mirror of
https://github.com/samba-team/samba.git
synced 2025-01-15 23:24:37 +03:00
More Edits from Vance Lankhaar.
(This used to be commit 35ce3638a3999bf9343db801cc3fab6a9d292d64)
This commit is contained in:
parent
5d609bc9ff
commit
ad581e4b6a
@ -17,7 +17,7 @@
|
||||
<formalpara><title><emphasis>The Essence of Learning:</emphasis></title>
|
||||
<para>
|
||||
There are many who approach MS Windows networking with incredible misconceptions.
|
||||
That's OK, because it give the rest of us plenty of opportunity to be of assistance.
|
||||
That's OK, because it gives the rest of us plenty of opportunity to be of assistance.
|
||||
Those who really want help would be well advised to become familiar with information
|
||||
that is already available.
|
||||
</para>
|
||||
@ -50,7 +50,7 @@ networking problems:
|
||||
</simplelist>
|
||||
|
||||
<para>
|
||||
Do not be put off, on the surface of it MS Windows networking seems so simple that any fool
|
||||
Do not be put off; on the surface of it MS Windows networking seems so simple that any fool
|
||||
can do it. In fact, it is not a good idea to set up an MS Windows network with
|
||||
inadequate training and preparation. But let's get our first indelible principle out of the
|
||||
way: <emphasis>It is perfectly OK to make mistakes!</emphasis> In the right place and at
|
||||
@ -60,7 +60,7 @@ burden on an organisation.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
Where is the right place to make mistakes? Only out of harms' way! If you are going to
|
||||
Where is the right place to make mistakes? Only out of harm's way! If you are going to
|
||||
make mistakes, then please do this on a test network, away from users and in such a way as
|
||||
to not inflict pain on others. Do your learning on a test network.
|
||||
</para>
|
||||
@ -73,7 +73,7 @@ to not inflict pain on others. Do your learning on a test network.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
In a word, <emphasis>Single Sign On</emphasis>, or SSO for short. This to many is the holy
|
||||
In a word, <emphasis>Single Sign On</emphasis>, or SSO for short. To many, this is the holy
|
||||
grail of MS Windows NT and beyond networking. SSO allows users in a well designed network
|
||||
to log onto any workstation that is a member of the domain that their user account is in
|
||||
(or in a domain that has an appropriate trust relationship with the domain they are visiting)
|
||||
@ -90,8 +90,8 @@ The benefits of Domain security are fully available to those sites that deploy a
|
||||
Network clients of an MS Windows Domain security environment must be Domain members to be
|
||||
able to gain access to the advanced features provided. Domain membership involves more than just
|
||||
setting the workgroup name to the Domain name. It requires the creation of a Domain trust account
|
||||
for the workstation (called a machine account). Please refer to the chapter on Domain Membership
|
||||
for more information.
|
||||
for the workstation (called a machine account). Please refer to the chapter on
|
||||
<link linkend="domain-member">Domain Membership</link> for more information.
|
||||
</para></note>
|
||||
|
||||
<para>
|
||||
@ -112,14 +112,14 @@ The following functionalities are new to the Samba-3 release:
|
||||
|
||||
<listitem><para>
|
||||
Introduces replaceable and multiple user account (authentication)
|
||||
back ends. In the case where the back end is placed in an LDAP database
|
||||
back ends. In the case where the back end is placed in an LDAP database,
|
||||
Samba-3 confers the benefits of a back end that can be distributed, replicated,
|
||||
and highly scalable.
|
||||
and is highly scalable.
|
||||
</para></listitem>
|
||||
|
||||
<listitem><para>
|
||||
Implements full Unicode support. This simplifies cross locale internationalisation
|
||||
support. It also opens up the use of protocols that samba-2.2.x had but could not use due
|
||||
support. It also opens up the use of protocols that Samba-2.2.x had but could not use due
|
||||
to the need to fully support Unicode.
|
||||
</para></listitem>
|
||||
</itemizedlist>
|
||||
@ -140,7 +140,7 @@ The following functionalities are NOT provided by Samba-3:
|
||||
Active Directory Domain Control ability that is at this time
|
||||
purely experimental <emphasis>AND</emphasis> that is certain
|
||||
to change as it becomes a fully supported feature some time
|
||||
during the samba-3 (or later) life cycle.
