search for: kdc

Displaying 20 results from an estimated 3385 matches for "kdc".

Did you mean: dc
2016 Jun 05
2
inconsistent DNS information, windows domain member issues..
...to confirm) > > > > * When I try to modify folder permissions on the windows system, I get > > a message “Unable to contact Active Directory to access or verify > > claim types” > > > > * On DC2: kinit Administrator returns “kinit: Cannot contact any KDC > > for realm ‘samba.domain’ while getting initial credentials. This one > > was easy to fix by adding the domain to /etc/krb5.conf. I am putting > > this in as I changed configuration at this point.. > > > > * In an attempt to get Samba return DC2 as a nameserve...
2013 Jan 04
2
Migrating kerberos KDC data into Samba4 internal KDC
Is there a mechanism migrate/import user principal information from an MIT KDC into a Samba4 internal KDC? We currently run our Active Directory users with Account Mappings that utilize a cross-realm trust between our MIT KDC (where user principals are maintained) and the Active Directory domain, as documented at *http://tinyurl.com/bx9znca* This works fine for our Windo...
2024 Mar 24
3
'Scripted' machine account renewal?!
...es van Vloten via samba In chel di` si favelave... > Solution is easy: upgrading winbind from Debian backports solves the issue ! I've upgraded to latest buster version 4.18.10+dfsg-1~buster, but still does not work for me... Now display: root at vfwacpn1:~# net ads changetrustpw get_kdc_ip_string: get_kdc_list fail NT_STATUS_NO_LOGON_SERVERS Changing password for principal: vfwacpn1$@AD.AC.CONCORDIA-PORDENONE.IT Password change failed: No more connections can be made to this remote computer at this time because the computer has already accepted the maximum number of connections....
2004 May 05
0
FreeBSD Security Advisory FreeBSD-SA-04:08.heimdal
...alms. Unidirectional or bidirectional trust relationships may be established between realms to allow the principals in one realm to recognize the authenticity of principals in another. These trust relationships may be transitive. An authentication path is the ordered list of realms (and therefore KDCs) that were involved in the authentication process. The authentication path is recorded in Kerberos tickets as the `transited' field. It is possible for the Key Distribution Center (KDC) of a realm to forge part or all of the `transited' field. KDCs should validate this field before acce...
2004 May 05
0
FreeBSD Security Advisory FreeBSD-SA-04:08.heimdal
...alms. Unidirectional or bidirectional trust relationships may be established between realms to allow the principals in one realm to recognize the authenticity of principals in another. These trust relationships may be transitive. An authentication path is the ordered list of realms (and therefore KDCs) that were involved in the authentication process. The authentication path is recorded in Kerberos tickets as the `transited' field. It is possible for the Key Distribution Center (KDC) of a realm to forge part or all of the `transited' field. KDCs should validate this field before acce...
2016 Jun 05
0
inconsistent DNS information, windows domain member issues..
...line for the other DC > joachim at dc1:~$ cat /etc/krb5.conf > [libdefaults] > default_realm = SAMBA.DOMAIN > > # The following krb5.conf variables are only for MIT Kerberos. > krb4_config = /etc/krb.conf > krb4_realms = /etc/krb.realms > kdc_timesync = 1 > ccache_type = 4 > forwardable = true > proxiable = true > > # The following encryption type specification will be used by MIT Kerberos > # if uncommented. In general, the defaults in the MIT Kerberos code are > # correct and overriding...
2016 Jun 05
2
inconsistent DNS information, windows domain member issues..
...ely with cached credentials, but don´t dare to change them to confirm) * When I try to modify folder permissions on the windows system, I get a message “Unable to contact Active Directory to access or verify claim types” * On DC2: kinit Administrator returns “kinit: Cannot contact any KDC for realm ‘samba.domain’ while getting initial credentials. This one was easy to fix by adding the domain to /etc/krb5.conf. I am putting this in as I changed configuration at this point.. * In an attempt to get Samba return DC2 as a nameserver I tried samba-tool dns add dc2 samba.domain @ N...
