Re: [Samba] Settings ACLS from Windows via member server

2011-02-24 Thread Gaiseric Vandal
Once upon a time I had only samba 3.0.x servers.   They were in a samba
domain (with a samba PDC) and had a trust relationship with a windows 2003
AD domain. I had to use Winbind + idmap + nsswitch.conf so that users
from the trusted Windows AD domain could be allocated unix uid's and gid's.
I also used winbind so that member samba servers in the samba domain could
allocate unix uid's and gid's to the users from the samba PDC.  Within the
samba domain I found it simplest to move all the servers to an LDAP backend
for samba and unix accounts so that I could enforce a consistent UID-to-SID
mapping across all domain members.  As other users have noticed, it ended up
being simpler to promote key member servers to BDC's and remove any need for
winbind/idmap with in the samba domain.


However, I still (to the best of my knowledge) needed winbind and idmap to
allocate unix uid's and gid's to the domain.  In the smb.conf of the PDC  I
had  the following:
 
idmap config TRUSTEDDOMAIN:backend = ldap
idmap config TRUSTEDDOMAIN:readonly = no
idmap config TRUSTEDDOMAIN:default=no
idmap config TRUSTEDDOMAIN:ldap_base_dn =
ou=trusteddomain,ou=idmap,o=mydomain.com
idmap config TRUSTEDDOMAIN:ldap_user_dn = cn=Admin
idmap config TRUSTEDDOMAIN:ldap_url = ldap://ldap1.mydomain.com
idmap config TRUSTEDDOMAIN:range = 3-3

BDC's are similarily configured, except for the following line:

idmap config TRUSTEDDOMAIN:readonly=yes

With samba 3.0.x, idmap allocation worked somewhat-  id's were allocated but
would fail after the cache period expired.   With samba 3.4, idmap cache
issue was fixed but idmap did not allocate new uid's or gid's .


Based on your information, having upgrade to Samba 3.4,  I could have used
idmap_ad as the backend for the trusted Windows domain.Although I
believe I still need winbind and nsswitch.conf so that the Unix system can
use the uid's and gid's allocated to the trusted users?

Have I understood correctly?

PS.  I truly appreciate all the effort that the samba community puts into
samba.  And yes, I know it is free.However, man pages our good for
resolving specific implementation issues but they are not always ideal for
putting together a big picture of how all the parts are supposed to go
together.Updated Samba HowTo would really be appreciated.  To be fair,
MS Server-  even with all its documentation-  also has some serious gaps in
documentation and users often have to resort to user forum support as well.


Thanks.








-Original Message-
From: samba-boun...@lists.samba.org [mailto:samba-boun...@lists.samba.org]
On Behalf Of John H Terpstra
Sent: Tuesday, February 22, 2011 4:28 PM
To: samba@lists.samba.org
Subject: Re: [Samba] Settings ACLS from Windows via member server

On 02/23/2011 07:26 AM, John Drescher wrote:
 While subscribers keep explaining what they believe, and keep giving
 advice based on their belief system, rather than on well reasoned fact,
 confusion will continue to exist and complaints regarding Samba
 documentation will continue also.

 Are you willing to take a brave step to explain your reasoning?

 This was acquired by several weeks of testing on some version of samba
 with test PDC/BDC and a few windows clients. I am not sure of the
 exact version. It was probably 3.0.X. The clients were mostly 32 bit
 windows XP with a few 64 bit XP machines. Outside of this test domain
 we have used samba for around 10 years and we are still using the
 original domain which has grown from a single samba PDC to a PDC with
 several BDCs, multiple LDAP servers and at least 1/2 dozen domain
 member servers since the PDC and BDCs do not act as fileservers. I do
 not have the test setup to try again with more recent samba but I
 guess I could easily create servers under Virtual Machines.
 
 John

John,

The role of winbindd has morphed considerably since the time the HOWTO
document was written.  The most recent version of Samba covered by the
HOWTO is 3.0.20.  The HOWTO has languished since that time.

