Displaying 20 results from an estimated 31 matches for "ad01".
Did you mean:
a001
2005 May 06
0
Version 3.0.10-1.fc3
...t:
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: Administrator@INT.BATTEN.CA
Valid starting Expires Service principal
05/05/05 18:32:33 05/06/05 04:32:49 krbtgt/INT.BATTEN.CA@INT.BATTEN.CA
renew until 05/06/05 18:32:33
05/05/05 18:34:24 05/06/05 04:32:49 ad01$@INT.BATTEN.CA
renew until 05/06/05 18:32:33
05/05/05 19:19:10 05/06/05 04:32:49 nas02$@INT.BATTEN.CA
renew until 05/06/05 18:32:33
Kerberos 4 ticket cache: /tmp/tkt0
klist: You have no tickets cached
2) I am able To connect to the \\servername\c$ default share usin...
2019 Oct 16
3
Can't setup kerberos auth for samba4 server?
...E <http://ada.de/>
dns_lookup_realm = false
dns_lookup_kdc = true
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
fcc-mit-ticketflags = true
[realms]
ADA.DE <http://ada.de/> = {
kdc = ad01.ada.de
kdc = ad02.ada.de
admin_server = ad01.ada.de
chpasswd_server = ad01.ada.de
default_domain = ada.de
}
[domain_realm]
.ada.de = ADA.DE <http://ada.de/>
ada.de = ADA.DE <http://ada.de/>
kinit...
2014 Jun 05
1
Testing samba4 connection on Windows
...ig /all
Windows IP-configuratie
Hostnaam . . . . . . . . . . . . : Win7-test
Primair DNS-achtervoegsel . . . . :
Knooppunttype . . . . . . . . . . : hybride
IP-routering ingeschakeld . . . . : nee
WINS-proxy ingeschakeld . . . . . : nee
DNS-achtervoegselzoeklijst. . . . : ad01.ace-electronics.be
Ethernet-adapter voor LAN-verbinding:
Verbindingsspec. DNS-achtervoegsel: ad01.ace-electronics.be
Beschrijving. . . . . . . . . . . : Intel(R) PRO/1000
MT-netwerkverbinding
Fysiek adres. . . . . . . . . . . : 00-50-56-B8-FD-57
DHCP ingeschakeld . . . . . . . ....
2019 Oct 16
0
Can't setup kerberos auth for samba4 server?
...t; dns_lookup_kdc = true
>
> kdc_timesync = 1
> ccache_type = 4
> forwardable = true
> proxiable = true
>
> fcc-mit-ticketflags = true
>
> [realms]
> ADA.DE <http://ada.de/> = {
> kdc = ad01.ada.de
> kdc = ad02.ada.de
> admin_server = ad01.ada.de
> chpasswd_server = ad01.ada.de
> default_domain = ada.de
> }
>
> [domain_realm]
> .ada.de = ADA.DE <http://ada.de/>
> ad...
2019 Sep 18
2
DC join failed
...ered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Finding a writeable DC for domain 'conylec.local'
resolve_lmhosts: Attempting lmhosts lookup for name
_ldap._tcp.conylec.local<0x0>
Found DC AD01.conylec.local
resolve_lmhosts: Attempting lmhosts lookup for name AD01.conylec.local<0x20>
Password for [CONYLEC\administrador]:
Cannot reach a KDC we require to contact (null) : kinit for
administrador at CONYLEC failed (Cannot contact any KDC for requested
realm)
SPNEGO(gssapi_krb5) creati...
2019 Oct 16
2
Can't setup kerberos auth for samba4 server?
...kdc_timesync = 1
> > ccache_type = 4
> > forwardable = true
> > proxiable = true
> >
> > fcc-mit-ticketflags = true
> >
> > [realms]
> > ADA.DE <http://ada.de/> = {
> > kdc = ad01.ada.de
> > kdc = ad02.ada.de
> > admin_server = ad01.ada.de
> > chpasswd_server = ad01.ada.de
> > default_domain = ada.de
> > }
> >
> > [domain_realm]
> > .ada.de = ADA.DE...
