On 2/22/2013 15:22, Peter Beck wrote:
Dustin C. Hatch <[email protected]> quatschte am Fri, Feb 22, 2013 at 
12:31:05PM -0600:
On 2/22/2013 11:13, Sérgio Henrique wrote:
I guess the comunication beetween MS AD and Samba4 is by kerberos, i have
copied the /opt/samba/private/krb5.conf to /etc after joined to domain

I have installed a windows server at 2003 forest level as PDC then
installed samba4.0.3
join domain but everytime i am getting problems with forest and domain dns
zones...

I have the same issue. I've tried countless times to add a Samba DC
to my (test) AD environment, but every time, it fails to add and
outbound connection for the DomainDnsZones and ForestDnsZones
directory partitions. In addition, the Samba server is not listed as
a name server for either the root zone or the _msdcs zone.

yes, the basic setup is like it's written down in the Wiki pages at
https://wiki.samba.org/index.php/Samba4/HOWTO/Join_a_domain_as_a_DC.

This is the document I've been following to try to get this working as well.

I get kerberos tickets without any issue. I think the domain forest
level is also important to raise up to 2003 (I can remember I also had
issues earlier and then I've just raised the domain operation level).
The forest operation level was something I've changed later...
After raising up the operation level I always reboot the Windows Dc. Not
sure if that is really needed...

I for one will in future raise both levels up to 2003 _before_ I start
deploying samba.

My samba server works perfectly fine for all AD DC roles (including Kerberos) except DNS. In my real and test environments, the forest and domain functional levels are 2008 R2.

my krb.conf looks like this:

[libdefaults]
default_realm = ADLAB.LOCAL
dns_lookup_realm = true
dns_lookup_kdc = true

Same as mine, as defined in the wiki article.

and this is my smb.conf, not sure if allow dns updates is need or not.

# Global parameters
[global]
        server role = active directory domain controller
        workgroup = ADLAB
        realm = adlab.local
        netbios name = LAB07
        passdb backend = samba4
I don't see `samba4` as an option for `passdb backend` in smb.conf(5). Values listed are "smbpasswd" "tdbsam" (default) and "ldapsam".

        dcerpc endpoint servers = epmapper, wkssvc, rpcecho, samr, netlogon,
        lsarpc, spoolss, drsuapi, dssetup, unixinfo, browser, eventlog6,
        backupkey, dnsserver, winreg, srvsvc
I don't see a list of values for this property in smb.conf(5); where did you find this setting?

        server services = rpc, nbt, wrepl, ldap, cldap, kdc, drepl, winbind, 
ntp_signd, kcc, dnsupdate, smb, dns
According to smb.conf(5), this is the default value for `server services`, less s3fs and plus smb. I don't think either of these would matter in this case.

        dns recursive queries = yes
This only affects DNS queries for names outside the AD domain, so its value wouldn't matter

        allow dns updates = true
The default value, according to smb.conf(5) is `secure only`, the same as the Windows default, which should be fine.

         dns forwarder = 8.8.8.8
Again, this only affects queries outside the AD domain, so it shouldn't matter. I do have it set, though.


        [netlogon]
        path = /var/lib/samba/sysvol/adlab.local/scripts
        read only = No

        [sysvol]
        path = /var/lib/samba/sysvol
        read only = No

These are the same for me as well.

The samba server is not configured as nameserver by default. you can at
it either on windows if you right click the zone and add it to the
"nameserver" tab or if you use samba-tool dns add. I prefer the second
one. to add it for example to the zone "adlab.local" you can use
samba-tool dns add <winserver> adlab.local adlab.local NS 
<sambaserver>.adlab.local
this will add an ns record for the zone "adlab.local" which looks like
the existing entry for the windows dns "(same as parent folder)" and it
will also automatically add the sambaserver into the "nameserver" tab of
the zone.

Yes, that adds the NS records to the domain, and I've tried that. Since the Samba server is a DNS server, this should be done automatically anyway. In any case, it doesn't help.

after adding these records / checking other dns records (_ldap._tcp,
_kerberos etc) I've just did

These also should be added automatically if the Samba server is to be a DNS server, but adding them manually doesn't help either.

samba-tool drs replicate <samba-dc> <win-dc> dc=adlab,dc=local --local
This works fine

samba-tool drs replicate <samba-dc> <win-dc> 
dc=forestdnszones,dc=adlab,dc=local --local
samba-tool drs replicate <samba-dc> <win-dc> 
dc=domaindnszones,dc=adlab,dc=local --local
These both fail because there is no outbound connection from the Samba server to the Windows server for these directory partitions. Adding them manually with repadmin works temporarily, but the KCC eventually removes them.


if everything is well (which was the case each time I've tested it), i
moved the fsmo roles with samba-tool fsmo transfer --role=....

Since Samba 4.0.3, which has a fix for the timeout problem, I have had no trouble moving the FSMO roles around. Regardless, until the DomainDnsZones and ForestDnsZones are replicated correctly, I cannot demote the Windows DC.

But as I mentioned before - I am also still testing at the moment ;-)
hope that helps

Thanks for the information. This seems to be a problem for a number of people, so hopefully we'll get to the bottom of it soon

Regards
Peter


--
♫Dustin
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba

Reply via email to