Winbind has been significantly rewritten in 3.2.x, and gain in 3.3.x,
and in 3.4.x.  It is no surprise that there is confusion regarding its
role, when it is needed, and how to configure it.

The best place to start (always) is the man pages that ship with the
version of Samba you are using.  The man pages that should be consulted
includes:
man winbindd
man idmap_nss
man idmap_ad
man idmap_hash
man idmap_rid
man idmap_adex

The man page for winbindd for samba-3.5.4 says:

quote
winbindd is a daemon that provides a number of services to the Name
service Switch capability found in most modern C libraries, to arbitrary
applications via PAM and ntlm_auth and to Samba itself.

Even if winbind is not used for nsswitch, it still provides a service to
smbd, ntlm_auth and the pam_winbind.so PAM module, by managing
connections to domain controllers. In this configuraiton the idmap uid
and idmap gid parameters

Re: [Samba] Settings ACLS from Windows via member server

2011-02-23 Thread Mark Dieterich

John,


I just posted a long reply to help you understand how the pieces fit
together. Yell out if you are still confused after reading my posting.


Thanks for the lengthy reply and also the suggestion to read man pages 
instead of doc, I didn't realize there was such a big difference.  The 
pieces are starting to fall into place, but I still have more questions. 
 I've become convinced that my member servers need to be running 
winbind, especially since I want the builtin accounts to work.  So...


My sense is that my member servers should NOT require the LDAP passdb 
backend settings.  Can someone confirm that only PDC/BDC should require 
this?


If so, I think my problem boils down to an issue resolving sids - uids. 
 Playing around with wbinfo on my member workstation, I see that I can 
resolve things like:


[root]# wbinfo -n mkd
S-1-5-21-2830206405-3223145701-231191277-7214 SID_USER (1)

[root]# wbinfo -n CS.BROWN.EDU\mkd
S-1-5-21-2830206405-3223145701-231191277-7214 SID_USER (1)

so far so good, but

[root]# wbinfo -S S-1-5-21-2830206405-3223145701-231191277-7214
Could not convert sid S-1-5-21-2830206405-3223145701-231191277-7214 to uid

This seemed to work for a short while after I added the passdb LDAP 
entries to my member server, but I think it was a red herring, as it 
stopped working and worked only for a select number of users.  So the 
question becomes, what am I missing that is preventing the PDC from 
resolving these for my member servers?  It's quite possible there is 
some sort of LDAP mapping that we are just missing... we've been running 
LDAP for a while prior to getting samba up and working, so we had to 
modify our existing schema and add in the LDAP necessary stuff, rather 
than let samba do it as we couldn't afford to loose the existing data. 
Is this where the idmap_ldap stuff comes in?  If so, can I just pre-seed 
these entries so all the information is there and run it in a read 
only ldap mode?


Thanks!

Mark
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-23 Thread Mark Dieterich

Associated question...

When I perform the following looking up on a member server:


[root]# wbinfo -S S-1-5-21-2830206405-3223145701-231191277-7214
Could not convert sid S-1-5-21-2830206405-3223145701-231191277-7214 to uid


When the result is not cached on the machine doing the lookup (which by 
the way I can't keep it from caching results even when I toss the -n 
flag on winbindd), I see traffic between the member server and PDC. 
Good.  The PDC has access to all the information in needs to resolve 
this query, it's all contained within a user/group entry in LDAP. 
However, I can see no evidence it is trying to resolve this.  If idmap 
is the portion responsible for this resolution, doesn't it make sense 
that I should be running idmap_ldap on the PDC?


I've been looking over the LDAP schema and it has the following:

objectclass ( 1.3.6.1.4.1.7165.2.2.8 NAME 'sambaIdmapEntry' SUP top 
AUXILIARY

DESC 'Mapping from a SID to an ID'
MUST ( sambaSID )
MAY ( uidNumber $ gidNumber ) )

which I do NOT have defined in our LDAP db.  I'm planning to just toss 
this in to see whether it helps, but still don't fully understand where 
the idmap_ldap stuff should be defined...


