Rowland Penny
2018-Feb-26 09:49 UTC
[Samba] smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
On Mon, 26 Feb 2018 11:30:58 +0200 Arcadie Cracan <arcadiec at gmail.com> wrote:> /etc/samba/smb.conf: > # Global parameters > [global] > workgroup = DAM > realm = INTRA.DAM-APPLICATION.RO > netbios name = LOTUS > server role = active directory domain controller > server services = s3fs, rpc, nbt, wrepl, ldap, cldap, kdc, > drepl, winbindd, ntp_signd, kcc, dnsupdate > idmap_ldb:use rfc2307 = yesEverything above looks okay and it also shows you are using Bind9, so can you post the contents of the various named.conf files.> > # Default idmap config used for BUILTIN and local > accounts/groups idmap config *:backend = tdb > idmap config *:range = 2000-9999 > > # idmap config for domain INTRA > idmap config INTRA:backend = ad > idmap config INTRA:schema_mode = rfc2307 > idmap config INTRA:range = 10000-99999 > > # Use settings from AD for login shell and home directory > winbind nss info = rfc2307You might as well remove the above lines, they do not work on a DC, they never did and anyway 'INTRA' should be 'DAM' if they did work. In fact they may be your problem. Rowland
Rowland Penny
2018-Feb-26 10:10 UTC
[Samba] smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
On Mon, 26 Feb 2018 09:49:48 +0000 Rowland Penny via samba <samba at lists.samba.org> wrote:> On Mon, 26 Feb 2018 11:30:58 +0200 > Arcadie Cracan <arcadiec at gmail.com> wrote: > > > /etc/samba/smb.conf: > > # Global parameters > > [global] > > workgroup = DAM > > realm = INTRA.DAM-APPLICATION.RO > > netbios name = LOTUS > > server role = active directory domain controller > > server services = s3fs, rpc, nbt, wrepl, ldap, cldap, kdc, > > drepl, winbindd, ntp_signd, kcc, dnsupdate > > idmap_ldb:use rfc2307 = yes > > Everything above looks okay and it also shows you are using Bind9, so > can you post the contents of the various named.conf files. > > > > > # Default idmap config used for BUILTIN and local > > accounts/groups idmap config *:backend = tdb > > idmap config *:range = 2000-9999 > > > > # idmap config for domain INTRA > > idmap config INTRA:backend = ad > > idmap config INTRA:schema_mode = rfc2307 > > idmap config INTRA:range = 10000-99999 > > > > # Use settings from AD for login shell and home directory > > winbind nss info = rfc2307 > > You might as well remove the above lines, they do not work on a DC, > they never did and anyway 'INTRA' should be 'DAM' if they did work. > In fact they may be your problem. > > Rowland >Just had another thought, if you run 'pstree', do you get something like this in the output: ├─samba─┬─samba───samba───smbd─┬─cleanupd │ │ ├─smbd │ │ └─smbd-notifyd │ ├─samba───samba │ ├─9*[samba] │ └─samba───samba───winbindd───3*[winbindd] If you don't get 'winbindd', try running 'apt-get install winbind' Rowland
Arcadie Cracan
2018-Feb-26 10:27 UTC
[Samba] smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
Dear Rowland, I have commented out the 'idmap config' options, nothing changed. Here are my bind9 configs: /etc/bind/named.conf: acl goodclients { 192.168.1.0/24; localhost; }; include "/etc/bind/named.conf.options"; #include "/etc/bind/named.conf.local"; include "/etc/bind/named.conf.default-zones"; include "/var/lib/samba/private/named.conf"; /etc/bind/named.conf.options: options { directory "/var/cache/bind"; recursion yes; allow-query { goodclients; }; tkey-gssapi-keytab "/var/lib/samba/private/dns.keytab"; tkey-domain "INTRA.DAM-APPLICATION.RO"; // If there is a firewall between you and nameservers you want // to talk to, you may need to fix the firewall to allow multiple // ports to talk. See http://www.kb.cert.org/vuls/id/800113 // If your ISP provided one or more IP addresses for stable // nameservers, you probably want to use them as forwarders. // Uncomment the following block, and insert the addresses replacing // the all-0's placeholder. forwarders { 213.154.124.1; 193.231.252.1; }; // ======================================================================= // If BIND