|
||||
during the Samba-3 (or later) life cycle.
|
||||
</para></listitem>
|
||||
</itemizedlist>
|
||||
|
||||
@ -149,17 +149,17 @@ Windows 9x / Me / XP Home clients are not true members of a domain for reasons o
|
||||
in this chapter. The protocol for support of Windows 9x / Me style network (domain) logons
|
||||
is completely different from NT4 / Win2k type domain logons and has been officially supported
|
||||
for some time. These clients use the old LanMan Network Logon facilities that are supported
|
||||
in Samba since approximately the samba-1.9.15 series.
|
||||
in Samba since approximately the Samba-1.9.15 series.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
Samba-3 has an implementation of group mapping between Windows NT groups
|
||||
and Unix groups (this is really quite complicated to explain in a short space) this is
|
||||
discussed more fully in a chapter dedicated to this topic..
|
||||
and Unix groups (this is really quite complicated to explain in a short space). This is
|
||||
discussed more fully in the <link linkend="groupmapping">Group Mapping</link> chapter.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
A Samba-3, like an MS Windows NT4 PDC or a Windows 200x Active Directory, needs to store
|
||||
Samba-3, like an MS Windows NT4 PDC or a Windows 200x Active Directory, needs to store
|
||||
user and machine trust account information in a suitable backend data store. With Samba-3
|
||||
there can be multiple back-ends for this including:
|
||||
</para>
|
||||
@ -178,7 +178,7 @@ there can be multiple back-ends for this including:
|
||||
<listitem><para>
|
||||
<emphasis>tdbsam</emphasis> - a binary database backend that will be
|
||||
stored in the <emphasis>private</emphasis> directory in a file called
|
||||
<emphasis>passwd.tdb</emphasis>. The key benefit of this binary format
|
||||
<emphasis>passdb.tdb</emphasis>. The key benefit of this binary format
|
||||
file is that it can store binary objects that can not be accomodated
|
||||
in the traditional plain text smbpasswd file. These permit the extended
|
||||
account controls that MS Windows NT4 and later also have.
|
||||
@ -196,7 +196,7 @@ there can be multiple back-ends for this including:
|
||||
<listitem><para>
|
||||
<emphasis>ldapsam_compat</emphasis> - An LDAP back-end that maintains backwards
|
||||
compatibility with the behaviour of samba-2.2.x. You should use this in the process
|
||||
of mirgrating from samba-2.2.x to samba-3 if you do not want to rebuild your LDAP
|
||||
of migrating from samba-2.2.x to samba-3 if you do not want to rebuild your LDAP
|
||||
database.
|
||||
</para></listitem>
|
||||
</itemizedlist>
|
||||
@ -222,8 +222,8 @@ to the default configuration.
|
||||
<title>Basics of Domain Control</title>
|
||||
|
||||
<para>
|
||||
Over the years public perceptions of what Domain Control really is has taken on an
|
||||
almost mystical nature. Before we branch into a brief overview of Domain Control
|
||||
Over the years, public perceptions of what Domain Control really is has taken on an
|
||||
almost mystical nature. Before we branch into a brief overview of Domain Control,
|
||||
there are three basic types of domain controllers:
|
||||
</para>
|
||||
|
||||
@ -240,15 +240,15 @@ there are three basic types of domain controllers:
|
||||
The <emphasis>Primary Domain Controller</emphasis> or PDC plays an important role in the MS
|
||||
Windows NT4 and Windows 200x Domain Control architecture, but not in the manner that so many
|
||||
expect. There is folk lore that dictates that because of it's role in the MS Windows
|
||||
network that the PDC should be the most powerful and most capable machine in the network.
|
||||
network, the PDC should be the most powerful and most capable machine in the network.