Sorry the pieces just aren't falling into place.  Hopefully, I'm not the 
only one struggling with this and the resulting discussions can someday 
help others.


Mark
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-23 Thread John H Terpstra
On 02/24/2011 06:18 AM, Mark Dieterich wrote:
 John,
 
 I just posted a long reply to help you understand how the pieces fit
 together. Yell out if you are still confused after reading my posting.
 
 Thanks for the lengthy reply and also the suggestion to read man pages
 instead of doc, I didn't realize there was such a big difference.  The
 pieces are starting to fall into place, but I still have more questions.
  I've become convinced that my member servers need to be running
 winbind, especially since I want the builtin accounts to work.  So...
 
 My sense is that my member servers should NOT require the LDAP passdb
 backend settings.  Can someone confirm that only PDC/BDC should require
 this?

Correct. Samba domain member servers do not require NSS-LDAP because
winbind can resolve SID to uid/gid.  The SID to uid.gid mapping can be
stored locally (which means the mappings will differ on each member
server in your domain), or the mappings can be stored in LDAP in the
idmap suffix specified in the smb.conf file on the domain member
itself (this enables the mappings to be shared across Samba domain
member servers).

On the other hand, some sites require the same uid/gid across domain
controllers (PDC/BDC) and domain member servers (dms). Where this is
required you CAN use NSS-LDAP to get globally consistent uid/gid values
for each user and then use idmap_ldap to handle SID to uid/gid mappings.
This configuration can get a little messy and my preference is to not
have any domain member server but rather make them all domain
controllers - that way all BDCs can share the exact same smb.conf
configuration for simpler admin.

 If so, I think my problem boils down to an issue resolving sids - uids.
  Playing around with wbinfo on my member workstation, I see that I can
 resolve things like:
 
 [root]# wbinfo -n mkd
 S-1-5-21-2830206405-3223145701-231191277-7214 SID_USER (1)
 
 [root]# wbinfo -n CS.BROWN.EDU\mkd
 S-1-5-21-2830206405-3223145701-231191277-7214 SID_USER (1)
 
 so far so good, but

Correct.

 [root]# wbinfo -S S-1-5-21-2830206405-3223145701-231191277-7214
 Could not convert sid S-1-5-21-2830206405-3223145701-231191277-7214 to uid
 
 This seemed to work for a short while after I added the passdb LDAP
 entries to my member server, but I think it was a red herring, as it
 stopped working and worked only for a select number of users.  So the
 question becomes, what am I missing that is preventing the PDC from
 resolving these for my member servers?  It's quite possible there is
 some sort of LDAP mapping that we are just missing... we've been running
 LDAP for a while prior to getting samba up and working, so we had to
 modify our existing schema and add in the LDAP necessary stuff, rather
 than let samba do it as we couldn't afford to loose the existing data.
 Is this where the idmap_ldap stuff comes in?  If so, can I just pre-seed
 these entries so all the information is there and run it in a read
 only ldap mode? 

The domain member server should be configured so it can write to the
LDAP directory so that it can assign (out of the idmap range provided in
the smb.conf file) the idmap entries.  These should populate into the
idmap suffix container.

Cheers,
John T.
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-23 Thread John H Terpstra
On 02/24/2011 06:49 AM, Mark Dieterich wrote:
 Associated question...
 
 When I perform the following looking up on a member server:
 
 [root]# wbinfo -S S-1-5-21-2830206405-3223145701-231191277-7214
 Could not convert sid S-1-5-21-2830206405-3223145701-231191277-7214 to
 uid
 
 When the result is not cached on the machine doing the lookup (which by
 the way I can't keep it from caching results even when I toss the -n
 flag on winbindd), I see traffic between the member server and PDC.
 Good.  The PDC has access to all the information in needs to resolve
 this query, it's all contained within a user/group entry in LDAP.
 However, I can see no evidence it is trying to resolve this.  If idmap
 is the portion responsible for this resolution, doesn't it make sense
 that I should be running idmap_ldap on the PDC?
 