logs error messages about the root key being expired, // you will need to update your keys. See https://www.isc.org/bind-keys // ======================================================================= dnssec-enable yes; dnssec-validation yes; auth-nxdomain no; # conform to RFC1035 listen-on-v6 { none; }; }; /etc/bind/named.conf.default-zones: // prime the server with knowledge of the root servers zone "." { type hint; file "/etc/bind/db.root"; }; // be authoritative for the localhost forward and reverse zones, and for // broadcast zones as per RFC 1912 zone "localhost" { type master; file "/etc/bind/db.local"; }; zone "127.in-addr.arpa" { type master; file "/etc/bind/db.127"; }; zone "0.in-addr.arpa" { type master; file "/etc/bind/db.0"; }; zone "255.in-addr.arpa" { type master; file "/etc/bind/db.255"; }; /var/lib/samba/private/named.conf: dlz "AD DNS Zone" { # For BIND 9.8.x # database "dlopen /usr/lib/x86_64-linux-gnu/samba/bind9/dlz_bind9.so"; # For BIND 9.9.x # database "dlopen /usr/lib/x86_64-linux-gnu/samba/bind9/dlz_bind9_9.so"; # For BIND 9.10.x database "dlopen /usr/lib/x86_64-linux-gnu/samba/bind9/dlz_bind9_10.so"; # For BIND 9.11.x # database "dlopen /usr/lib/x86_64-linux-gnu/samba/bind9/dlz_bind9_11.so"; }; This is (a part of) the output of 'pstree': ├─samba─┬─samba───smbd─┬─cleanupd │ │ ├─lpqd │ │ └─smbd-notifyd │ ├─10*[samba] │ └─samba───winbindd───winbindd So, I guess winbindd is running. Kind regards, Arcadie Cracan În ziua de luni, 26 februarie 2018, la 11:49:48 EET, Rowland Penny via samba a scris:> On Mon, 26 Feb 2018 11:30:58 +0200 > > Arcadie Cracan <arcadiec at gmail.com> wrote: > > /etc/samba/smb.conf: > > # Global parameters > > [global] > > > > workgroup = DAM > > realm = INTRA.DAM-APPLICATION.RO > > netbios name = LOTUS > > server role = active directory domain controller > > server services = s3fs, rpc, nbt, wrepl, ldap, cldap, kdc, > > > > drepl, winbindd, ntp_signd, kcc, dnsupdate > > > > idmap_ldb:use rfc2307 = yes > > Everything above looks okay and it also shows you are using Bind9, so > can you post the contents of the various named.conf files. > > > # Default idmap config used for BUILTIN and local > > > > accounts/groups idmap config *:backend = tdb > > > > idmap config *:range = 2000-9999 > > > > # idmap config for domain INTRA > > idmap config INTRA:backend = ad > > idmap config INTRA:schema_mode = rfc2307 > > idmap config INTRA:range = 10000-99999 > > > > # Use settings from AD for login shell and home directory > > winbind nss info = rfc2307 > > You might as well remove the above lines, they do not work on a DC, > they never did and anyway 'INTRA' should be 'DAM' if they did work. > In fact they may be your problem. > > Rowland
Rowland Penny
2018-Feb-26 10:54 UTC
[Samba] smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
On Mon, 26 Feb 2018 12:27:56 +0200 Arcadie Cracan <arcadiec at gmail.com> wrote:> Dear Rowland, > > I have commented out the 'idmap config' options, nothing changed. > Here are my bind9 configs: > > /etc/bind/named.conf:Nothing wrong there> > /etc/bind/named.conf.options: > options { > directory "/var/cache/bind"; > recursion yes; > allow-query { goodclients; }; > tkey-gssapi-keytab "/var/lib/samba/private/dns.keytab"; > tkey-domain "INTRA.DAM-APPLICATION.RO"; > > forwarders { > 213.154.124.1; > 193.231.252.1; > }; > > dnssec-enable yes; > dnssec-validation yes;I have this instead: dnssec-validation no; dnssec-enable no; dnssec-lookaside no;> > auth-nxdomain no; # conform to RFC1035 > listen-on-v6 { none; }; > }; > > /etc/bind/named.conf.default-zones:Nothing wrong there> > > /var/lib/samba/private/named.conf:Nothing wrong there Is Apparmor running or is a firewall running ? Rowland
Reasonably Related Threads
- smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
- smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
- smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
- smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"
- smbclient //server/netlogon -k -c 'ls' fails with "NT_STATUS_LOGON_FAILURE"