Displaying 20 results from an estimated 10000 matches similar to: "samba dns"
2016 Apr 06
5
samba dns
Would prefer to continue to use my NSD/Unbound installs for most DNS
(if not all) services. NSD is the authoritative server for the domain,
and Unbound is the cache/resolver that the clients connect to. I'd
like to not disturb this setup but I'll need the SRV records so that
AD works. If the SRV records are fixed I suppose I could host them
using NSD, then Samba wouldn't have to be
2019 Jul 10
5
Samba4 Internal DNS and pfSense DNS Resolver
I have implemented a small local network. I use pfSense as Firewall and Gateway, I have all my servers inside a DMZ, except the domain controllers that are on the LAN.
LAN: 10.10.20.0/24
DMZ: 10.10.30.0/24
DC1: 10.10.20.2
DC2: 10.10.20.3
pfSense:
LAN: 10.10.20.1
WAN: x.x.x.x
DMZ: 10.10.30.1
In my local network, I have 2 domain controllers with SAMBA4, I would like to find
2016 Apr 13
1
samba dns
On Wed, Apr 13, 2016 at 10:29 AM, Sketch <smblist at rednsx.org> wrote:
> My understanding of Unbound is that designed as a caching nameserver, not an
> authoratative nameserver. It's supposed to serve DNS to clients from
> another server, such as BIND or Samba's internal DNS server. Pointing it to
> your domain's authoratative Samba/BIND9_DLZ DNS servers seems like
2016 Mar 10
2
CVE-2016-1285 & CVE-2016-1286
On 03/10/2016 07:13 AM, Michael H wrote:
> On 10/03/16 14:47, Leonardo Oliveira Ortiz wrote:
>> Hello.
>>
>> I think Centos are affected, right?
>>
>> Some update from Centos?
>> _______________________________________________
>> CentOS mailing list
>> CentOS at centos.org
>> https://lists.centos.org/mailman/listinfo/centos
>>
>
2016 Apr 13
2
samba dns
On Thu, Apr 7, 2016 at 11:00 AM, Sketch <smblist at rednsx.org> wrote:
> My guess would be not much, because BIND9_DLZ exists and (mostly) gives you
> the best of both worlds. If you want to use bind with MS DNS servers, then
> you have to go that route, but it's not necessary with Samba 4 and
> BIND9_DLZ.
That's clear but I was thinking more of the analogous
2016 Apr 06
3
samba dns
On Wed, 6 Apr 2016, Rowland penny wrote:
> Your DC needs to be authoritative for your AD domain, this is *not* a Samba
> thing, it is an AD thing. What you can do, is to do what is recommended, make
> your AD domain a subdomain of your domain i.e. if your domain name is
> 'domain.tld', use 'internal.domain.tld' for your AD domain.
>
> Your AD DC will then be
2016 Mar 10
2
RES: CVE-2016-1285 & CVE-2016-1286
As soon as RHEL does.
On 03/10/2016 02:13 PM, Leonardo Oliveira Ortiz wrote:
> CentOS will provide an update to fix it?
>
> ________________________________________
> De: centos-bounces at centos.org [centos-bounces at centos.org] em nome de Alice Wonder [alice at domblogger.net]
> Enviado: quinta-feira, 10 de mar?o de 2016 15:31
> Para: centos at centos.org
> Assunto: Re:
2013 Jul 10
4
nsd can't bind udp socket: Address already in use
Greetings,
Unbound 1.4.20
OS X 10.8.4 - Server
NSD 3.2.15
I have installed 'unbound' and it works nicely on my client (test
purpose) - Client is MacBook Air.
I have installed NSD (will be in replacement of BIND) on said client.
All is good but when i try to start NSD
Error --> nsd can't bind udp socket: address already in use.
Everything is configured to bind to 127.0.0.1.
#
2015 Dec 28
2
Authentication to Secondary Domain Controller initially fails when PDC is offline
On 12/24/2015 11:32 AM, Rowland penny wrote:
> On 24/12/15 15:32, mathias dufresne wrote:
>> And to get mentioned entries list I used:
>> "samba_dnsupdate --verbose --all-names | grep Default-First-Site-name"
>>
>> This list 8 DNS records related to Default Site.
>>
>> Next was to change Default-First... by the name of another AD Site
>> (sed
2012 Jun 08
2
Best practices to switch from BIND to NSD
Hi,
I'm a sys admin and currently working for a french hosting company. We
provide DNS services to our customers and at the moment we are using BIND
on Debian servers. BIND is a good software but we don't need a recursing
DNS for our public DNS, and we needed better security than what BIND provides.