 I've been looking over the LDAP schema and it has the following:
 
 objectclass ( 1.3.6.1.4.1.7165.2.2.8 NAME 'sambaIdmapEntry' SUP top
 AUXILIARY
 DESC 'Mapping from a SID to an ID'
 MUST ( sambaSID )
 MAY ( uidNumber $ gidNumber ) )
 
 which I do NOT have defined in our LDAP db.  I'm planning to just toss
 this in to see whether it helps, but still don't fully understand where
 the idmap_ldap stuff should be defined...
 
 Sorry the pieces just aren't falling into place.  Hopefully, I'm not the
 only one struggling with this and the resulting discussions can someday
 help others.
 
 Mark

As mentioned in my previous response, it is best to let smbd (via the
idmap handler) automatically create these entries as they are needed.
Using nss_ldap to share a common mapping across all domain member
servers is a good thing(tm).

- John T.
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-23 Thread Mark Dieterich

John,

Thanks again for the feedback.


On the other hand, some sites require the same uid/gid across domain
controllers (PDC/BDC) and domain member servers (dms). Where this is
required you CAN use NSS-LDAP to get globally consistent uid/gid values
for each user and then use idmap_ldap to handle SID to uid/gid mappings.
This configuration can get a little messy and my preference is to not
have any domain member server but rather make them all domain
controllers - that way all BDCs can share the exact same smb.conf
configuration for simpler admin.


This is exactly the situation we are in.  The vast majority of our 
workstations are linux/unix based, thus uids/gids are really at the guts 
of our environment.  The majority of our users work in both 
environments, so it's critical to have everything match.


Someone else (tms3) asked off list whether there was any reason to even 
both with member servers.  While it is certainly the case in a real 
Windows environment, I couldn't come up with a reason why this 
shouldn't/couldn't be done with a pure samba environment.  I just tested 
and things appear to work just fine in a test setup.  It seems 
wrong, but there is no reason why it can't work just fine with samba.



The domain member server should be configured so it can write to the
LDAP directory so that it can assign (out of the idmap range provided in
the smb.conf file) the idmap entries.  These should populate into the
idmap suffix container.


Of course the problem with this is users could end up with multiple 
gids/uids if we allowed the member servers to assign uids/gids.  I now 
understand why member servers would need to assign uids/gids in a real 
Windows domain and it's likely we could seed LDAP properly so that we 
could use them as member servers, but for now I think I'll likely go 
with the massive number of DCs route.


Thanks everyone, I think I've put together a better understanding of 
some of the samba/NT domain internals... probably just enough to cause 
some real trouble ;)


Mark
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread John Drescher
On Tue, Feb 22, 2011 at 11:04 AM, Mark Dieterich m...@cs.brown.edu wrote:
 I have a purely samba domain: samba PDC, BDC, and a collection of
 clustered member servers that provide CIFS access to our underlying file
 system.  Things are working fine, with the exception of users being able
 to set ACLS from Windows workstations.  When they try to do so, they can
 search for and properly find domain members, but when they try to apply
 the changes, the settings simply vanish from the Window!  We setup a
 test share from our PDC and users **can** set permissions properly on
 this share, so I would think we are looking at a configuration problem
 on our member servers.

 A couple generic questions about member servers:

 1) Our password backend is stored in LDAP.  Currently, we only have the
 LDAP configuration on the PDC and BDC samba setups.  My understanding is
 that all other machines, including samba member servers, join the domain
 and get their user information that way, correct?

 2) With a non-AD environment, should our samba member servers run
 winbind?  My understanding is not, but this could be part of the problem.

 I'm happy to provide any other information that may be of help, this
 problem is driving us nuts!


I believe the PDC/BDC does not need winbind but the member servers do.
Also you need idmap to work on the member servers. I believe I use a
nss backend for my idmap setup at work.

John
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread TAKAHASHI Motonobu
2011/2/23 Mark Dieterich m...@cs.brown.edu:
(snip)
 Things are working fine, with the exception of users being able
 to set ACLS from Windows workstations.
(snip)

 1) Our password backend is stored in LDAP.  Currently, we only have the
 LDAP configuration on the PDC and BDC samba setups.  My understanding is
 that all other machines, including samba member servers, join the domain
 and get their user information that way, correct?

