Displaying 20 results from an estimated 8000 matches similar to: "Manage password change without windows..."
2018 Nov 26
3
Different LDAP query in different DC...
I need to do a simple query, against some LDAP data in 'laster draft
schema' format i've added to te samba/AD schema.
All LDAP query return the same result on all (6) of the DC:
root at vdcsv1:~# ldapsearch -H ldap://vdcsv2.ad.fvg.lnf.it -W -D CN=mta,OU=Restricted,DC=ad,DC=fvg,DC=lnf,DC=it -b DC=ad,DC=fvg,DC=lnf,DC=it "(cn=prova123)" rfc822MailMember
Enter LDAP Password:
2019 Feb 15
6
Demoted/removed a DC, and the NS records?
Following:
https://wiki.samba.org/index.php/Demoting_a_Samba_AD_DC
i've demoted and removed a DC. Seems all went as expected:
root at vdcud1:~# samba-tool domain demote --server=vdcsv1.ad.fvg.lnf.it -U gaio
Using vdcsv1.ad.fvg.lnf.it as partner server for the demotion
Password for [LNFFVG\gaio]:
Deactivating inbound replication
Asking partner server vdcsv1.ad.fvg.lnf.it to synchronize
2017 Dec 14
5
[Curiosity] 'netbios aliases' works in AD mode?
Ahem no one reply me.
A little fast-rewind: i need to have some 'aliases' to my servers (DM);
seems i need to add in smb.conf:
netbios aliases = FILESV
but also add a 'SPN'; trying to look around for an examples, lead me to
''nothing'', or to examples that seems to me unrelated.
Supposing the domain is 'ad.fvg.lnf.it' and the FQDN of the real host
is
2019 Jan 17
3
Winbind, cached logons and 'user persistency'...
I've noted that some weeks ago, but i was upgrading all my PVE cluster
so i've considered it benevolent.
Yesterday i've updated my main switch, disconnecting for a brief lag of
time all my ''infrastructutes''.
My SMTP server (exim) start to complain about 'unroutable addresses':
2019-01-16 18:32:40 1gjp3Q-0006aw-TG <= root at sv.lnf.it H=(3jane.sv.lnf.it)
2018 Nov 29
2
Different LDAP query in different DC...
Mandi! Rowland Penny via samba
In chel di` si favelave...
> > No. Anyway, note that query return correctly 'result: 0 Success',
> > simply return no data.
> That just means the search retuned without error
Eh. Query succeded and return no data. Yes.
> If you run the command:
> ldapsearch -H ldap://vdcpp1.ad.fvg.lnf.it -W -D
>
2017 Dec 07
2
[Curiosity] 'netbios aliases' works in AD mode?
On Thu, 2017-12-07 at 10:48 +0100, Marco Gaiarin via samba wrote:
> Mandi! Andrew Bartlett via samba
> In chel di` si favelave...
>
> > > This lead me to another question: in this way, aliases are ''domain
> > > wide'' right? Eg, i cannot have a DM aliased 'file' in a LAN and
> > > another DM aliased 'file' in another LAN, as
2018 Nov 28
2
Different LDAP query in different DC...
Mandi! Rowland Penny via samba
In chel di` si favelave...
> If an ldap lookup works on every DC, except for one and the data is
> definitely there on the one DC it doesn't work on, then it must be
> something on that DC. is there a firewall or apparmor/selinux in the
> way ?
No. Anyway, note that query return correctly 'result: 0 Success',
simply return no data.
Another
2018 Nov 22
2
NTP strangeness...
In our network we found some client with clock differences.
Some machine have effectively some troubles, eg have NO 'Windows Time'
service defined, probably some glitches happened when moving from our
old NT-like domain.
Anyway, catching for that, we have found some other strangeness.
Windows time service run:
C:\Users\gaio>sc query w32time
NOME_SERVIZIO: w32time
TIPO
2017 Oct 27
2
Some hint reading password expiration data...
Mandi! Andrew Bartlett via samba
In chel di` si favelave...
> It is an operational attribute. simply addÂ
> msDS-UserPasswordExpiryTimeComputed
> to the list of attributes requested when searching for the user.
root at vdcsv1:~# ldbsearch -H /var/lib/samba/private/sam.ldb -b "dc=ad,dc=fvg,dc=lnf,dc=it" -s base "" maxPwdAge
# record 1
dn:
2018 Nov 29
2
Different LDAP query in different DC...
Mandi! Rowland Penny via samba
In chel di` si favelave...
> Whilst there are attributes that do not get replicated between DC's,
> the majority are, so each DC should allow the same access.
> Do you have access to the DC ?
> Can you run the search locally ?
Sure! As just stated, local access (via ldbsearch against the local
SAM) works as expected:
root at vdcpp1:~# ldbsearch
2019 Oct 01
3
Removed a DC but...
