Pagina 1 di 1

samba4 come ad member file server ubuntu 14.04 LTS

Inviato: lunedì 2 marzo 2015, 11:06
da fieraf
ciao a tutti
ho configurato un file server con samba4 come ad member di un samba4 AD
ho provato a seguire la guida del wiki di samba ma cuando parla di PAM c`é qualcosa que no va.
nello speccifico nella distribuzione di ubuntu 14.04 lts non esiste il file auth... ma ci sono i file common-account/passwd etc.., e non esiste la cartella lib64/security
Ho provato a modificare i file di pam ma dopo succede che non posso piú accedere alla macchina nemmeno in locale
Ho saltato questa parte e sembra che tutto funziona
Qualcuno ha provato a configrare pam con winbind?
a cosa server precisamente?
Inoltre é necessario installare winbind ? perche sembra que samba4 abbia uno suo
ho usato la seguente conf di samba

Codice: Seleziona tutto

[global]

## Browsing/Identification ###

# Change this to the workgroup/NT-domain name your Samba server will part of

   netbios name = admember
   workgroup = ESIGMAN
   security = ADS
   realm = ESIGMAN.LOCAL
   dedicated keytab file = /etc/krb5.keytab
   kerberos method = secrets and keytab
     domain master = no
    local master = no
    preferred master = no
    socket options = TCP_NODELAY IPTOS_LOWDELAY SO_RCVBUF=131072 SO_SNDBUF=131072
    use sendfile = true


   idmap config *:backend = tdb
   idmap config *:range =50000-60000
   idmap config ESIGMAN:backend = ad
   idmap config ESIGMAN:schema_mode = rfc2307
   idmap config ESIGMAN:range = 10000-29999

    winbind separator = +
    winbind nss info = rfc2307
    winbind trusted domains only = no
    winbind use default domain = yes
    winbind enum users  = no
    winbind enum groups = no
    winbind refresh tickets = Yes
    winbind nested groups = yes
    username map = /etc/samba/user.map
    #password server = 10.5.5.1

     client use spnego = yes
    client ntlmv2 auth = yes
    encrypt passwords = yes
    restrict anonymous = 2

   log file = /var/log/samba/log.%m
   max log size = 1000
  syslog = 0
   server role = member server
e di kerberos seguendo una guida di ubunut( adesso non ricordo il link)

Codice: Seleziona tutto

[libdefaults]
        default_realm = ESIGMAN.LOCAL
        dns_lookup_realm = true
       dns_lookup_kdc = true

# The following krb5.conf variables are only for MIT Kerberos.
        krb4_config = /etc/krb.conf
        krb4_realms = /etc/krb.realms
        kdc_timesync = 1
        ccache_type = 4
        forwardable = true
        proxiable = true

# The following encryption type specification will be used by MIT Kerberos
# if uncommented.  In general, the defaults in the MIT Kerberos code are
# correct and overriding these specifications only serves to disable new
# encryption types as they are added, creating interoperability problems.
#
# Thie only time when you might need to uncomment these lines and change
# the enctypes is if you have local software that will break on ticket
# caches containing ticket encryption types it doesn't know about (such as
# old versions of Sun Java).

#       default_tgs_enctypes = des3-hmac-sha1
#       default_tkt_enctypes = des3-hmac-sha1
#       permitted_enctypes = des3-hmac-sha1

# The following libdefaults parameters are only for Heimdal Kerberos.
        v4_instance_resolve = false
        v4_name_convert = {
                host = {
                        rcmd = host
                        ftp = ftp
                }
                plain = {
                        something = something-else
                }
        }
        fcc-mit-ticketflags = true