Yes. Samba member servers does not need LDAP configurations.

 2) With a non-AD environment, should our samba member servers run
 winbind?  My understanding is not, but this could be part of the problem.

If you want to set ACLs of domain users and groups, you have to run winbindd
regardless of  AD env. or not.

# You can set ACLs of server local users and groups without running winbindd.

---
TAKAHASHI Motonobu mo...@samba.gr.jp
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread Mark Dieterich

 If you want to set ACLs of domain users and groups, you have to run winbindd
 regardless of  AD env. or not.
 
 # You can set ACLs of server local users and groups without running winbindd.

Hmm... I was working from:

http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/idmapper.html#id2604553

I have NSS setup to resolve via LDAP, which contains all of the
appropriate user/group information that samba should need.  The second
heading on this page, Winbind is not used; users and groups resolved
via NSS seemed to read as though I didn't actually need winbind.  My
concern here is that winbind appears to be necessary to create unix
users for non-existent Windows NT domain users.  This isn't our case...
ever user available in the Windows NT domain (managed by the samba
PDC/BDC) exist in LDAP and, therefore, unix as well.

Regardless... I enable winbind and the behavior is the same.  Once
winbind is started, I can query most users (wbinfo -u) and groups
(wbinfo -g).  For some reason, some groups don't show.  We have many
groups and users, so I haven't checked them all, but a spot check
suggests there are some missing.

Mark

-- 
--
I'd rather be burning carbohydrates than hydrocarbons
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread tms3

SNIP




2) With a non-AD environment, should our samba member servers run
winbind?  My understanding is not, but this could be part of the 
problem.


If you want to set ACLs of domain users and groups, you have to run 
winbindd

regardless of  AD env. or not.


I've done acls just using nss_ldap.




# You can set ACLs of server local users and groups without running 
winbindd.


---
TAKAHASHI Motonobu mo...@samba.gr.jp
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba


--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread tms3






X-SpamDetect-Info: - End ASpam results -




If you want to set ACLs of domain users and groups, you have to run 
winbindd

regardless of  AD env. or not.

# You can set ACLs of server local users and groups without running 
winbindd.


Hmm... I was working from:

http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/idmapper.html#id2604553

I have NSS setup to resolve via LDAP, which contains all of the
appropriate user/group information that samba should need.  The second
heading on this page, Winbind is not used; users and groups resolved
via NSS seemed to read as though I didn't actually need winbind.  My
concern here is that winbind appears to be necessary to create unix
users for non-existent Windows NT domain users.  This isn't our 
case...

ever user available in the Windows NT domain (managed by the samba
PDC/BDC) exist in LDAP and, therefore, unix as well.


Do you have acls set on the file system for the member servers? 
Winbind is for authentication purposes, not files system acls.




Regardless... I enable winbind and the behavior is the same.  Once
winbind is started, I can query most users (wbinfo -u) and groups
(wbinfo -g).  For some reason, some groups don't show.  We have many
groups and users, so I haven't checked them all, but a spot check
suggests there are some missing.

Mark

--
--
I'd rather be burning carbohydrates than hydrocarbons
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba


--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread John Drescher
 Do you have acls set on the file system for the member servers? Winbind is
 for authentication purposes, not files system acls.

Without winbind I did not get users names in the ACLs tab under
windwows? Do you get these?

John
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread Mark Dieterich
 I believe the PDC/BDC does not need winbind but the member servers do.
 Also you need idmap to work on the member servers. I believe I use a
 nss backend for my idmap setup at work.

So is idmap separate from winbind?  I thought the two went hand in hand.

This may be another clue as to what's going on.  When I bump up the log
level for acls, it reports back:

[2011/02/22 14:04:21.247390,  0]
smbd/posix_acls.c:1755(create_canon_ace_lists)
  create_canon_ace_lists: unable to map SID
S-1-5-21-2830206405-3223145701-231191277-62564 to uid or gid.