|
||||
As strange as it may seem to say this here, good over all network performance dictates that
|
||||
the entire infrastructure needs to be balanced. It is advisable to invest more in the Backup
|
||||
Domain Controllers and Stand-Alone (or Domain Member) servers than in the PDC.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
In the case of MS Windows NT4 style domaines it is the PDC seeds the Domain Control database,
|
||||
a part of the Windows registry called the SAM (Security Accounts Management). It plays a key
|
||||
In the case of MS Windows NT4 style domains, it is the PDC seeds the Domain Control database,
|
||||
a part of the Windows registry called the SAM (Security Account Manager). It plays a key
|
||||
part in NT4 type domain user authentication and in synchronisation of the domain authentication
|
||||
database with Backup Domain Controllers.
|
||||
</para>
|
||||
@ -264,7 +264,7 @@ LDAP based user and machine account back end.
|
||||
<para>
|
||||
New to Samba-3 is the ability to use a back-end database that holds the same type of data as
|
||||
the NT4 style SAM (Security Account Manager) database (one of the registry files).
|
||||
The samba-3 SAM can be specified via the smb.conf file parameter
|
||||
The Samba-3 SAM can be specified via the smb.conf file parameter
|
||||
<parameter>passwd backend</parameter> and valid options include
|
||||
<emphasis>smbpasswd, tdbsam, ldapsam, nisplussam, xmlsam, mysqlsam, guest</emphasis>.
|
||||
</para>
|
||||
@ -274,13 +274,13 @@ The <emphasis>Backup Domain Controller</emphasis> or BDC plays a key role in ser
|
||||
authentication requests. The BDC is biased to answer logon requests in preference to the PDC.
|
||||
On a network segment that has a BDC and a PDC the BDC will be most likely to service network
|
||||
logon requests. The PDC will answer network logon requests when the BDC is too busy (high load).
|
||||
A BDC can be promoted to a PDC. If the PDC is on line at the time that the BDC is promoted to
|
||||
PDC the previous PDC is automatically demoted to a BDC. With Samba-3 this is NOT an automatic
|
||||
operation, the PDB and BDC must be manually configured and changes need to be made likewise.
|
||||
A BDC can be promoted to a PDC. If the PDC is on line at the time that a BDC is promoted to
|
||||
PDC, the previous PDC is automatically demoted to a BDC. With Samba-3 this is NOT an automatic
|
||||
operation; the PDB and BDC must be manually configured and changes need to be made likewise.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
With MS Windows NT4 it is an install time decision what type of machine the server will be.
|
||||
With MS Windows NT4, it is an install time decision what type of machine the server will be.
|
||||
It is possible to change the promote a BDC to a PDC and vica versa only, but the only way
|
||||
to convert a domain controller to a domain member server or a stand-alone server is to
|
||||
reinstall it. The install time choices offered are:
|
||||
@ -302,13 +302,13 @@ Active Directory domain.
|
||||
<para>
|
||||
New to Samba-3 is the ability to function fully as an MS Windows NT4 style Domain Controller,
|
||||
excluding the SAM replication components. However, please be aware that Samba-3 support the
|
||||
MS Windows 200x domain control protcols also.
|
||||
MS Windows 200x domain control protocols also.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
At this time any appearance that Samba-3 is capable of acting as an
|
||||
<emphasis>ADS Domain Controller</emphasis> is limited and experimental in nature.
|
||||
This functionality should not be used until the samba-team offers formal support for it.
|
||||
This functionality should not be used until the Samba-Team offers formal support for it.
|
||||
At such a time, the documentation will be revised to duly reflect all configuration and
|
||||
management requirements.
|
||||
</para>
|
||||
@ -346,8 +346,9 @@ Domain it triggers a machine password change.
|
||||
<note><para>
|
||||
When running a Domain all MS Windows NT / 200x / XP Professional clients should be configured
|
||||
as full Domain Members - IF A SECURE NETWORK IS WANTED. If the machine is NOT made a member of the
|
||||
Domain, then it will operate like a workgroup (stand-alone) machine. Please refer to the chapter
|
||||
on Domain Membership for information regarding HOW to make your MS Windows clients Domain members.
|
||||
Domain, then it will operate like a workgroup (stand-alone) machine. Please refer the
|
||||
<link linkend="domain-member">Domain Membership</link> chapter for information regarding
|
||||
HOW to make your MS Windows clients Domain members.
|
||||
</para></note>
|
||||
|
||||
<para>
|
||||
@ -358,7 +359,7 @@ NT4 / 200x / XP clients.