Some month ago a local branch office closed; the local branch had a DC,
that i've simply removed the dc with:
samba-tool domain demote --server=vdcsv1.ad.fvg.lnf.it -U gaio
(see https://lists.samba.org/archive/samba/2019-February/221195.html)
But this leave some old DNS records, eg:
root at vdcsv1:~# host -t SRV _kerberos._udp.ad.fvg.lnf.it | awk '{print $NF}'| sed
2019 Feb 11
2
Winbind, cached logons and 'user persistency'...
On Mon, 11 Feb 2019 14:47:01 +0100
Marco Gaiarin via samba <samba at lists.samba.org> wrote:
>
> Sorry. Still on this issue.
>
> Today i'm upgrading my DC (with latest 4.5 from louis repo). Note that
> i've 7 DC in total.
>
> In site 'PP' i've upgraded samba, then rebooted the container. reboot
> on 'vdcpp2' happen on:
>
> Feb
2018 Oct 23
2
Again NFSv4 and Kerberos at the 'samba way'...
Sorry, i come back to this topic in a different thread, because i'm
still totally puzzled with the previuous one. Louis, sorry me. ;(
I've tried to start with this, that seems very simple:
https://wiki.debian.org/NFS/Kerberos
And so i've done:
a) installed 'nfs-kernel-server' on server, 'nfs-common' on client.
Ok, this is easy.
b) AFAI've understood i need
2018 Sep 04
4
Upgraded a member server to 4.8, rfc2307 data?
I'm starting to upgrade my domain members to debian stretch/samba 4.8,
using louis packages.
Domain controllers still on jessie/samba45.
Upgrade went smooth, but after upgrade seems that the DM was not able
anymore to retrieve rfc2307 data, eg:
root at vdmsv2:~# getent passwd gaio
gaio:*:10000:10513:Marco Gaiarin:/home/LNFFVG/gaio:/bin/false
root at vdmsv2:~# ldbsearch -H
2018 Jun 06
2
Samba, AD, 'short' name resolving...
Sorry, i'm getting a bit confused about my new Samba/AD domain, related
to the 'short' name resolving.
I was clearly (ab)used to Samba/NT, where WINS make, on LAN, ''flat''
resolving very simple.
I'm moving now from my old NT domains to my new AD domain, and to
prevent massive change i've decided to keep name resolution and DHCP
address assigment out of the
2017 Nov 30
2
Troubles on Roaming Profiles...
i've seen that is similar to your latest test.
What about a gpresult -h result.html. The GPo is appplied to the user?
Greetings!!
2017-11-30 13:29 GMT+01:00 Daniel Carrasco <d.carrasco at i2tic.com>:
> I don't know if is relevant and maybe is the same as GPO that you've
> created, but Ive a profiles folder with this configuration:
>
> [profiles]
> path
2015 Jan 05
2
Info/Feedback on Samba bug #8744...
Happy new year to the list!
I'm using Debian wheezy, standard Samba packages, version
2:3.6.6-6+deb7u4.
I've hit bug #8744
https://bugzilla.samba.org/show_bug.cgi?id=8744
(referenced in debian BTS as
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658707) that prevent
me to use machine account auth; i'm using it with freeradius, to
automatically connect some wireless clients.
2017 Nov 29
2
LDAP query and result: better field for username?
Currently for my user:
root at vdmsv1:/etc/exim4# ldbsearch -H ldap://vdcsv1 -P -b DC=ad,DC=fvg,DC=lnf,DC=it "(cn=gaio)" | grep ": gaio$"
cn: gaio
name: gaio
sAMAccountName: gaio
uid: gaio
msSFU30Name: gaio
what field is betetr to use for querying for user 'gaio'?
'uid' no (because RFC2307 data can be missing), so?
'sAMAccountName'? or
2018 Nov 29
2
Different LDAP query in different DC...
Mandi! Rowland Penny via samba
In chel di` si favelave...
> You need to explicitly ask for it, for instance:
Oh, cool! Seems effectivaly different:
root at vdcsv1:~# ldbsearch -H /var/lib/samba/private/sam.ldb -b "DC=ad,DC=fvg,DC=lnf,DC=it" "(cn=prova123)" nTSecurityDescriptor
# record 1
dn: CN=prova123,CN=Aliases,OU=FVG,DC=ad,DC=fvg,DC=lnf,DC=it
nTSecurityDescriptor:
2020 Jan 07
2
Domain 'resync', DC with FSMO roles LDAP troubles...
Happy new year to all!
Samba 4.9.17 on stretch, Louis package.
On 22/12, at midnight, office closed, i suffered a network outgage that 'broke in
two' my domain.
On 23/12, at 14.00, network come back. After that, some scripts written
around ldbsearch i run on DM (against vdcsv1 that is the DC with FSMO
roles) start to complain:
Failed to bind - LDAP client internal error: