Displaying 20 results from an estimated 4000 matches similar to: "Samba 4.3.13 logon oddity on Solaris 10"
2018 Jun 19
2
Samba 4.3.13 logon oddity on Solaris 10
On Tue, 19 Jun 2018 21:08:46 +0200
Bernd Markgraf <bernd.markgraf at med.ovgu.de> wrote:
> On Tue, 2018-06-19 at 12:44 +0100, Rowland Penny via samba wrote:
> > > > Why are you using LDAP for authentication on a Unix domain
> > > > member ?
> > >
> > > Because it just works and is straightforward to set up and things
> > > like
2018 Jul 02
2
Samba 4.3.13 logon oddity on Solaris 10
On Mon, 02 Jul 2018 12:38:54 +0200
Bernd Markgraf <bernd.markgraf at med.ovgu.de> wrote:
> On Mon, 2018-07-02 at 11:30 +0100, Rowland Penny via samba wrote:
>
> > Provided that your users have a uidNumber attribute containing a
> > unique number inside the '10000-999999' range AND Domain Users has a
> > gidNumber attribute containing a number inside the same
2018 Jun 20
2
Samba 4.3.13 logon oddity on Solaris 10
On Wed, 20 Jun 2018 15:01:12 +0200
Bernd Markgraf <bernd.markgraf at med.ovgu.de> wrote:
>
> > > On the OS level everything works flawlessly (without using
> > > winbind).
> > > Login upon first try, kerberos ticket properly issued, uid/gid set
> > > to the numbers provided from the LDAP (Samba DC) backend.
> > Well, yes it would work to allow
2018 Jun 22
2
Samba 4.3.13 logon oddity on Solaris 10
On Fri, 22 Jun 2018 13:38:14 +0200
Bernd Markgraf <bernd.markgraf at med.ovgu.de> wrote:
> On Wed, 2018-06-20 at 14:20 +0100, Rowland Penny via samba wrote:
> > On Wed, 20 Jun 2018 15:01:12 +0200
> > Bernd Markgraf <bernd.markgraf at med.ovgu.de> wrote:
> > > I would like to see that behaviour on my machine too ;-)
> >
> > Then just do what I do,
2018 Jun 19
0
Samba 4.3.13 logon oddity on Solaris 10
On Tue, 2018-06-19 at 12:44 +0100, Rowland Penny via samba wrote:
> > > Why are you using LDAP for authentication on a Unix domain member
> > > ?
> >
> > Because it just works and is straightforward to set up and things
> > like ldaplist&co work. Until I resolved the open issue I'll just
> > leave things as they are.
> Yes, but its not working,
2018 Jul 02
2
Samba 4.3.13 logon oddity on Solaris 10
On Mon, 02 Jul 2018 12:04:10 +0200
Bernd Markgraf <bernd.markgraf at med.ovgu.de> wrote:
> Do you agree that this is a valid smb.conf that should work:
> [global]
> security = ADS
> encrypt passwords = yes
> workgroup = MD-DZNE
> realm = MAGDEBURG.DZNE.DS
>
> log file = /opt/samba4/var/log/%m.log
> log level = 1
>
2018 Jun 22
0
Samba 4.3.13 logon oddity on Solaris 10
On Wed, 2018-06-20 at 14:20 +0100, Rowland Penny via samba wrote:
> On Wed, 20 Jun 2018 15:01:12 +0200
> Bernd Markgraf <bernd.markgraf at med.ovgu.de> wrote:
> > I would like to see that behaviour on my machine too ;-)
>
> Then just do what I do, use only winbind.
That's what I have now.
pre-winbind (ldap in nsswitch.conf)
root.niihau ~ # wbinfo --uid-info=10058
2018 Jun 20
0
Samba 4.3.13 logon oddity on Solaris 10
> > On the OS level everything works flawlessly (without using
> > winbind).
> > Login upon first try, kerberos ticket properly issued, uid/gid set
> > to the numbers provided from the LDAP (Samba DC) backend.
> Well, yes it would work to allow login to the computer, it is
> bypassing Samba and going direct to the info stored in AD.
That part works just as intended.
2011 Dec 23
2
samba 4 and nfs permissions
Hi
We have AD users created with either samba-tool user add steve2 or using
the windows AD frontend from a windows box.
Users are created with home directories under /home/CACTUS
On a win 7 client all works fine. Users can authenticate against the
CACTUS domain and files are created with the correct uid:gid
We joined an Ubuntu client to the domain using likewise. /home from the
server is
2018 Jul 02
0
Samba 4.3.13 logon oddity on Solaris 10
Do you agree that this is a valid smb.conf that should work:
[global]
security = ADS
encrypt passwords = yes
workgroup = MD-DZNE
realm = MAGDEBURG.DZNE.DS
log file = /opt/samba4/var/log/%m.log
log level = 1
idmap config *:backend = tdb
idmap config *:range = 3000-7999
idmap config MD-DZNE:backend = ad
idmap config
2008 Mar 20
9
Xen Store error : out of memory
Hi,
I''m running snv84 on a SunFire x2200M2, 2 dualcore opterons, 8GB ram, 2 mirror sata disks (zfs).