So I made the suggestion to replace BIND by another DNS software.
NSD appears to be the
2012 Jul 18
4
Unsecured zone transfers and open resolvers
Hello,
My question is not related to NSD in particular, but I have seen here on
the list a lot of people that work for TLDs and other Registrars and
Registry operators I thought it would be a good place to ask this
question. It is about DNS though, not completely off topic :).
I have encountered in my DNS studies a few name servers that let you
transfer zones they are authoritative for. The
2015 Dec 28
1
Authentication to Secondary Domain Controller initially fails when PDC is offline
On 12/28/2015 9:21 AM, Rowland penny wrote:
> On 28/12/15 14:06, James wrote:
>> On 12/24/2015 11:32 AM, Rowland penny wrote:
>>> On 24/12/15 15:32, mathias dufresne wrote:
>>>> And to get mentioned entries list I used:
>>>> "samba_dnsupdate --verbose --all-names | grep Default-First-Site-name"
>>>>
>>>> This list 8 DNS
2016 Apr 12
1
samba dns
On 2016.04.06, at 4:13 PM, Rowland penny <rpenny at samba.org> wrote:
>
> On 06/04/16 21:58, Sonic wrote:
>> Would prefer to continue to use my NSD/Unbound installs for most DNS
>> (if not all) services. NSD is the authoritative server for the domain,
>> and Unbound is the cache/resolver that the clients connect to. I'd
>> like to not disturb this setup but
2025 Apr 18
1
NSD 4.12.0rc1 pre-release
Am 17.04.25 um 09:58 schrieb Yorgos Thessalonikefs via nsd-users:
> Hi Andreas,
>
> On 16/04/2025 23:17, A. Schulze via nsd-users wrote:
>> 4. any chance, that https://github.com/NLnetLabs/nsd/pull/437 find it's way in 4.12?
>> ??? a similar change in active in unbound-1.23.0rc2 and works well there.
> This change was heading to 4.12 but we pulled it because it was
2019 Jun 20
4
DLZ Backend DNS Hosed
I've been working on this problem for a few hours. Here are some updates:
Many of the domains I listed are duplicates of domains managed by other DNS servers on my network. There was no point in having them in Samba AD, so I deleted the zones in Windows DNS Manager and created slaves in my named.conf.local folder, so that they'd pull the records from my authoritative BIND DNS server,
2025 Apr 17
1
NSD 4.12.0rc1 pre-release
Hi Andreas,
On 16/04/2025 23:17, A. Schulze via nsd-users wrote:
> 4. any chance, that https://github.com/NLnetLabs/nsd/pull/437 find it's
> way in 4.12?
> ?? a similar change in active in unbound-1.23.0rc2 and works well there.
This change was heading to 4.12 but we pulled it because it was breaking
software that implicitly sends the SOA probe over UDP.
Maybe a more lenient
2019 Jun 20
2
DLZ Backend DNS Hosed
Nice shell script,?Louis. Here are the results:
Collected config ?--- 2019-06-20-12:46 -----------
Hostname: umbriel
DNS Domain: samdom.mycompany.net
FQDN: umbriel.samdom.mycompany.net
ipaddress: 192.168.3.203?
-----------
Samba is running as an AD DC
-----------
? ? ? ?Checking file: /etc/os-release
NAME="Ubuntu"
VERSION="16.04.6 LTS (Xenial Xerus)"
ID=ubuntu
2025 Apr 22
1
NSD 4.12.0rc1 pre-release
Hi Andreas,
On 18/04/2025 23:28, A. Schulze via nsd-users wrote:
> I added #437 to my build. It works, somehow...
>
> I cannot imagine a scenario for any (resolver?) software to implicitly
> send a SOA probe over UDP to port 853 / not port 53
> Could you clarify this, please?
Unbound is an example when configured with auth zones, it will send the
SOA prove over UDP before
2019 Aug 12
3
dns_tkey_gssnegotiate: TKEY is unacceptable
I installed a third DC today. Replication works find, but as systemctl status samba-ad-dc showed an error w.r.t. dnsupdate I was running samba_dnsupdate ?verbose.
Below is the output. It looks like there are some missing DNS records, but what are potential causes of this error: dns_tkey_gssnegotiate: TKEY is unacceptable
I already checked what?s listed @
2016 Mar 10
3
CVE-2016-1285 & CVE-2016-1286
Hello.
I think Centos are affected, right?
Some update from Centos?