|
||||
<simplelist>
|
||||
<member>Configuration of basic TCP/IP and MS Windows Networking</member>
|
||||
<member>Correct designation of the Server Role (<parameter>security = user</parameter>)</member>
|
||||
<member>Consistent configuration of Name Resolution (See <link linkend="NetworkBrowsing">chapter on Browsing</link> and on
|
||||
<member>Consistent configuration of Name Resolution (See chapter on <link linkend="NetworkBrowsing">Browsing</link> and on
|
||||
<link linkend="integrate-ms-networks">MS Windows network Integration</link>)</member>
|
||||
<member>Domain logons for Windows NT4 / 200x / XP Professional clients</member>
|
||||
<member>Configuration of Roaming Profiles or explicit configuration to force local profile usage</member>
|
||||
@ -387,7 +388,8 @@ The following provisions are required to serve MS Windows 9x / Me Clients:
|
||||
|
||||
<note><para>
|
||||
Roaming Profiles and System/Network policies are advanced network administration topics
|
||||
that are covered separately in this document. However, these are not necessarily specific
|
||||
that are covered in the <link linkend="ProfileMgmt">Profile Management</link> and
|
||||
<link linkend="PolicyMgmt">Policy Management</link> chapters of this document. However, these are not necessarily specific
|
||||
to a Samba PDC as much as they are related to Windows NT networking concepts.
|
||||
</para></note>
|
||||
|
||||
@ -397,7 +399,7 @@ A Domain Controller is an SMB/CIFS server that:
|
||||
|
||||
<itemizedlist>
|
||||
<listitem><para>
|
||||
Advertises and registers itself as a Domain Controller (Through NetBIOS broadcasts
|
||||
Registers and advertises itself as a Domain Controller (through NetBIOS broadcasts
|
||||
as well as by way of name registrations either by Mailslot Broadcasts over UDP broadcast,
|
||||
to a WINS server over UDP unicast, or via DNS and Active Directory)
|
||||
</para></listitem>
|
||||
@ -414,8 +416,8 @@ A Domain Controller is an SMB/CIFS server that:
|
||||
</itemizedlist>
|
||||
|
||||
<para>
|
||||
For samba to provide these is rather easy to configure. Each Samba Domain Controller must provide
|
||||
the NETLOGON service which samba calls the <emphasis>domain logons</emphasis> functionality
|
||||
For Samba to provide these is rather easy to configure. Each Samba Domain Controller must provide
|
||||
the NETLOGON service which Samba calls the <emphasis>domain logons</emphasis> functionality
|
||||
(after the name of the parameter in the &smb.conf; file). Additionally, one (1) server in a Samba-3
|
||||
Domain must advertise itself as the domain master browser. This causes the Primary Domain Controller
|
||||
to claim domain specific NetBIOS name that identifies it as a domain master browser for its given
|
||||
@ -558,8 +560,8 @@ an integral part of the essential functionality that is provided by a Domain Con
|
||||
|
||||
<para>
|
||||
All Domain Controllers must run the netlogon service (<emphasis>domain logons</emphasis>
|
||||
in Samba. One Domain Controller must be configured with <parameter>domain master = Yes</parameter>
|
||||
(the Primary Domain Controller), on ALL Backup Domain Controllers <parameter>domain master = No</parameter>
|
||||
in Samba). One Domain Controller must be configured with <parameter>domain master = Yes</parameter>
|
||||
(the Primary Domain Controller); on ALL Backup Domain Controllers <parameter>domain master = No</parameter>
|
||||
must be set.
|
||||
</para>
|
||||
|
||||
@ -572,7 +574,7 @@ must be set.
|
||||
domain master = (Yes on PDC, No on BDCs)
|
||||
|
||||
[netlogon]
|
||||
comment = Network Logon Service
|
||||
comment = Network Logon Service
|
||||
path = /var/lib/samba/netlogon
|
||||
guest ok = Yes
|
||||
browseable = No
|
||||
@ -630,7 +632,7 @@ which are the focus of this section.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
When an SMB client in a domain wishes to logon it broadcast requests for a
|
||||
When an SMB client in a domain wishes to logon, it broadcasts requests for a
|
||||
logon server. The first one to reply gets the job, and validates its
|
||||
password using whatever mechanism the Samba administrator has installed.