[realms]
        ATHENA.MIT.EDU = {
                kdc = kerberos.mit.edu:88
                kdc = kerberos-1.mit.edu:88
                kdc = kerberos-2.mit.edu:88
                admin_server = kerberos.mit.edu
                default_domain = mit.edu
        }
        MEDIA-LAB.MIT.EDU = {
                kdc = kerberos.media.mit.edu
                admin_server = kerberos.media.mit.edu
        }
        ZONE.MIT.EDU = {
                kdc = casio.mit.edu
                kdc = seiko.mit.edu
                admin_server = casio.mit.edu
        }
        MOOF.MIT.EDU = {
                kdc = three-headed-dogcow.mit.edu:88
                kdc = three-headed-dogcow-1.mit.edu:88
                admin_server = three-headed-dogcow.mit.edu
        }
        CSAIL.MIT.EDU = {
                kdc = kerberos-1.csail.mit.edu
                kdc = kerberos-2.csail.mit.edu
                admin_server = kerberos.csail.mit.edu
                default_domain = csail.mit.edu
                krb524_server = krb524.csail.mit.edu
        }
        IHTFP.ORG = {
                kdc = kerberos.ihtfp.org
                admin_server = kerberos.ihtfp.org
        }
        GNU.ORG = {
                kdc = kerberos.gnu.org
                kdc = kerberos-2.gnu.org
                kdc = kerberos-3.gnu.org
                admin_server = kerberos.gnu.org
        }
        1TS.ORG = {
                kdc = kerberos.1ts.org
                admin_server = kerberos.1ts.org
        }
        GRATUITOUS.ORG = {
                kdc = kerberos.gratuitous.org
                admin_server = kerberos.gratuitous.org
        }
        DOOMCOM.ORG = {
                kdc = kerberos.doomcom.org
                admin_server = kerberos.doomcom.org
        }
        ANDREW.CMU.EDU = {
                kdc = kerberos.andrew.cmu.edu
                kdc = kerberos2.andrew.cmu.edu
                kdc = kerberos3.andrew.cmu.edu
                admin_server = kerberos.andrew.cmu.edu
                default_domain = andrew.cmu.edu
        }
        CS.CMU.EDU = {
                kdc = kerberos.cs.cmu.edu
                kdc = kerberos-2.srv.cs.cmu.edu
                admin_server = kerberos.cs.cmu.edu
        }
        DEMENTIA.ORG = {
                kdc = kerberos.dementix.org
                kdc = kerberos2.dementix.org
                admin_server = kerberos.dementix.org
        }
        stanford.edu = {
                kdc = krb5auth1.stanford.edu
              kdc = krb5auth2.stanford.edu
                kdc = krb5auth3.stanford.edu
                master_kdc = krb5auth1.stanford.edu
                admin_server = krb5-admin.stanford.edu
                default_domain = stanford.edu
        }
        UTORONTO.CA = {
                kdc = kerberos1.utoronto.ca
                kdc = kerberos2.utoronto.ca
                kdc = kerberos3.utoronto.ca
                admin_server = kerberos1.utoronto.ca
                default_domain = utoronto.ca
        }

ESIGMAN.LOCAL = {
kdc = servidor.esigman.local # kdcserver is full dns name of realm server same as domain server , or ip address can be also A.B.C.D
default_domain = esigman.local
}

[domain_realm]
        .mit.edu = ATHENA.MIT.EDU
        mit.edu = ATHENA.MIT.EDU
        .media.mit.edu = MEDIA-LAB.MIT.EDU
        media.mit.edu = MEDIA-LAB.MIT.EDU
        .csail.mit.edu = CSAIL.MIT.EDU
        csail.mit.edu = CSAIL.MIT.EDU
        .whoi.edu = ATHENA.MIT.EDU
        whoi.edu = ATHENA.MIT.EDU
        .stanford.edu = stanford.edu
        .slac.stanford.edu = SLAC.STANFORD.EDU
        .toronto.edu = UTORONTO.CA
        .utoronto.ca = UTORONTO.CA
        .esigman.local = ESIGMAN.LOCAL
        esigman.local = ESIGMAN.LOCAL
[login]
        krb4_convert = true
        krb4_get_tickets = false                                           
sono corrette?