similar to: IDMAP/GID2SID/1004 couldn't be found

Displaying 20 results from an estimated 300 matches similar to: "IDMAP/GID2SID/1004 couldn't be found"

2011 Sep 05
0
Problems with ntlm_auth and machines accounts
I upgrade a samba 3.2.14 to samba 3.6.0 radius server for 802.1x. I discover that ntlm_auth fails for machines accounts with error: No logon workstation trust account Put winbind in debug with winbindd -F -i -d 10 give: accepted socket 24 process_request: request fn INTERFACE_VERSION [20000]: request interface version winbind_client_response_written[20000:INTERFACE_VERSION]: delivered response
2016 May 10
2
Ubuntu server 14.04 classic upgrade segmentation fault
Hi , I'm trying to migrate an old server with ubuntu 9.10 ,samba3 +ldap to a new server ubunut 14.04. I could follow the steps of https://wiki.samba.org/index.php/Migrating_a_Samba_NT4_domain_to_a_Samba_AD_domain_%28classic_upgrade%29 but when running samba-domain tool classicupgrade --dbdir = / util / tdb --use-xattrs = yes --realm = gruporesasco.local --dns-backend = BIND9_DLZ
2013 Sep 20
0
"net idmap dump" and "wbinfo" shows different GIDs for same SID
Hi! I'm apologize for my poor English, but have a question. This question is a shorter than one i posted not so long ago (https://lists.samba.org/archive/samba/2013-September/175649.html) and received no answer for a while. In this question i took a log from the different server, but this is no matter: the problem persists on all of my servers. So, my OS is FreeBSD 9.0, my Samba is 3.6.18
2013 Sep 16
0
tdb idmap returns different GID's for the same SID from time to time
Greetings! I have a samba 3.6.18 acts as a domain member. I'm using a samba nss and creating local groups for a domain users. Here part of my nsswitch.conf: group: files winbind passwd: files winbind The problem is that the tdb unix GID mappings returns different ID from time to time for the same SIDs. Suppose we have a local group "samba_svn1", created with "NET SAM
2016 May 02
0
Strange ID-Mapping behavior
Hi Mathias, greping in the output of "net cache list" shows: Key: IDMAP/GID2SID/20513 Timeout: Mon May 9 07:29:11 2016 Value: S-1-5-21-1891182457-2156988848-2018633412-513 Key: IDMAP/GID2SID/100 Timeout: Mon May 9 07:29:32 2016 Value: S-1-5-21-1891182457-2156988848-2018633412-513 Key: IDMAP/SID2XID/S-1-5-21-1891182457-2156988848-2018633412-513 Timeout: Mon May 9
2016 May 02
1
Strange ID-Mapping behavior
On 02/05/16 15:08, Stefan Schäfer wrote: > Hi Mathias, > > greping in the output of "net cache list" shows: > > Key: IDMAP/GID2SID/20513 Timeout: Mon May 9 07:29:11 > 2016 Value: S-1-5-21-1891182457-2156988848-2018633412-513 > Key: IDMAP/GID2SID/100 Timeout: Mon May 9 07:29:32 2016 Value: > S-1-5-21-1891182457-2156988848-2018633412-513 >
2024 Apr 05
1
-513 = 100 in tdb mode ?
Hi Quick question about something I find surprising: In tdb mode : net cache list -s /etc/samba/smb.conf |grep '\-513' Key: IDMAP/GID2SID/100?? ? Timeout: Tue Apr? 9 14:34:48 2024 Value: S-1-5-21-1040823229-2152490729-3717368692-513 id of group "domain users" is?100 But id 100 use by "users" system group: getent group|grep users users:x:100: Is this something
2010 Oct 05
1
Win7 cannot net use z: Samba share
Hi all The symptom is: > C:\Windows\system32>net USE z: \\10.10.23.219\share /USER:SMBUSER > [password] > > System error 1326 has occurred. > My situation I am using VirtualBox. Windows 7 Home is the host. Fedora 13 is the guest. My goal is to cause the Fedora guest to expose an smb share to the Win 7 host and have the Win 7 host mount the share as a drive. My procedure:
2011 Mar 07
0
"net lookup sid" fails to get user's domain
When I run the following "net lookup sid" command, I get: # net lookup sid S-1-5-21-1908027396-2059629336-315576832-12220 S-1-5-21-1908027396-2059629336-315576832-12220 1 (User) \fhess This is wrong in that "\fhess" should be "NIST\fhess". The other direction works fine: # net lookup name "NIST\fhess" S-1-5-21-1908027396-2059629336-315576832-12220 1
2009 Feb 11
1
Something weird about pdbedit.
