search for: ad01

Displaying 20 results from an estimated 31 matches for "ad01".

Did you mean: a001
2005 May 06
0
Version 3.0.10-1.fc3
...t: Ticket cache: FILE:/tmp/krb5cc_0 Default principal: Administrator@INT.BATTEN.CA Valid starting Expires Service principal 05/05/05 18:32:33 05/06/05 04:32:49 krbtgt/INT.BATTEN.CA@INT.BATTEN.CA renew until 05/06/05 18:32:33 05/05/05 18:34:24 05/06/05 04:32:49 ad01$@INT.BATTEN.CA renew until 05/06/05 18:32:33 05/05/05 19:19:10 05/06/05 04:32:49 nas02$@INT.BATTEN.CA renew until 05/06/05 18:32:33 Kerberos 4 ticket cache: /tmp/tkt0 klist: You have no tickets cached 2) I am able To connect to the \\servername\c$ default share usin...
2019 Oct 16
3
Can't setup kerberos auth for samba4 server?
...E <http://ada.de/> dns_lookup_realm = false dns_lookup_kdc = true kdc_timesync = 1 ccache_type = 4 forwardable = true proxiable = true fcc-mit-ticketflags = true [realms] ADA.DE <http://ada.de/> = { kdc = ad01.ada.de kdc = ad02.ada.de admin_server = ad01.ada.de chpasswd_server = ad01.ada.de default_domain = ada.de } [domain_realm] .ada.de = ADA.DE <http://ada.de/> ada.de = ADA.DE <http://ada.de/> kinit...
2014 Jun 05
1
Testing samba4 connection on Windows
...ig /all Windows IP-configuratie Hostnaam . . . . . . . . . . . . : Win7-test Primair DNS-achtervoegsel . . . . : Knooppunttype . . . . . . . . . . : hybride IP-routering ingeschakeld . . . . : nee WINS-proxy ingeschakeld . . . . . : nee DNS-achtervoegselzoeklijst. . . . : ad01.ace-electronics.be Ethernet-adapter voor LAN-verbinding: Verbindingsspec. DNS-achtervoegsel: ad01.ace-electronics.be Beschrijving. . . . . . . . . . . : Intel(R) PRO/1000 MT-netwerkverbinding Fysiek adres. . . . . . . . . . . : 00-50-56-B8-FD-57 DHCP ingeschakeld . . . . . . . ....
2019 Oct 16
0
Can't setup kerberos auth for samba4 server?
...t; dns_lookup_kdc = true > > kdc_timesync = 1 > ccache_type = 4 > forwardable = true > proxiable = true > > fcc-mit-ticketflags = true > > [realms] > ADA.DE <http://ada.de/> = { > kdc = ad01.ada.de > kdc = ad02.ada.de > admin_server = ad01.ada.de > chpasswd_server = ad01.ada.de > default_domain = ada.de > } > > [domain_realm] > .ada.de = ADA.DE <http://ada.de/> > ad...
2019 Sep 18
2
DC join failed
...ered GENSEC backend 'http_ntlm' registered GENSEC backend 'krb5' registered GENSEC backend 'fake_gssapi_krb5' registered Finding a writeable DC for domain 'conylec.local' resolve_lmhosts: Attempting lmhosts lookup for name _ldap._tcp.conylec.local<0x0> Found DC AD01.conylec.local resolve_lmhosts: Attempting lmhosts lookup for name AD01.conylec.local<0x20> Password for [CONYLEC\administrador]: Cannot reach a KDC we require to contact (null) : kinit for administrador at CONYLEC failed (Cannot contact any KDC for requested realm) SPNEGO(gssapi_krb5) creati...
2019 Oct 16
2
Can't setup kerberos auth for samba4 server?
...kdc_timesync = 1 > > ccache_type = 4 > > forwardable = true > > proxiable = true > > > > fcc-mit-ticketflags = true > > > > [realms] > > ADA.DE <http://ada.de/> = { > > kdc = ad01.ada.de > > kdc = ad02.ada.de > > admin_server = ad01.ada.de > > chpasswd_server = ad01.ada.de > > default_domain = ada.de > > } > > > > [domain_realm] > > .ada.de = ADA.DE...
