Displaying 20 results from an estimated 5000 matches similar to: "Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates"
2018 Aug 21
3
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
> So you never read this:
> https://wiki.samba.org/index.php/Changing_the_DNS_Back_End_of_a_Samba_AD_DC
> Which means that you probably never ran the aptly named
> 'samba_upgradedns'Of course I ran this. Many times. I'm not stupid, Rowland. At least I can read:D
If I've seen that Bind doesn't work, I had to change backend to internal DNS.I carefully read and made
2018 Aug 22
1
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
Hello, guys.
First of all, I would like to thank you all for the time you spend with solving my problem. I appreciate that very much. Especially Rowland. You make great job every day here on lists.
Louis:
> ; TSIG error with server: tsig verify failure
>
> Mayabe update/setup your TSIG key.
>
2018 Aug 21
0
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
; TSIG error with server: tsig verify failure
Mayabe update/setup your TSIG key.
https://access.redhat.com/documentation/en-us/openshift_enterprise/2/html/puppet_deployment_guide/generating_a_bind_tsig_key
Im also wondering why RH is using : '--disable-isc-spnego'
Greetz,
Louis
> -----Oorspronkelijk bericht-----
> Van: samba [mailto:samba-bounces at lists.samba.org]
2018 Aug 21
1
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
> It should work ;-)
> Can you post your smb.conf and /etc/named.conf files
> Rowland
Hello Rowland. Of course I can:
cat /etc/samba/smb.conf
# Global parameters
[global]
workgroup = SVMETAL
realm = samdom.svmetal.cz
netbios name = DC01
server services = -dns
server role = active directory domain controller
idmap_ldb:use rfc2307 = yes
allow dns updates =
2018 Aug 24
0
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
I have one more interesting thing.
I copied DC01 to LAB environment. I demoted "dead" servers DC02X and
DC03X. After that I changed DNS backend to BIND.
Now samba_dnsupdate --verbose --all-names run as expected (without TSIG
errors).
Also, I have one problematic client joined to domain during
troubleshooting and it cannot do DNS update with Bind. So I also cloned
it to LAB like DC01.
2018 Aug 21
1
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
Hello everyone.
In our company we use Samba 4 for about 3 years (classic upgraded from
Samba 3.5 + LDAP to Sernet Samba 4.2). We used CentOS 6 for domain
controllers and with Bind bundled in this distro was impossible to use
dynamic DNS updates. And because I don't like using compiled SW on
production servers, we used Samba internal DNS, which worked well
(dynamic updates).
With one non
2018 Aug 24
0
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
Hello, everyone.
To recapitulate the results of our research:
1) I can confirm Samba 4.8 and Bind 9.9.4 (distribution package) on CentOS 7 (tested od 7.5) work even with dynamic DNS updates without any additional fixes or need to recompile Bind package.
I think it will work also on other RHEL 7 clones, so we should update Wiki page:
2018 Aug 22
0
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
I just tested samba_dnsupdate --verbose --all-names on our test domain.
Samba 4.8.2 from Tranquil IT on CentOS 7 and its Bind 9.9.4.
And it just work.
But with Internal DNS it threw ; TSIG error with server: tsig verify
failure and Failed nsupdate: 2, same as in production domain.
So you are right, Rowland, it's problem with Bind - Samba
communication. But I don't know, why in test
2018 Aug 22
0
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
> Yes, it is a failure, but a failure of the script, it shouldn't print
> all those Python errors, it should print something like 'No update
> required' for each attempted update and then 'No updates required'
Yes, I understand. samba_dnsupdate --verbose --all-names --use-samba-tool gave reasonable output. But samba_dnsupdate --verbose --all-names only just throws
;
2018 Aug 21
1
Samba 4.8.4 + BIND 9.9.4 - possibility of nonsecure DNS updates
On Tue, 21 Aug 2018 16:50:19 +0200
"L.P.H. van Belle via samba" <samba at lists.samba.org> wrote:
>
> ; TSIG error with server: tsig verify failure
>
> Mayabe update/setup your TSIG key.
> https://access.redhat.com/documentation/en-us/openshift_enterprise/2/html/puppet_deployment_guide/generating_a_bind_tsig_key
>
> Im also wondering why RH is using :
2017 Sep 05
3
BUILTIN\Administrators - failed to call wbcSidToUid: WBC_ERR_DOMAIN_NOT_FOUND
Thank you both, Rowland and Louis.
I'll try to answer you both and give you more info about our domain.
Generally:
In the past, we have Samba 3.5 NT4 domain on SLES server (designed ages
before, never upgraded). In 2015 I finally decided to migrate to Samba 4
AD. In those day it was 4.2. samba-tool ntacl sysvolcheck was ok, no
errors. AD worked (and working) as expected.
