John Connett wrote:
>On Wed, 2008-03-05 at 14:15 -0800, Natalie Li wrote:
>
>
>>John Connett wrote:
>>
>>
>>
>>>On Fri, 2008-02-29 at 07:10 -0800, Ross wrote:
>>>
>>>
>>>
>>>
>>>>Update: It appears it's not even that, testing the CIFS server on another
>>>>machine, it looks like you just need a reboot after setting it up. So the
>>>>whole process to enable CIFS on a brand new b82 box is:
>>>>
>>>>- Install snv_82. Configure kerberos, networking and DNC when prompted.
>>>>- Once installed, start the CIFS server and join the domain:
>>>> # svcadm enable -r smb/server
>>>> # smbadm join -u domain-user domain-name
>>>>- Reboot server
>>>>
>>>>And then just create zfs filesystems and set sharesmb=on as needed.
>>>>
>>>>
>>>>
>>>>
>>>I have been trying to join a snv 83a SPARC system to a domain, so far
>>>without success.
>>>
>>>
>>>
>>Did you see any error messages in the syslog after you ran the smbadm
>>join CLI? Is it a multiple domain controllers environment?
>>
>>
>>
>>> The system had a text mode initial install just
>>>preserving the slice that holds a zpool. Networking and kerberos were
>>>configured during the install. What is DNC?
>>>
>>>
>>>
>>>
>>>
>>I'm not so sure if the domain join failure has anything to do with the
>>installation. As long as you configure your DNS and Kerberos similar to
>>what mentioned in the Admin Guide prior to joining your system to a
>>domain, you should be good to go. The "How to Configure an AD Client"
>>section of the CIFS admin guide might be helpful.
>>
>>http://docs.sun.com/app/docs/doc/820-2429/configureadtask?a=view
>>
>>Note that both 'ads_domain' and 'ads_enable' properties are obsolete as
>>of snv_81. Thus, you don't have to set those via sharectl.
>>
>>
>>
>>>Do I need to modify the kerberos configuration post-installation?
>>>
>>>
>>>
>>Yes. See above.
>>
>>
>
>Here's what I have:
>======================================================================
>bash-3.2# cat /etc/krb5/krb5.conf
>[libdefaults]
> default_realm = uk.example.net
>
It should be "default_realm = UK.EXAMPLE.NET"
>
>[realms]
> uk.example.net = {
>
It should be "UK.EXAMPLE.NET = {"
>
> kdc = uknt-70.uk.example.net
> kdc = uknt-72.uk.example.net
> admin_server = uknt-70.uk.example.net
> kpasswd_server = uknt-70.uk.example.net
> kpasswd_protocol = SET_CHANGE
> }
>
>[domain_realm]
> .uk..net = UK.EXAMPLE.NET
>
>[logging]
> default = FILE:/var/krb5/kdc.log
> kdc = FILE:/var/krb5/kdc.log
> kdc_rotate = {
>
># How often to rotate kdc.log. Logs will get rotated no more
># often than the period, and less often if the KDC is not used#
>frequently.
>
> period = 1d
>
>
># how many versions of kdc.log to keep around (kdc.log.0,
>kdc.log.1, ...)
> version = 10
>}
>[appdefaults]
> kinit = {
> renewable = true
> forwardable= true
> }
>
>
Kerberos realm should be composed of all upper-case letters. However,
this is not the root cause of your problem.
>bash-3.2#
>======================================================================
>
>Here's what happened on the command line:
>
>bash-3.2# smbadm join -u Administrator uk.example.net
>Enter domain password:
>Joining 'uk.example.net' ... this may take a minute ...
>failed to join domain 'uk.example.net' (LOGON_FAILURE)
>bash-3.2#
>
>I found the following in /var/adm/messages:
>
>Mar 5 22:48:04 tequila idmap[314]: [ID 840489 daemon.error] idmapd:
>Couldn't open and SASL bind LDAP connections to any domain controllers;
>discovery of some items will fail
>Mar 5 22:48:05 tequila last message repeated 3 times
>Mar 5 22:50:44 tequila smbd[401]: [ID 871254 daemon.error] smbd: failed
>joining uk.example.net (LOGON_FAILURE)
>
>
Please disable the packet signing on your domain controller and try
again. There is an open bug for this issue which only happens on sparc
system.
{See CR 6615461).
Natalie
>
>
>>> How
>>>about NTP, LDAP or PAM?
>>>
>>>
>>>
>>>
>>I'm not sure what the question here is. You can always use NTP for time
>>synchronization. You won't be able to acquire a Kerberos TGT ticket if
>>your time is off by 5 minutes or so.
>>
>>
>
>I wasn't sure whether the 'smbadm join' does additional configuration in
>the background. There are several Domain Controllers and I configured
>NTP to use the time servers on two of them. Synchronization should be
>well within 5 minutes.
>
>
>
>>>How does it compare with Scott Lowe's "Solaris 10-AD Integration"?
>>>
>>>http://blog.scottlowe.org/2007/04/25/solaris-10-ad-integration-version-3/
>>>
>>>I'm guessing that the LDAP configuration would need to be modified to
>>>specify the account in Active Directory that will be used to bind to
>>>Active Directory for LDAP queries.
>>>
>>>
>>>
>>>
>>Yes. During domain join, a security context to an LDAP service on the
>>specified AD server is established for the user account (i.e. the
>>username argument of the smbadm join CLI). After the system is joined
>>to a domain, the computer account will be used to bind to AD for any
>>subsequent LDAP requests.
>>
>>
>>
>>>Does idmap support using LDAP queries to extract UNIX attributes from
>>>Active Directory?
>>>
>>>
>>>
>>>
>>I'll let the Winchester folks to answer any idmap related questions.
>>
>>Natalie
>>
>>
>>
>>>Thanks in anticipation
>>>--
>>>John Connett
>>>
>>>_______________________________________________
>>>storage-discuss mailing list
>>>[email protected]
>>>http://mail.opensolaris.org/mailman/listinfo/storage-discuss
>>>
>>>
>>>
>>>
>
>
>
_______________________________________________
storage-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/storage-discuss