1
0
mirror of https://github.com/samba-team/samba.git synced 2025-08-03 04:22:09 +03:00

Address some inaccracies (such as BDC solutions that might have

worked, but Samba never got the code to support), clarify some things
that pedents have raised on the lists/in bugs, and explain about the
'ldap replication sleep' hack.

Andrew Bartlett
(This used to be commit dd9bd7b42e)
This commit is contained in:
Andrew Bartlett
2005-01-02 21:36:44 +00:00
committed by Gerald W. Carter
parent 542eac1bca
commit a967ddf3de
2 changed files with 24 additions and 19 deletions

View File

@ -104,10 +104,8 @@ let's consider each possible option and look at the pros and cons for each possi
<entry><para>tdbsam</para></entry> <entry><para>tdbsam</para></entry>
<entry><para>tdbsam + <command>net rpc vampire</command></para></entry> <entry><para>tdbsam + <command>net rpc vampire</command></para></entry>
<entry><para> <entry><para>
Does not work with Samba-3.0.0; may be implemented in a later release. The downside of this solution Does not work with Samba-3.0; as Samba does not implement the
is that an external process will control account database integrity. This solution may appeal to sites server-side protocols required.
that wish to avoid the complexity of LDAP. The <command>net rpc vampire</command> is used to
synchronize domain accounts from the PDC to the BDC.
</para></entry> </para></entry>
</row> </row>
<row> <row>
@ -115,8 +113,9 @@ let's consider each possible option and look at the pros and cons for each possi
<entry><para>tdbsam + <command>rsync</command></para></entry> <entry><para>tdbsam + <command>rsync</command></para></entry>
<entry><para> <entry><para>
Do not use this configuration. Do not use this configuration.
Does not work because the TDB files are live and data may not have been flushed to disk. Does not work because the TDB files are live and data may not
Use <command>rsync</command> to synchronize the TDB database files from the PDC to the BDC. have been flushed to disk. Furthermore, this will cause
domain trust breakdown.
</para></entry> </para></entry>
</row> </row>
<row> <row>
@ -124,9 +123,9 @@ let's consider each possible option and look at the pros and cons for each possi
<entry><para>smbpasswd file</para></entry> <entry><para>smbpasswd file</para></entry>
<entry><para> <entry><para>
Do not use this configuration. Do not use this configuration.
Not an elegant solution due to the delays in synchronization. Not an elegant solution due to the delays in synchronization
Use <command>rsync</command> to synchronize the smbpasswd file from the PDC to the BDC. and also suffers
Can be made to work using a <command>cron</command> job to synchronize data from the PDC to the BDC. from the issue of domain trust breakdown.
</para></entry> </para></entry>
</row> </row>
</tbody> </tbody>
@ -308,12 +307,19 @@ certificate is recreated with a correct hostname.
</para> </para>
<para> <para>
Do not install a Samba PDC on a OpenLDAP slave server. Joining client machines to the domain For preference, do not install a Samba PDC on a OpenLDAP slave server. Joining client machines to the domain
will fail in this configuration because the change to the machine account in the LDAP tree will fail in this configuration because the change to the machine account in the LDAP tree
must take place on the master LDAP server. This is not replicated rapidly enough to the slave must take place on the master LDAP server. This is not replicated rapidly enough to the slave
server that the PDC queries. It therfore gives an error message on the client machine about server that the PDC queries. It therefore gives an error message on the client machine about
not being able to set up account credentials. The machine account is created on the LDAP server not being able to set up account credentials. The machine account is created on the LDAP server
but the password fields will be empty. but the password fields will be empty. Unfortunately, some sites are
unable to avoid such configurations, and these sites should review the
<smbconfoption><name>ldap replication
sleep</name></smbconfoption> parameter, intended to slow down Samba sufficiently
for the replication to catch up. This is a kludge, and one that the
administrator must manually duplicate in any scripts (such as the
<smbconfoption><name>add machine script</name></smbconfoption>) that
they use.
</para> </para>
<para> <para>

View File

@ -51,8 +51,12 @@ as follows:
<varlistentry><term>Plain Text</term> <varlistentry><term>Plain Text</term>
<listitem> <listitem>
<para> <para>
This option uses nothing but the UNIX/Linux <filename>/etc/passwd</filename> This isn't really a backend at all, but is
style backend. On systems that have Pluggable Authentication Modules (PAM) listed here for simplicity. Samba can be
configured to pass plaintext authentication
requests to the traditional UNIX/Linux
<filename>/etc/passwd</filename> and <filename>/etc/shadow</filename>
style subsystems. On systems that have Pluggable Authentication Modules (PAM)
support, all PAM modules are supported. The behavior is just as it was with support, all PAM modules are supported. The behavior is just as it was with
Samba-2.2.x, and the protocol limitations imposed by MS Windows clients Samba-2.2.x, and the protocol limitations imposed by MS Windows clients
apply likewise. Please refer to <link linkend="passdbtech">Technical Information</link> for more information apply likewise. Please refer to <link linkend="passdbtech">Technical Information</link> for more information
@ -1718,11 +1722,6 @@ access to attrs=SambaLMPassword,SambaNTPassword
for example, <smbconfoption><name>auth methods</name><value>guest sam</value></smbconfoption>. for example, <smbconfoption><name>auth methods</name><value>guest sam</value></smbconfoption>.
</para> </para>
<para>
This is the exact opposite of the requirement for the <smbconfoption><name>passdb backend</name></smbconfoption>
option, where it must be the <emphasis>LAST</emphasis> parameter on the line.
</para>
</sect2> </sect2>
</sect1> </sect1>