I tried to install both Ubuntu 7.1 Desktop and Fedora 8 into a HVM domU but failed everytime.
The VNC-Server for the domU dies, but the domain still consumes CPU time, disks go idle after a while (zpool iostat or iostat show zero I/O). The domUs booted up fine, the installer started,
2018 Jul 02
0
Samba 4.3.13 logon oddity on Solaris 10
On Mon, 2018-07-02 at 11:30 +0100, Rowland Penny via samba wrote:
> Provided that your users have a uidNumber attribute containing a
> unique number inside the '10000-999999' range AND Domain Users has a
> gidNumber attribute containing a number inside the same range, then,
> yes it is a valid smb.conf. These attributes are not added
> automatically, you must add them
2013 Jul 02
0
Installing NUT on Solaris
On Mon, 2013-07-01 at 15:42 -0800, John Thurston wrote:
> On 7/1/2013 2:55 PM, Charles Lepple wrote:
> > On Jul 1, 2013, at 12:47 PM, John Thurston wrote:
> >
> >> I'm running Solaris 10 on a dozen SPARC boxes. I'd like to explore NUT for use with our snmp UPS, but I'm unable to complete the configure/make/install process.
> >>
> >> Can anyone
2013 Jul 01
3
Installing NUT on Solaris
On 7/1/2013 2:55 PM, Charles Lepple wrote:
> On Jul 1, 2013, at 12:47 PM, John Thurston wrote:
>
>> I'm running Solaris 10 on a dozen SPARC boxes. I'd like to explore NUT for use with our snmp UPS, but I'm unable to complete the configure/make/install process.
>>
>> Can anyone share a how-to for solaris?
>
> Here's some general NUT-on-Solaris
2013 Jul 05
1
Installing NUT on Solaris
On 7/1/2013 8:27 PM, Bernd Markgraf wrote:
> On Mon, 2013-07-01 at 15:42 -0800, John Thurston wrote:
>> On 7/1/2013 2:55 PM, Charles Lepple wrote:
>>> On Jul 1, 2013, at 12:47 PM, John Thurston wrote:
>>>
>>>> I'm running Solaris 10 on a dozen SPARC boxes. I'd like to explore NUT for use with our snmp UPS, but I'm unable to complete the
2012 Jan 11
6
Samba 4 kerberos and kinit
Hi
After starting Samba 4, before anyone can do anything, Administrator has
to do a kinit to get a new ticket. This creates a cache /tmp/krb5cc_0
with an expiry time.
I've created a host principal and put it into the keytab:
samba-tool spn add host someuser
samba-tool domain exportkeytab /etc/krb5.keytab --principal=host/HH3.SITE
How can I keep Samba 4 up without having to get a new
2013 Oct 26
2
lost with AD auth
Hi all,
Well, I'm completely lost with AD authentification ...
server is :
Ubuntu 12.04.3 3.8.0-32-generic #47~precise1-Ubuntu
Samba 4.0.10 installed (and upgraded) via git, setup as unique Active
Directory Domain Controller
( -> how to upgrade to 4.1 via git ?? )
I 'just' would like that the local services (let's say only dovecot and
postfix) can query AD to authentifiate
2014 Oct 05
1
What is wrong with my nslcd configuration?
I can't get my domain users presented to my local machine with getent
passwd and the wiki
https://wiki.samba.org/index.php/Local_user_management_and_authentication/nslcd
doesn't give me any steps troubleshoot this issue. My best guess it that
I configured the user account incorrectly or I configured nslcd
incorrectly. I can't exactly see what is the problem.
I get these messages from
2012 Jul 12
2
nslcd service - "Client not found in Kerberos database"
Hi,
I am trying to configure the nslcd service on an Ubuntu client for kerberos
authentication against samba4. My /etc/nslcd.conf contains the following:
uid nslcd
gid nslcd
uri ldapi:///cofil01.mydomain.net
base dc=mydomain,dc=net
sasl_mech GSSAPI
krb5_ccname FILE:/tmp/host.tkt
I have added the host principal "host/ubuntu-test.mydomain.net @
MYDOMAIN.NET" to /etc/krb5.keytab on both
2015 Dec 29
2
moving LDAP from one domain to another
Hello,
I am moving LDAP from one domain to another
We have moved off of a.wustl.edu network to b.school.edu network.
I have searched
vi /etc/nslcd.conf
vi /etc/openldap/ldap.conf
and removed all referances to "a"
I restarted
/etc/init.d/nscd restart
this is redhat 6.7, and my ldap server is now ldap.b.wustl.edu:389
a.school.edu to b.school.edu
I keep getting messages