This was the result of an operation from a Windows client trying to
grant a user permissions to a folder.  The SID is correct for the user
in question, so obviously something is able to look up information from
LDAP.  However, some other piece can't seem to later resolve it.  Is
this of any help?

I should add... the above is without winbind running on the member server.

Thanks!

Mark

-- 
--
I'd rather be burning carbohydrates than hydrocarbons
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread tms3








Do you have acls set on the file system for the member servers? 
Winbind is

for authentication purposes, not files system acls.


Without winbind I did not get users names in the ACLs tab under
windwows? Do you get these?


I don't currently have any S3 servers to check...




John


--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread Mark Dieterich

 Do you have acls set on the file system for the member servers? Winbind
 is for authentication purposes, not files system acls. 

Yes, I can set acls on the linux side without problems.  In fact, I can
set acls from a Windows client on the same file system, if I connect to
the share via our PDC rather than a member server.  We can only support
this for testing, because the throughput of the PDC couldn't keep up
with clients.

Mark

-- 
--
I'd rather be burning carbohydrates than hydrocarbons
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread John Drescher
On Tue, Feb 22, 2011 at 2:23 PM,  t...@tms3.com wrote:



 Do you have acls set on the file system for the member servers? Winbind is
 for authentication purposes, not files system acls.

 Without winbind I did not get users names in the ACLs tab under
 windwows? Do you get these?

BTW, for this comment I mean when a Windows PC connects to a samba
domain member server the ACLs tab displays SIDs instead of usernames.
On the PDC/BDC winbind is not needed for the display of user names in
the ACLs tab. In either case winbind has nothing to do with the
functionality of the acls. They still would work without winbind but
you just cant tell who has access writes that is unless you memorized
the SIDs...

-- 
John M. Drescher
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread Mark Dieterich

 BTW, for this comment I mean when a Windows PC connects to a samba
 domain member server the ACLs tab displays SIDs instead of usernames.
 On the PDC/BDC winbind is not needed for the display of user names in
 the ACLs tab. In either case winbind has nothing to do with the
 functionality of the acls. They still would work without winbind but
 you just cant tell who has access writes that is unless you memorized
 the SIDs...

I wish I could even get to the point of seeing numeric SIDs ;)

I guess my next question would be... is there a way to setup winbind and
idmap in such a way that it is read only and doesn't try to dynamically
map anything?  We pre-seed our LDAP database and I don't really want
samba trying to dynamic change anything on us, especially when it comes
to user mappings.

Mark

-- 
--
I'd rather be burning carbohydrates than hydrocarbons
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread John H Terpstra
valuable if you would explain WHYOn 02/23/2011 03:46 AM, John Drescher
wrote:
 On Tue, Feb 22, 2011 at 11:04 AM, Mark Dieterich m...@cs.brown.edu wrote:
 I have a purely samba domain: samba PDC, BDC, and a collection of
 clustered member servers that provide CIFS access to our underlying file
 system.  Things are working fine, with the exception of users being able
 to set ACLS from Windows workstations.  When they try to do so, they can
 search for and properly find domain members, but when they try to apply
 the changes, the settings simply vanish from the Window!  We setup a
 test share from our PDC and users **can** set permissions properly on
 this share, so I would think we are looking at a configuration problem
 on our member servers.

 A couple generic questions about member servers:

 1) Our password backend is stored in LDAP.  Currently, we only have the
 LDAP configuration on the PDC and BDC samba setups.  My understanding is
 that all other machines, including samba member servers, join the domain
 and get their user information that way, correct?

 2) With a non-AD environment, should our samba member servers run
 winbind?  My understanding is not, but this could be part of the problem.

 I'm happy to provide any other information that may be of help, this
 problem is driving us nuts!

 
 I believe the PDC/BDC does not need winbind but the member servers do.
 Also you need idmap to work on the member servers. I believe I use a
 nss backend for my idmap setup at work.
 
 John

John,

It would help the list to understand WHY you believe that winbind is NOT
needed by the PDC/BDC, and WHY it is needed on member servers.