2019 Sep 18
0
DC join failed
...local DC -U "CONYLEC\administrador" --debug 3
> lpcfg_load: refreshing parameters from /etc/samba/smb.conf
>
> Finding a writeable DC for domain 'conylec.local'
> resolve_lmhosts: Attempting lmhosts lookup for name
> _ldap._tcp.conylec.local<0x0>
> Found DC AD01.conylec.local
> resolve_lmhosts: Attempting lmhosts lookup for name AD01.conylec.local<0x20>
> Password for [CONYLEC\administrador]:
> Cannot reach a KDC we require to contact (null) : kinit for
> administrador at CONYLEC failed (Cannot contact any KDC for requested
> realm)
&g...
2014 Jul 11
2
Co-existing domains
Hi,
Just to make sure : I can have the following domains on the same subnet
without interfering with each other. Right ?
Samba3 PDC : my_domain
Samba4 AD DC : ad01.example.com
I want to migrate from the first to the second.
Thanks,
Koenraad.
2019 Sep 19
3
DC join failed
...nistrador" --debug 3
> > lpcfg_load: refreshing parameters from /etc/samba/smb.conf
> >
> > Finding a writeable DC for domain 'conylec.local'
> > resolve_lmhosts: Attempting lmhosts lookup for name
> > _ldap._tcp.conylec.local<0x0>
> > Found DC AD01.conylec.local
> > resolve_lmhosts: Attempting lmhosts lookup for name AD01.conylec.local<0x20>
> > Password for [CONYLEC\administrador]:
> > Cannot reach a KDC we require to contact (null) : kinit for
> > administrador at CONYLEC failed (Cannot contact any KDC for requ...
2019 May 31
2
DC join failed
...a Domain 2008 R2
how Domain Controller.
if i add a Windows server how domain controller i wasn't a problem.
but is not de samba case.
the samba join output :
samba-tool domain join example.local DC -U example\\administrator
Finding a writeable DC for domain 'example.local'
Found DC AD01.example.local
Password for [CONYLEC\administrator]:
workgroup is CONYLEC
realm is example.local
Adding CN=DC02,OU=Domain Controllers,DC=example,DC=local
Adding CN=DC02,CN=Servers,CN=Nombre-predeterminado-primer-sitio,CN=Sites,CN=Configuration,DC=example,DC=local
Adding CN=NTDS Settings,CN=DC02,CN=S...
2019 Oct 22
2
Problems with internal DNS
...5:47, Thomas Schweikle via samba wrote:
> > Hi!
> >
> > Samba server set up for domain rufus.ada.de a proxy is reachable in
> > proxy.ada.de.
>
> How are you running Samba ?
>
As ADDC.
Please post your smb.conf.
>
OK. Here it is:
[global]
netbios name = AD01
realm = RUFUS.ADA.DE
server role = active directory domain controller
workgroup = RUFUS
idmap_ldb:use rfc2307 = yes
allow dns updates = secure only
dns forwarder = 172.18.8.1
[sysvol]
path = /var/lib/samba/sysvol
read only = No
[netl...
2016 Apr 13
5
Owncloud authentication error after upgrade
...n-error wenn
Owncloud is trying to authenticat a user. The only error-message we got was:
user_ldap Bind failed: 8: Strong(er) authentication required
This is the smb.conf:
-----------------------------
[global]
workgroup = XXXXXXX
realm = XXXXXXX.INTERN
netbios name = XXX-AD01
server role = active directory domain controller
dns forwarder = XXX.XXX.XXX.XXX
wins support = yes
printing = bsd
printcap name = /etc/printcap
client ldap sasl wrapping = plain
[netlogon]
path = /var/lib/samba/sysvol/XXXXXXX.intern/scripts...
2011 Feb 21
4
Initializing a Samba3 ldapsam
I have spent the last few days attempting to get a Samba3 PDC/BDC
setup with an LDAP SAM and need some clarification on exactly what
should/can be initialized in the LDAP SAM.
As my main sources of information/inspiration I have been using
http://http://wiki.samba.org/index.php/Replicated_Failover_Domain_Controller_and_file_server_using_LDAP and the smbldap-tools source code, but have also
2014 Mar 17
2
Samba 4.1.6 + RPC Problem + DNS + RSAT
...7 21:57:36.011373, 0] ../lib/util/fault.c:75(fault_report)
===============================================================
[2014/03/17 21:57:36.011497, 0] ../lib/util/fault.c:144(smb_panic_default)
PANIC: internal error
Same error we get on command line with this command: samba-tool dns query ad01.domain.test domain.test @ ALL -UAdministrator
netstat before connecting :
netstat -anp | grep '88\|135\|389\|464\|636\|1024\|3268\|3269\|53' | grep -i listen
tcp 0 0 0.0.0.0:464 0.0.0.0:* LISTEN 27695/samba
tcp 0 0 10.30.0.2:53 0.0.0.0:* LISTEN 26519/named-sdb
tcp 0 0 127.0.0.1:53...