2017 Nov 08
2
DC's are unavailable when PDC halted
...hosts ::1 localhost ip6-localhost ip6-loopback ff02::1 ip6-allnodes ff02::2 ip6-allrouters -------- /etc/resolv.conf search core.mydomain.hu nameserver 127.0.0.1 nameserver 10.10.10.1 -------- /etc/krb5.conf [libdefaults] default_realm = CORE.MYDOMAIN.HU dns_lookup_realm = false dns_lookup_kdc = true [realms] CORE.MYDOMAIN.HU = { kdc = OPEN-LDAP.CORE.MYDOMAIN.HU kdc = OPEN-LDAP2.CORE.MYDOMAIN.HU admin_server = OPEN-LDAP.CORE.MYDOMAIN.HU admin_server = OPEN-LDAP2.CORE.MYDOMAIN.HU } -------- /etc/samba/smb.conf # Global parameters [global] netbios name = OPEN-LDAP...
2023 Dec 04
1
krb5.conf & kdc=, explicit vs automatic
...nf for each realm it uses, and stores it in /run/samba/smb_krb5/krb5.conf.$REALM. Here's a typical such config in fully-automatic mode: libdefaults] default_realm = RGS.RU default_etypes = aes256-cts-hmac-sha1-96 aes128-cts-hmac-sha1-96 arcfour-hmac-md5 dns_lookup_realm = false dns_lookup_kdc = true [realms] FOO.BAR = { kdc = 10.221.1.98 kdc = 10.53.1.100 kdc = 10.45.1.100 kdc = 10.59.1.100 } These are addresses of 4 DCs winbindd found in _ldap._tcp.dc._msdcs.FOO.BAR SRV records. However, if I specify custom /etc/samba/krb5.conf (why it does not use /etc/krb5.conf, btw?), t...
2019 Apr 05
2
wbinfo isn't working on domain member
...e of reasoning that it is a Kerberos issue, I then tried to grab a new kerberos ticket on the server in question which appears to fail though. Perhaps this gives some further insight? pi at fs1:~ $ kinit administrator at samdom.example.com Password for administrator at samdom.example.com: kinit: KDC reply did not match expectations while getting initial credentials Thanks Stephen
2019 Apr 05
1
wbinfo isn't working on domain member
...229    ad1.samdom.example.com ad1 192.168.1.228  ad2.samdom.example.com ad2 192.168.1.227    fs1.samdom.example.com fs1 pi at fs1:/var/log/apache2 $ cat /etc/krb5.conf [libdefaults]         default_realm = SAMDOM.EXAMPLE.COM # The following krb5.conf variables are only for MIT Kerberos.         kdc_timesync = 1         ccache_type = 4         forwardable = true         proxiable = true # The following encryption type specification will be used by MIT Kerberos # if uncommented.  In general, the defaults in the MIT Kerberos code are # correct and overriding these specifications only serves...
2015 Dec 09
5
Authentication to Secondary Domain Controller initially fails when PDC is offline
On 09/12/15 17:03, James wrote: > On 12/9/2015 11:33 AM, Ole Traupe wrote: >> >>> - But when I try to ssh to a member server, it still takes forever, >>> and a 'kinit' on a member server gives this: >>> "kinit: Cannot contact any KDC for realm 'MY.DOMAIN.TLD' while >>> getting initial credentials" >>> >>> >>> My /etc/krb5.conf looks like this (following your suggestions, >>> Rowland, as everything else are defaults): >>> >>> [libdefaults] >>>...
2017 Nov 08
0
DC's are unavailable when PDC halted
...You would be better using the DCs ipaddress rather than '127.0.0.1'. You should also remove '10.10.0.1' it doesn't seem to be a DC. > > -------- > /etc/krb5.conf > [libdefaults] > default_realm = CORE.MYDOMAIN.HU > dns_lookup_realm = false > dns_lookup_kdc = true > You don't need the rest of the krb5.conf > [realms] > CORE.MYDOMAIN.HU = { > kdc = OPEN-LDAP.CORE.MYDOMAIN.HU > kdc = OPEN-LDAP2.CORE.MYDOMAIN.HU > admin_server = OPEN-LDAP.CORE.MYDOMAIN.HU > admin_server = OPEN-LDAP2.CORE.MYDOMAIN.HU >...