This summer, I
2017 Sep 04
2
BUILTIN\Administrators - failed to call wbcSidToUid: WBC_ERR_DOMAIN_NOT_FOUND
Hello everyone.
I'm trying to fix sysvol rights, because i see errors in output of
/usr/bin/samba-tool ntacl sysvolcheck
ERROR(<class 'samba.provision.ProvisioningError'>): uncaught exception
- ProvisioningError: DB ACL on GPO directory
/var/lib/samba/sysvol/samdom.svmetal.cz/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}
2020 Nov 20
2
winbind use default domain = yes doesn't work on Samba 4.13?
Yes.
In the first name, I wrote DOMAIN, but our real workgroup is SVMETAL,
as you cas see in smb.conf.
[global]
netbios name = fs0001
workgroup = SVMETAL
security = ADS
realm = SAMDOM.SVMETAL.CZ
dedicated keytab file = /etc/krb5.keytab
kerberos method = secrets and keytab
acl allow execute always = True
idmap config *:backend = tdb
idmap config *:range = 70001-99999
idmap config
2020 Oct 05
3
Upgrade to Samba 4.12 question
Hello, guys.
I?d like to upgrade our Samba 4.11 AD to 4.12. In release notes,
REMOVED FEATURES, I see this:
?Retiring DES encryption types in Kerberos.
------------------------------------------
With this release, support for DES encryption types has been removed
from
Samba, and setting DES_ONLY flag for an account will cause Kerberos
authentication to fail for that account (see RFC-6649).?
In
2018 Nov 06
0
dynamic update for reverse lookup zone denied - insufficient access rights
On Tue, 6 Nov 2018 11:24:43 +0100
Kacper Wirski via samba <samba at lists.samba.org> wrote:
> Hello,
>
> I'm struggling with an error for secure dynamic dns updates for
> reverse lookup zones.
>
> My environment:
>
> 2 Samba 4.8.4 DC's with BIND DLZ as dns backend, running on Centos
> 7.5. Samba was compiled from source with default heimdal kerberos
2018 May 11
0
Bind_DLZ krb errors @ startup.
I"m seeing this as well, after I updated my CentOS 7 hosts to the latest
release.
Something seems to have broken!
On 10 May 2018 at 17:54, Tom Diehl via samba <samba at lists.samba.org> wrote:
> Hi,
>
> I have 2 self compiled samba 4 DCs running 4.7.7 on Centos 7.5. One of them
> is operating normally. On the other DC bind will not start. I turned up
> debugging on
2018 May 10
2
Bind_DLZ krb errors @ startup.
Hi,
I have 2 self compiled samba 4 DCs running 4.7.7 on Centos 7.5. One of them
is operating normally. On the other DC bind will not start. I turned up
debugging on dlz_bind as per
https://wiki.samba.org/index.php/BIND9_DLZ_DNS_Back_End#Debugging_the_BIND9_DLZ_Module
When I try to start named I get the following in the logs:
May 10 13:19:44 vdc2 named[23773]: starting BIND
2013 Nov 26
0
samba_dlz: Failed to find our own NTDS
samba_dlz: Failed to find our own NTDS
Hi All!
Got a FreeBSD 9.2-RELEASE system with Samba4.0.8 Dc + AD. the BIND 9.9.4 as a DNS service .
I try to adjust of dynamic updating zones......for update DDHCP+DDNS
The Bind starting errores:
BIND 9.9.4 (Extended Support Version) <id:8f9657aa> built with '--disable-chroot' '--with-gssapi=/usr/local/gssapi'
2019 Jan 23
2
Odd behavior with "allow dns updates" (+dhcp_dyndns.sh)
All,
I'm hoping somebody could help explain this: with the Wiki dhcp_dyndns.sh
script and "allow dns updates = secure and nonsecure", I have the following
log snippet for a single machine:
Jan 22 13:37:35 DC1 dhcpd: Commit: IP: 172.250.250.19 DHCID:
> 1:be:a9:c5:4f:5f:cd Name: SERVER
> <stuff>
> Jan 22 13:37:35 DC1 named[20138]: samba_dlz: starting transaction on
2018 Nov 06
2
dynamic update for reverse lookup zone denied - insufficient access rights
Hello,
I'm struggling with an error for secure dynamic dns updates for reverse
lookup zones.
My environment:
2 Samba 4.8.4 DC's with BIND DLZ as dns backend, running on Centos 7.5.
Samba was compiled from source with default heimdal kerberos
(./configure --with-systemd --enable-gnutls) /I know now that
--with-systemd is not needed, but didn't now that the time of compilation/.