2007 Jan 17
1
Machine account in Users home
Hello, Am i suppose to see win machine names in users home? they are created
when users login using their workstations
here is my home directory
[cat@itbox CAD]$ ls -l
total 20
drwx------ 3 ad01$ Domain Computers 4096 Jan 17 17:57 ad01_
drwx------ 3 administrator Domain Users 4096 Jan 17 17:59
administrator
drwx------ 3 cat Domain Users 4096 Jan 17 18:07 cat
drwx------ 4 mina.azer Domain Users 4096 Jan 17 17:57 mina.azer
drwx------ 3...
2018 Sep 17
1
FEDORA 28 + SAMBA 4.8.5 --must-change-at-next-login don't work
On Wednesday, 12 September 2018 18:13:16 CEST Andrew Bartlett wrote:
> On Wed, 2018-09-12 at 17:16 +0200, Karel Lang AFD via samba wrote:
> > Hello,
> > if anybody would kindly have anything to advice, please, please - do
> >
> > :-)
> >
> > SETUP:
> > Fedora 28 + Samba 4.8.5 AD (testing environment consisting of 1
> > Samba
> > server
2019 Oct 22
1
Problems with internal DNS
...hable in
> > > proxy.ada.de <http://proxy.ada.de>.
> >
> > How are you running Samba ?
> >
> > As ADDC.
> >
> > Please post your smb.conf.
> >
> > OK. Here it is:
> >
> > [global]
> > netbios name = AD01
> > realm = RUFUS.ADA.DE <http://RUFUS.ADA.DE>
> > server role = active directory domain controller
> > workgroup = RUFUS
> > idmap_ldb:use rfc2307 = yes
> > allow dns updates = secure only
> > dns forwarder =...
2010 Apr 01
3
AIX 5.3 Active Directory Synchronisation using Winbind
...one I'm using in my environment
--- krb5.conf - start ---
[libdefaults]
default_realm = TESTREALM.COM.AU
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
forwardable = yes
[realms]
TESTREALM.COM.AU = {
kdc = ad01.testrealm.com.au:88
default_domain = testrealm.com.au
admin_server = ad01.testrealm.com.au:749
}
[domain_realm]
.kerberos.server = TESTREALM.COM.AU
.domain.com = TESTREALM.COM.AU
domain.com = TESTREALM.COM.AU
.testrealm.com.au...
2018 Sep 12
5
FEDORA 28 + SAMBA 4.8.5 --must-change-at-next-login don't work
...uid-number=8888 --must-change-at-next-login
I see in logs:
%m.log
[2018/09/12 16:30:26.284142, 1]
../lib/util/util_runcmd.c:327(samba_runcmd_io_handler)
/usr/sbin/krb5kdc: sam_account_ok: Account for user
'long at AUFEERDESIGN' password must change!.
mit_kdc.log
Sep 12 16:31:14 ad01 krb5kdc[3180](info): AS_REQ (6 etypes {18 17 23 24
-135 3}) 192.168.181.181: UNKNOWN_REASON: long at AUFEERDESIGN for
kadmin/changepw at AUFEERDESIGN, Password has expired
Sep 12 16:31:14 ad01 krb5kdc[3180](info): closing down fd 19
Thank You
--
*Karel Lang*
*Unix/Linux Administration*
lan...
2016 Apr 13
0
Owncloud authentication error after upgrade
...t a user. The only error-message we got was:
>
> user_ldap Bind failed: 8: Strong(er) authentication required
>
> This is the smb.conf:
> -----------------------------
> [global]
> workgroup = XXXXXXX
> realm = XXXXXXX.INTERN
> netbios name = XXX-AD01
> server role = active directory domain controller
> dns forwarder = XXX.XXX.XXX.XXX
> wins support = yes
> printing = bsd
> printcap name = /etc/printcap
> client ldap sasl wrapping = plain
> [netlogon]
> path = /var/l...