While subscribers keep explaining what they believe, and keep giving
advice based on their belief system, rather than on well reasoned fact,
confusion will continue to exist and complaints regarding Samba
documentation will continue also.

Are you willing to take a brave step to explain your reasoning?

Cheers,
John T.
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread tms3




John,

It would help the list to understand WHY you believe that winbind is 
NOT

needed by the PDC/BDC, and WHY it is needed on member servers.


Winbind, as the name suggests, does authentication for the unix 
server. Of course the manual has a very good write up of it:


Winbind unifies UNIX and Windows NT account management by  allowing a 
UNIX box to become a full member of an NT domain. Once  this is done, 
the UNIX box will see NT users and groups as if  they were 
“native” UNIX users and groups, allowing the NT domain  to be used 
in much the same manner that NIS+ is used within  UNIX-only 
environments...
Additionally, Winbind provides an authentication service that hooks 
into the PAM system  to provide authentication via an NT domain to any 
PAM-enabled  applications. This capability solves the problem of 
synchronizing  passwords between systems, since all passwords are 
stored in a single  location (on the domain controller).


http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/winbind.html




While subscribers keep explaining what they believe, and keep giving
advice based on their belief system, rather than on well reasoned 
fact,

confusion will continue to exist and complaints regarding Samba
documentation will continue also.

Are you willing to take a brave step to explain your reasoning?

Cheers,
John T.
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba


--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba

Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread John Drescher
 While subscribers keep explaining what they believe, and keep giving
 advice based on their belief system, rather than on well reasoned fact,
 confusion will continue to exist and complaints regarding Samba
 documentation will continue also.

 Are you willing to take a brave step to explain your reasoning?

This was acquired by several weeks of testing on some version of samba
with test PDC/BDC and a few windows clients. I am not sure of the
exact version. It was probably 3.0.X. The clients were mostly 32 bit
windows XP with a few 64 bit XP machines. Outside of this test domain
we have used samba for around 10 years and we are still using the
original domain which has grown from a single samba PDC to a PDC with
several BDCs, multiple LDAP servers and at least 1/2 dozen domain
member servers since the PDC and BDCs do not act as fileservers. I do
not have the test setup to try again with more recent samba but I
guess I could easily create servers under Virtual Machines.

John
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread John H Terpstra
On 02/23/2011 07:26 AM, John Drescher wrote:
 While subscribers keep explaining what they believe, and keep giving
 advice based on their belief system, rather than on well reasoned fact,
 confusion will continue to exist and complaints regarding Samba
 documentation will continue also.

 Are you willing to take a brave step to explain your reasoning?

 This was acquired by several weeks of testing on some version of samba
 with test PDC/BDC and a few windows clients. I am not sure of the
 exact version. It was probably 3.0.X. The clients were mostly 32 bit
 windows XP with a few 64 bit XP machines. Outside of this test domain
 we have used samba for around 10 years and we are still using the
 original domain which has grown from a single samba PDC to a PDC with
 several BDCs, multiple LDAP servers and at least 1/2 dozen domain
 member servers since the PDC and BDCs do not act as fileservers. I do
 not have the test setup to try again with more recent samba but I
 guess I could easily create servers under Virtual Machines.
 
 John

John,

The role of winbindd has morphed considerably since the time the HOWTO
document was written.  The most recent version of Samba covered by the
HOWTO is 3.0.20.  The HOWTO has languished since that time.

Winbind has been significantly rewritten in 3.2.x, and gain in 3.3.x,
and in 3.4.x.  It is no surprise that there is confusion regarding its
role, when it is needed, and how to configure it.

The best place to start (always) is the man pages that ship with the
version of Samba you are using.  The man pages that should be consulted
includes:
man winbindd
man idmap_nss
man idmap_ad
man idmap_hash
man idmap_rid
man idmap_adex

The man page for winbindd for samba-3.5.4 says:

quote
winbindd is a daemon that provides a number of services to the Name
service Switch capability found in most modern C libraries, to arbitrary
applications via PAM and ntlm_auth and to Samba itself.

