Package: adcli

Version: 0.9.1-1

Hi,

> While using Debian Testing the following package:
>
> We are unable to join Domain (Samba4 AD 4.13.13)
> realm join --membership-software=adcli -U sergio domain.local -vvv
> * Resolving: _ldap._tcp.domain.local
> * PerformingLDAPDSE lookup on: 192.168.1.253
> * PerformingLDAPDSE lookup on: 192.168.2.253
> * Successfully discovered: domain.local
> Passwordfor sergiom:
> * Unconditionally checking packages
> * Resolving required packages
> * LANG=C /usr/sbin/adcli join --verbose --domain domain.local --domain-realm 
> DOMAIN.LOCAL --domain-controller 192.168.1.253 --login-type user --login-user 
> sergio --stdin-password
> * Using domain name: domain.local
> * Calculated computer account name from fqdn: TESTSRV
> * Using domain realm: domain.local
> * SendingNetLogon ping to domain controller: 192.168.1.253
> * ReceivedNetLogon info from: srv01.domain.local
> * Wrote out krb5.conf snippet to 
> /var/cache/realmd/adcli-krb5-XXXXX/krb5.d/adcli-krb5-conf-xxxxx
> * Authenticated as user: [email protected]
> * UsingGSS-SPNEGOforSASL bind
> ! Couldn't authenticate to active directory: SASL(-4): no mechanism 
> available: No worthy mechs found
> adcli: couldn't connect to domain.local domain: Couldn't authenticate to 
> active directory: SASL(-4): no mechanism available: No worthy mechs found
> ! Insufficient permissions to join the domain
> realm: Couldn't join realm: Insufficient permissions to join the domain
>
> If use adcli 0.9.0 from bullseye then all work ok:
> realm join --membership-software=adcli -U sergio domain.local -vvv
>
> * Resolving: _ldap._tcp.domain.local
> * PerformingLDAPDSE lookup on: 192.168.1.253
> * PerformingLDAPDSE lookup on: 192.168.2.253
> * Successfully discovered: domain.local
> Passwordfor sergiom:
> * Unconditionally checking packages
> * Resolving required packages
> * LANG=C /usr/sbin/adcli join --verbose --domain domain.local --domain-realm 
> DOMAIN.LOCAL --domain-controller 192.168.1.253 --login-type user --login-user 
> sergio --stdin-password
> * Using domain name: domain.local
> * Calculated computer account name from fqdn: TESTSRV
> * Using domain realm: domain.local
> * SendingNetLogon ping to domain controller: 192.168.1.253
> * ReceivedNetLogon info from: srv01.domain.local
> * Wrote out krb5.conf snippet to 
> /var/cache/realmd/adcli-krb5-XXXXX/krb5.d/adcli-krb5-conf-XXXXX
> * Authenticated as user: [email protected]
> * Looked up short domain name: DOMAIN
> * Looked up domain SID: S-1-5-21-...
> * Using fully qualified name: testsrv
> * Using domain name: domain.local
> * Using computer account name: TESTSRV
> * Using domain realm: domain.local
> * Calculated computer account name from fqdn: TESTSRV
> * Generated120 character computer password
> * Using keytab: FILE:/etc/krb5.keytab
> * Found computer account forTESTSRV$ at: 
> CN=TESTSRV,CN=Computers,DC=domain,DC=local
> * SendingNetLogon ping to domain controller: 192.168.1.253
> * ReceivedNetLogon info from: srv01.domain.local
> * Set computer password
> * Retrieved kvno '3'for computer account in directory: 
> CN=TESTSRV,CN=Computers,DC=domain,DC=local
> * Checking host/TESTSRV
> * Added host/TESTSRV
> * CheckingRestrictedKrbHost/TESTSRV
> * AddedRestrictedKrbHost/TESTSRV
> * Discovered which keytab salt to use
> * Added the entries to the keytab: [email protected]: 
> FILE:/etc/krb5.keytab
> * Added the entries to the keytab: host/[email protected]: 
> FILE:/etc/krb5.keytab
> * Added the entries to the keytab: RestrictedKrbHost/[email protected]: 
> FILE:/etc/krb5.keytab
> ! Failed to update Kerberos configuration, not fatal, please check manually: 
> Setting attribute standard::type not supported
> * /usr/sbin/update-rc.d sssd enable
> * /usr/sbin/service sssd restart
> * Successfully enrolled machine in realm
>
> Additional information:
> Domain SAMBA4 ADDC configuration:
> (Debian Stable latest)
> # Global parameters
> [global]
> netbios name = SRV01
> realm = DOMAIN.LOCAL
> workgroup = DOMAIN
> dns forwarder = 1.1.1.1
> server role = active directory domain controller
> idmap config domain_name:unix_nss_info = yes
> idmap_ldb:use rfc2307 = yes
> template shell = /bin/bash
> template homedir = /home/DOMAIN/%U
> winbind use default domain = true
> winbind offline logon = false
> winbind nss info = rfc2307
> winbind enum users = yes
> winbind enum groups = yes
> dsdb:schema update allowed = yes
> tls enabled = yes
> tls keyfile = tls/ADk.pem
> tls certfile = tls/ADc.pem
> tls cafile = tls/CA.pem
> usershare allow guests = no
> acl allow execute always = yes
> printcap name = /dev/null
> load printers = no
> printing = bsd
> ntlm auth = ntlmv2-only
> tls priority = SECURE256:+SECURE192:-VERS-ALL:+VERS-TLS1.2:+VERS-TLS1.3
> restrict anonymous = 2
> allow dns updates = secure only
> [netlogon]
> path = /var/lib/samba/sysvol/domain.local/scripts
> vfs objects = full_audit
> read only = No
>
> [sysvol]
> path = /var/lib/samba/sysvol
> vfs objects = full_audit
> read only = No
> case sensitive = no
> vfs objects = dfs_samba4 acl_xattr
> browseable = no
>
> kerberos client:
> (client with latest Debian testing)
> [logging]
> default = FILE:/var/log/krb5libs.log
> kdc = FILE:/var/log/krb5kdc.log
> admin_server = FILE:/var/log/kadmind.log
>
> [libdefaults]
> default_realm = DOMAIN.LOCAL
> rdns = false
> dns_lookup_realm = true
> dns_lookup_kdc = true
> default_ccache_name = KEYRING:persistent:%{uid}
> ticket_lifetime = 24h
> forwardable = yes
> ignore_acceptor_hostname = true
> udp_preference_limit = 0
>
> [realms]
> DOMAIN.LOCAL = {
> kdc = srv01.domain.local
> kdc = srv02.domain.local
> }
>
> [domain_realm]
> .DOMAIN.LOCAL = DOMAIN.LOCAL
> DOMAIN.LOCAL = DOMAIN.LOCAL
>
> domain.local = DOMAIN.LOCAL
> .domain.local = DOMAIN.LOCAL
> [appdefaults]
> pam = {
> debug = false
> ticket_lifetime = 24h
> renew_lifetime = 7d
> forwardable = true
> krb4_convert = false
> }
>
> Thank you in advance.
>
> Happy new Year!
> Best Regards,
> Sérgio Machado

Reply via email to