2016 Aug 13
0
Samba 4.2.14 Group Policy (GPO) sync error
...ptions): --bundled-libraries=NONE --builtin-libraries=NONE I quickly removed both lines. The effect was that Samba now fails to compile complaining about tgt_use_strongest_session_key. I found this to be an issue of a patch applied by the Gentoo team: --- samba-4.2.3/source4/kdc/kdc.c +++ samba-4.2.3/source4/kdc/kdc.c @@ -967,9 +967,9 @@ * The old behavior in the _kdc_get_preferred_key() * function is use_strongest_server_key=TRUE. */ - kdc->config->as_use_strongest_session_key = false; + kdc->config->tgt_use_strongest_...
2015 Dec 09
7
Authentication to Secondary Domain Controller initially fails when PDC is offline
> - But when I try to ssh to a member server, it still takes forever, > and a 'kinit' on a member server gives this: > "kinit: Cannot contact any KDC for realm 'MY.DOMAIN.TLD' while > getting initial credentials" > > > My /etc/krb5.conf looks like this (following your suggestions, > Rowland, as everything else are defaults): > > [libdefaults] > default_realm = MY.DOMAIN.TLD > > And my /etc/resolv.con...
2019 Mar 29
2
Is RODC password replication different from the windows version by design or is it a bug?
...gt;> now. That is exactly what wee seeing, authentication works __after__ >>>> (from the second attempt on) the initial password sync is done, the >>>> first attempt isn't proxied. >>> >>> It should work, as long as you are using the internal Heimdal KDC, and >>> I thought we even had tests for that. The KDC propagates up a special >>> error code to the processing layer to say 'please proxy this packet to >>> a full DC' to trigger that >> >> We use the internal Heimdal KDC, and it doesn't work, at...
2007 Mar 04
1
net ads join to w2k3 hangs, every encryption type fails
...ac-md5 # default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 aes256-cts arcfour-hmac-md5 clockskew = 300 [2007/03/04 12:21:47, 5] libads/kerberos.c:get_service_ticket(367) get_service_ticket: krb5_get_credentials for BLANKENSHIP6$@BLANKENSHIP.LOCAL enctype 18 failed: KDC has no support for encryption type [2007/03/04 12:21:47, 3] libads/kerberos.c:kerberos_derive_salting_principal_for_enctype(552) verify_service_password: get_service_ticket failed: KDC has no support for encryption type [2007/03/04 12:22:17, 5] libads/kerberos.c:get_service_ticket(367) get_ser...
2006 Feb 01
4
ADS and samba domain member: ads_connect: Cannot resolve network address for KDC in requ
Thanks, Unfortunately, I still got the same error. I may be wrong, but it is like it does the automatic lookup process of kdc instead of using the krb5.conf file. However, as per my note below, if I do add bad config info to the krb5.conf, it does complain. David David Shapiro Unix Team Lead 919-765-2011 >>> Dimitri Yioulos <dyioulos@firstbhph.com> 2/1/2006 10:15:49 AM >>> On Wednesday Feb...
2016 Jun 05
2
inconsistent DNS information, windows domain member issues..
...at dc1:~$ cat /etc/krb5.conf > > [libdefaults] > > default_realm = SAMBA.DOMAIN > > > > # The following krb5.conf variables are only for MIT Kerberos. > > krb4_config = /etc/krb.conf > > krb4_realms = /etc/krb.realms > > kdc_timesync = 1 > > ccache_type = 4 > > forwardable = true > > proxiable = true > > > > # The following encryption type specification will be used by MIT Kerberos > > # if uncommented. In general, the defaults in the MIT Kerberos code are...
2016 Mar 11
5
Problem with Winbind and Windows Clients
...o restart winbind. Also same problem with winds client that running 24x7. After few days i can not logged in. i think thats a problem with kerberos tickets. i have checks samba logs and found that samba member and windows client ask for new tickets and get new expiration. in my DCs i have set kdc:service ticket lifetime = 1 kdc:user ticket lifetime = 24 kdc:renewal lifetime = 120 and Master krb5.conf looks [libdefaults] default_realm = HQ.KONTRAST dns_lookup_realm = false dns_lookup_kdc = true ticket_lifetime = 1d renew_lifetime = 5d [realms] HQ.KONTRAST = { kdc = vl0227....