Even if winbind is not used for nsswitch, it still provides a service to
smbd, ntlm_auth and the pam_winbind.so PAM module, by managing
connections to domain controllers. In this configuraiton the idmap uid
and idmap gid parameters are not required. (This is known as `netlogon
proxy only mode´.)

The Name Service Switch allows user and system information to be
obtained from different databases services such as NIS or DNS. The exact
behaviour can be configured through the /etc/nsswitch.conf file. Users
and groups are allocated as they are resolved to a range of user and
group ids specified by the administrator of the Samba system.

The service provided by winbindd is called `winbind´ and can be used to
resolve user and group information from a Windows NT server. The service
can also provide authentication services via an associated PAM module.

The pam_winbind module supports the auth, account and password
module-types. It should be noted that the account module simply performs
a getpwnam() to verify that the system can obtain a uid for the user, as
the domain controller has already performed access control. If the
libnss_winbind library has been correctly installed, or an alternate
source of names configured, this should always succeed.
unquote


The components that make up the winbindd services includes:
winbindd- the daemon that itself
pam_winbind.so  - the PAM library module
libnss_winbind.so   - the NSS library module
idmap_xxx.so- Samba modules

The Samba modules provide identity mapping/resolution capabilities - see
the man pages for details. The idmap_ad, idmap_adex, idmap_has, and
idmap_rid modules make use of winbindd.  The idmap_nss module can be
used with, or without winbind.

Samba CAN be used without winbind - that is a fact. Samba's smbd makes
calls to the getpwent() group of system calls whenever it needs to
obtain the uid/gid for a user of a group.  Where NSS has been configured
to resolve user and group information via LDAP, a system call to
getpwent() will search the libnss libraries in the order they are
specified in the nsswitch.conf file.  For example: Consider where
nsswitch.conf is configured with the following:
passwd:  files compat ldap hesoid winbind

A call to getpwnam() will invoke the libraries specified in the order
given until a match is found. These libraries are used in the order
(from left to right) specified in the nsswitch.conf file:
libnss_files.so
libnss_compat.so
libnss_ldap.so
libnss_hesoid.so
libnss_winbind.so


Winbindd is necessary when Samba is a domain member server in a Windows
domain environment where the domain controllers are running MS Windows
(NT later) so that it can obtain user and group credentials from the
Microsoft domain controllers. In this role, Samba will need to resolve
the Windows user and group SID to a uid/gid tuple. This is handled
through a combination of winbindd and the 

Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread Mark Dieterich
So... I could use some help explaining this.  I finally decided to just
start playing and ended up doing the following:

1) Added passdb backend entries on my member servers pointing to LDAP,
similar to what the PDC/BDC configurations have.

This addition, when viewed from Windows suddenly started displaying
SIDs.  Going back a few emails in this thread someone else brought up
they were seeing this behavior without winbind running.

2) Started up winbind

and everything appears to be working now.  So my question is, why?  I
still don't quite understand how all these pieces fit together.  Is it
wrong to have the passdb backend on a member server?

Thanks!

Mark

-- 
--
I'd rather be burning carbohydrates than hydrocarbons
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] Settings ACLS from Windows via member server

2011-02-22 Thread John H Terpstra
On 02/23/2011 08:23 AM, Mark Dieterich wrote:
 So... I could use some help explaining this.  I finally decided to just
 start playing and ended up doing the following:
 
 1) Added passdb backend entries on my member servers pointing to LDAP,
 similar to what the PDC/BDC configurations have.
 
 This addition, when viewed from Windows suddenly started displaying
 SIDs.  Going back a few emails in this thread someone else brought up
 they were seeing this behavior without winbind running.
 
 2) Started up winbind
 
 and everything appears to be working now.  So my question is, why?  I
 still don't quite understand how all these pieces fit together.  Is it
 wrong to have the passdb backend on a member server?
 
 Thanks!
 
 Markto 
 

Mark,

I just posted a long reply to help you understand how the pieces fit
together. Yell out if you are still confused after reading my posting.

Cheers,
John T.
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba