns. As a 1.11.5 build from source on openSUSE works OK, do I 
>have enough information to narrow it down to the Ubuntu package? Do I 
>now have to build sssd on the laptop to prove my point?
>
>@Rowland. Do you have a 'debianified' build method for 1.11.5?
>
>Thanks everyone for their patience.
>Steve
>
>-- 
>To unsubscribe from this list go to the following URL and read the
>instructions:  https://lists.samba.org/mailman/options/samba
>
>



More information about the samba mailing list