Goetz, Patrick G
2019-Jun-12 15:55 UTC
[Samba] Samba + sssd deployment: success and failure
On 6/12/19 7:00 AM, Rowland penny wrote:> How are you actually running samba ? > How are you actually running samba ?I *think* setting security = user server role = auto makes Samba run as a standalone server, which is fine, because authentication is handled via /etc/nsswitch.conf: passwd: compat systemd sss group: compat systemd sss shadow: compat sss gshadow: files Since you suggested that versions of Samba >= 4.8 must run winbind if a domain member, and since the version that works (without winbind) is 4.8.3, this must be the case, or no?> > > Aside: Looks like the Samba team had a PPA for daily releases which was > abandoned about a year ago: what happened with that? > > Didn't know we had one, care to post a link ? >Here is the link: https://launchpad.net/~samba-team/+archive/ubuntu/ppa/+packages
On 12/06/2019 16:55, Goetz, Patrick G via samba wrote:> > On 6/12/19 7:00 AM, Rowland penny wrote: >> How are you actually running samba ? >> How are you actually running samba ? > > I *think* setting > > security = user > server role = auto > > makes Samba run as a standalone server, which is fine, because > authentication is handled via /etc/nsswitch.conf: > > passwd: compat systemd sss > group: compat systemd sss > shadow: compat sss > gshadow: filesWhy are you using sssd on a standalone server ? your users will be in /etc/passwd and the Samba database, I don't think sssd can talk to the Samba database.>> Aside: Looks like the Samba team had a PPA for daily releases which was >> abandoned about a year ago: what happened with that? >> >> Didn't know we had one, care to post a link ? >> > Here is the link: > > https://launchpad.net/~samba-team/+archive/ubuntu/ppa/+packages >That is extremely old and looks like it was something Jelmer used. Rowland
Goetz, Patrick G
2019-Jun-12 16:43 UTC
[Samba] Samba + sssd deployment: success and failure
On 6/12/19 11:10 AM, Rowland penny via samba wrote:> > Why are you using sssd on a standalone server ? > > your users will be in /etc/passwd and the Samba database, I don't think > sssd can talk to the Samba database. >I'm pretty sure what happens when you set [server role = standalone] is that Samba then defers to /etc/nsswitch.conf for how authorization should happen, and since sss is listed there and is set up to query the AD domain, that's how users get authenticated. In particular, it's not actually a standalone server but rather an AD domain member so that Security Group-authorized domain users can use their AD domain credentials for authentication on the machine. There is an entire lab of linux workstations set up this way. Users log in to a workstation using their AD credentials and their home directory (and various data/software directories) are automounted from the same fileserver we're trying to set Samba up on. sssd also provides a caching service to assist with timely authorization. As I mentioned previously, sssd bundles together the functionality of pam_ldap, nscd, and probably some other tools. This was all working fine until we acquired the need to mount filesystems to a few Windows machines as well (due to some compute-intensive analysis software that runs only on Windows). After doing some more reading about winbind (the 2007 Carter "Using Samba" book -- aside: why don't we have any updated Samba documentation?! Will post separately about the state of the smb.conf man page), I have no a priori objections to using winbind instead of sssd. In particular, I wasn't aware that winbind had a PAM hook allowing it to provide authentication for other services. I do care about clean, modular system design, though: Other Services | Autonomous | Requiring ------> | Authentication | <----- Samba smbd Authentication | Service | | | v Can interface with LDAP/AD It looks like the thing in the middle could be sssd or winbind; however most of our linux boxes which are AD domain members don't provide SMB file sharing services. I only want to have to debug one AD-authentication service (that's headache enough, believe me), so would it make sense to run winbind on machines that are only using Samba for administrative local use (i.e. no need to install full-blown Samba)? I looked at the winbind rid service, and am worried this will map SIDs. The other features I'm looking for: - We don't have and can't get the POSIX subsystem in our AD deployment, so I want the UID = SID; i.e not mapped in any way in order to facilitate subsequent aggregation (say of storage) of what are now independent labs. - Must support AD Security Groups because this is how we limit access to particular machines. - It would be nice to be able to use AD groups for authorization; then I wouldn't have to manage local groups in /etc/group (although ansible makes this less of a chore than it used to be). Right now this doesn't seem to work with sssd; i.e. you can't chgrp files/folders to the AD groups listed using, say `id pgoetz` on the domain-bound linux machine. - It would be super awesome if nested groups were supported. Right now sssd can't do this.