Hi ! I'm running a samba domain controler under rhel 5. It's version 3.0.33-3.7.el5. I've also installed a ldap server to store users and groups and so on. When I try a pdbedit -v david, I get the following : Unix username: david NT username: david Account Flags: [U ] User SID: S-1-5-21-215069222-2822928016-2390355089-1016 Finding user
2007 Dec 10
0
ldapsam_getsampwsid: Unable to locate SID
Hi, I am running a couple of Samba / LDAP servers. While they all do work fine, I get a message like this on all of them when I run pdbedit -L -v: Unix username: administrator NT username: administrator Account Flags: [UX ] User SID: S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-21000 init_group_from_ldap: Entry found for group: 512 lookup_global_sam_rid:
2006 Oct 05
2
Issues after Samba updating a Samba PDC to 3.0.23c
Hi, last Saturday we reinstalled our fileserver to setup redundancy using DRBD and Heartbeat. We also upgraded Samba to 3.0.23c, which is acting as a PDC. We are using OpenLDAP to store accounts. I populated the OpenLDAP database using a LDIF file that I created on the old server before shutting it down. I also transfered all Samba tdb files to the new server. Everything went pretty
2018 Apr 03
0
Issues with RPC, SID resolving; cannot use RSAT
Hello, I'm running a setup with 3 DCs, all Samba 4.5.12, Debian Stretch (is patched for CVE-2018-1057, "samba_CVE-2018-1057_helper" been used). Probably unrelated to the upgrade and patch for CVE-2018-1057, there's a new problem coming up. RSAT fails to start/connect, complaining about RPC-Server unavailablility. On the DCs I've tried with smbclient and get the following:
2018 Apr 03
0
Issues with RPC, SID resolving; cannot use RSAT
seems removing idmap settings from smb.conf on both DCs having them has fixed it. smbclient and ADUC work as expected, now. Thank you! > I'm running a setup with 3 DCs, all Samba 4.5.12, Debian Stretch (is > patched for CVE-2018-1057, "samba_CVE-2018-1057_helper" been used). > > Probably unrelated to the upgrade and patch for CVE-2018-1057, there's > a new
2015 Nov 08
0
idmap & migration to rfc2307
On 08/11/15 11:08, Jonathan Hunter wrote: > Hi, > > On 8 November 2015 at 10:49, Michael Adam <obnox at samba.org> wrote: >> This is how it works in rsync: > [...] >> I have always used rsync to replicate the sysvol. >> And always used local xids. But being mainly a >> file-server guy, I have also not managed many Samba >> AD/DC environments. So I am
2015 Nov 08
2
idmap & migration to rfc2307
Hi, On 8 November 2015 at 10:49, Michael Adam <obnox at samba.org> wrote: > This is how it works in rsync: [...] > I have always used rsync to replicate the sysvol. > And always used local xids. But being mainly a > file-server guy, I have also not managed many Samba > AD/DC environments. So I am really more than willing > to learn from others' experience here. This
2015 Jun 11
0
idmap & migration to rfc2307
Replying to my own post - I can reset the mappings by "net cache flush", and this then persists for a while, but ultimately it ends up being overwritten somehow. I'm no longer sure if this is related to files owned by the old UID - because I've since tried to chown all of these, and this is still happening - but I guess I may have missed some, perhaps. On 11 June 2015 at 12:40,
2015 Nov 08
1
idmap & migration to rfc2307
On 15:27:22 wrote Rowland Penny: > On 08/11/15 11:08, Jonathan Hunter wrote: > > Hi, > > > > On 8 November 2015 at 10:49, Michael Adam <obnox at samba.org> wrote: > >> This is how it works in rsync: > > [...] > > > >> I have always used rsync to replicate the sysvol. > >> And always used local xids. But being mainly a >
2008 Aug 04
1
Problem establishing interdomain trust
Hello group, I have 2 Samba PCDs w/ LDAP + winbind called FILESERVER and FUNDUS-SRV for the domains PROFICON and FUNDUS, respectively. In PROFICON I created a trust account for FUNDUS using net rpc trustdom add FUNDUS <passwd> -U proficon\\administrator which creates the LDAP entry: dn: uid=FUNDUS$,ou=Computers,dc=office,dc=proficon,dc=sk uid: FUNDUS$ sambaSID:
2015 Jun 11
2
idmap & migration to rfc2307
I *think* I may have encountered a bug, or a feature, in the idmap/winbind area. I have recently added rfc2307 attributes to my AD, and am in the process of switching over. This means that I still have (unintentionally) some files/directories/etc. around with old UIDs e.g. 3000007, rather than my rfc2307 specified UIDs. What I am seeing is that the SID2XID mapping is initially correct for a