2019 Sep 18
0
DC join failed
...local DC -U "CONYLEC\administrador" --debug 3 > lpcfg_load: refreshing parameters from /etc/samba/smb.conf > > Finding a writeable DC for domain 'conylec.local' > resolve_lmhosts: Attempting lmhosts lookup for name > _ldap._tcp.conylec.local<0x0> > Found DC AD01.conylec.local > resolve_lmhosts: Attempting lmhosts lookup for name AD01.conylec.local<0x20> > Password for [CONYLEC\administrador]: > Cannot reach a KDC we require to contact (null) : kinit for > administrador at CONYLEC failed (Cannot contact any KDC for requested > realm) &g...
2014 Jul 11
2
Co-existing domains
Hi, Just to make sure : I can have the following domains on the same subnet without interfering with each other. Right ? Samba3 PDC : my_domain Samba4 AD DC : ad01.example.com I want to migrate from the first to the second. Thanks, Koenraad.
2019 Sep 19
3
DC join failed
...nistrador" --debug 3 > > lpcfg_load: refreshing parameters from /etc/samba/smb.conf > > > > Finding a writeable DC for domain 'conylec.local' > > resolve_lmhosts: Attempting lmhosts lookup for name > > _ldap._tcp.conylec.local<0x0> > > Found DC AD01.conylec.local > > resolve_lmhosts: Attempting lmhosts lookup for name AD01.conylec.local<0x20> > > Password for [CONYLEC\administrador]: > > Cannot reach a KDC we require to contact (null) : kinit for > > administrador at CONYLEC failed (Cannot contact any KDC for requ...
2019 May 31
2
DC join failed
...a Domain 2008 R2 how Domain Controller. if i add a Windows server how domain controller i wasn't a problem. but is not de samba case. the samba join output : samba-tool domain join example.local DC -U example\\administrator Finding a writeable DC for domain 'example.local' Found DC AD01.example.local Password for [CONYLEC\administrator]: workgroup is CONYLEC realm is example.local Adding CN=DC02,OU=Domain Controllers,DC=example,DC=local Adding CN=DC02,CN=Servers,CN=Nombre-predeterminado-primer-sitio,CN=Sites,CN=Configuration,DC=example,DC=local Adding CN=NTDS Settings,CN=DC02,CN=S...
2019 Oct 22
2
Problems with internal DNS
...5:47, Thomas Schweikle via samba wrote: > > Hi! > > > > Samba server set up for domain rufus.ada.de a proxy is reachable in > > proxy.ada.de. > > How are you running Samba ? > As ADDC. Please post your smb.conf. > OK. Here it is: [global] netbios name = AD01 realm = RUFUS.ADA.DE server role = active directory domain controller workgroup = RUFUS idmap_ldb:use rfc2307 = yes allow dns updates = secure only dns forwarder = 172.18.8.1 [sysvol] path = /var/lib/samba/sysvol read only = No [netl...
2016 Apr 13
5
Owncloud authentication error after upgrade
...n-error wenn Owncloud is trying to authenticat a user. The only error-message we got was: user_ldap Bind failed: 8: Strong(er) authentication required This is the smb.conf: ----------------------------- [global] workgroup = XXXXXXX realm = XXXXXXX.INTERN netbios name = XXX-AD01 server role = active directory domain controller dns forwarder = XXX.XXX.XXX.XXX wins support = yes printing = bsd printcap name = /etc/printcap client ldap sasl wrapping = plain [netlogon] path = /var/lib/samba/sysvol/XXXXXXX.intern/scripts...
2011 Feb 21
4
Initializing a Samba3 ldapsam
I have spent the last few days attempting to get a Samba3 PDC/BDC setup with an LDAP SAM and need some clarification on exactly what should/can be initialized in the LDAP SAM. As my main sources of information/inspiration I have been using http://http://wiki.samba.org/index.php/Replicated_Failover_Domain_Controller_and_file_server_using_LDAP and the smbldap-tools source code, but have also
2014 Mar 17
2
Samba 4.1.6 + RPC Problem + DNS + RSAT
...7 21:57:36.011373, 0] ../lib/util/fault.c:75(fault_report) =============================================================== [2014/03/17 21:57:36.011497, 0] ../lib/util/fault.c:144(smb_panic_default) PANIC: internal error Same error we get on command line with this command: samba-tool dns query ad01.domain.test domain.test @ ALL -UAdministrator netstat before connecting : netstat -anp | grep '88\|135\|389\|464\|636\|1024\|3268\|3269\|53' | grep -i listen tcp 0 0 0.0.0.0:464 0.0.0.0:* LISTEN 27695/samba tcp 0 0 10.30.0.2:53 0.0.0.0:* LISTEN 26519/named-sdb tcp 0 0 127.0.0.1:53...
2007 Jan 17
1
Machine account in Users home
Hello, Am i suppose to see win machine names in users home? they are created when users login using their workstations here is my home directory [cat@itbox CAD]$ ls -l total 20 drwx------ 3 ad01$ Domain Computers 4096 Jan 17 17:57 ad01_ drwx------ 3 administrator Domain Users 4096 Jan 17 17:59 administrator drwx------ 3 cat Domain Users 4096 Jan 17 18:07 cat drwx------ 4 mina.azer Domain Users 4096 Jan 17 17:57 mina.azer drwx------ 3...
2018 Sep 17
1
FEDORA 28 + SAMBA 4.8.5 --must-change-at-next-login don't work
On Wednesday, 12 September 2018 18:13:16 CEST Andrew Bartlett wrote: > On Wed, 2018-09-12 at 17:16 +0200, Karel Lang AFD via samba wrote: > > Hello, > > if anybody would kindly have anything to advice, please, please - do > > > > :-) > > > > SETUP: > > Fedora 28 + Samba 4.8.5 AD (testing environment consisting of 1 > > Samba > > server
2019 Oct 22
1
Problems with internal DNS
...hable in > > > proxy.ada.de <http://proxy.ada.de>. > > > > How are you running Samba ? > > > > As ADDC. > > > > Please post your smb.conf. > > > > OK. Here it is: > > > > [global] > > netbios name = AD01 > > realm = RUFUS.ADA.DE <http://RUFUS.ADA.DE> > > server role = active directory domain controller > > workgroup = RUFUS > > idmap_ldb:use rfc2307 = yes > > allow dns updates = secure only > > dns forwarder =...
2010 Apr 01
3
AIX 5.3 Active Directory Synchronisation using Winbind
...one I'm using in my environment --- krb5.conf - start --- [libdefaults] default_realm = TESTREALM.COM.AU dns_lookup_realm = false dns_lookup_kdc = false ticket_lifetime = 24h forwardable = yes [realms] TESTREALM.COM.AU = { kdc = ad01.testrealm.com.au:88 default_domain = testrealm.com.au admin_server = ad01.testrealm.com.au:749 } [domain_realm] .kerberos.server = TESTREALM.COM.AU .domain.com = TESTREALM.COM.AU domain.com = TESTREALM.COM.AU .testrealm.com.au...
2018 Sep 12
5
FEDORA 28 + SAMBA 4.8.5 --must-change-at-next-login don't work
...uid-number=8888 --must-change-at-next-login I see in logs: %m.log [2018/09/12 16:30:26.284142, 1] ../lib/util/util_runcmd.c:327(samba_runcmd_io_handler) /usr/sbin/krb5kdc: sam_account_ok: Account for user 'long at AUFEERDESIGN' password must change!. mit_kdc.log Sep 12 16:31:14 ad01 krb5kdc[3180](info): AS_REQ (6 etypes {18 17 23 24 -135 3}) 192.168.181.181: UNKNOWN_REASON: long at AUFEERDESIGN for kadmin/changepw at AUFEERDESIGN, Password has expired Sep 12 16:31:14 ad01 krb5kdc[3180](info): closing down fd 19 Thank You -- *Karel Lang* *Unix/Linux Administration* lan...
2016 Apr 13
0
Owncloud authentication error after upgrade
...t a user. The only error-message we got was: > > user_ldap Bind failed: 8: Strong(er) authentication required > > This is the smb.conf: > ----------------------------- > [global] > workgroup = XXXXXXX > realm = XXXXXXX.INTERN > netbios name = XXX-AD01 > server role = active directory domain controller > dns forwarder = XXX.XXX.XXX.XXX > wins support = yes > printing = bsd > printcap name = /etc/printcap > client ldap sasl wrapping = plain > [netlogon] > path = /var/l...