|
||||
It is possible (but very stupid) to create a domain where the user
|
||||
@ -683,7 +685,7 @@ worthwhile to look at how a Windows 9x/ME client performs a logon:
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
The client then connects to the NetLogon share and searches for this
|
||||
The client then connects to the NetLogon share and searches for said script
|
||||
and if it is found and can be read, is retrieved and executed by the client.
|
||||
After this, the client disconnects from the NetLogon share.
|
||||
</para>
|
||||
@ -693,7 +695,7 @@ worthwhile to look at how a Windows 9x/ME client performs a logon:
|
||||
<para>
|
||||
The client then sends a NetUserGetInfo request to the server, to retrieve
|
||||
the user's home share, which is used to search for profiles. Since the
|
||||
response to the NetUserGetInfo request does not contain much more then
|
||||
response to the NetUserGetInfo request does not contain much more than
|
||||
the user's home share, profiles for Win9X clients MUST reside in the user
|
||||
home directory.
|
||||
</para>
|
||||
@ -735,7 +737,7 @@ The main difference between a PDC and a Windows 9x logon server configuration is
|
||||
</itemizedlist>
|
||||
|
||||
<para>
|
||||
A Samba PDC will act as a Windows 9x logon server, after all it does provide the
|
||||
A Samba PDC will act as a Windows 9x logon server; after all, it does provide the
|
||||
network logon services that MS Windows 9x / Me expect to find.
|
||||
</para>
|
||||
|
||||
@ -797,15 +799,15 @@ This is the only officially supported mode of operation.
|
||||
<sect2>
|
||||
<title>I cannot include a '$' in a machine name</title>
|
||||
<para>
|
||||
A 'machine name' in (typically) <filename>/etc/passwd</filename>
|
||||
of the machine name with a '$' appended. FreeBSD (and other BSD
|
||||
A 'machine account', (typically) stored in <filename>/etc/passwd</filename>,
|
||||
takes the form of the machine name with a '$' appended. FreeBSD (and other BSD
|
||||
systems?) won't create a user with a '$' in their name.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
The problem is only in the program used to make the entry. Once made, it works perfectly.
|
||||
Create a user without the '$' using <command>vipw</command> to edit the entry, adding
|
||||
the '$'. Or create the whole entry with vipw if you like, make sure you use a unique User ID!
|
||||
Create a user without the '$'. Then use <command>vipw</command> to edit the entry, adding
|
||||
the '$'. Or create the whole entry with vipw if you like; make sure you use a unique User ID!
|
||||
</para>
|
||||
</sect2>
|
||||
|
||||
@ -845,7 +847,7 @@ system administrator</errorname> when attempting to logon.
|
||||
<para>
|
||||
This occurs when the domain SID stored in the secrets.tdb database
|
||||
is changed. The most common cause of a change in domain SID is when
|
||||
the domain name and/or the server name (netbios name) is changed.
|
||||
the domain name and/or the server name (NetBIOS name) is changed.
|
||||
The only way to correct the problem is to restore the original domain
|
||||
SID or remove the domain client from the domain and rejoin. The domain
|
||||
SID may be reset using either the net or rpcclient utilities.
|
||||
@ -855,8 +857,8 @@ SID may be reset using either the net or rpcclient utilities.
|
||||
The reset or change the domain SID you can use the net command as follows:
|
||||
|
||||
<screen>
|
||||
<prompt>$ </prompt><userinput>net getlocalsid 'OLDNAME'</userinput>
|
||||
<prompt>$ </prompt><userinput>net setlocalsid 'SID'</userinput>
|
||||
&rootprompt;<userinput>net getlocalsid 'OLDNAME'</userinput>
|
||||
&rootprompt;<userinput>net setlocalsid 'SID'</userinput>
|
||||
</screen>
|
||||
</para>
|
||||
|
||||
@ -886,9 +888,13 @@ correct for the machine trust account in smbpasswd file on the Samba PDC.
|
||||
If you added the account using an editor rather than using the smbpasswd
|
||||
utility, make sure that the account name is the machine NetBIOS name
|
||||
with a '$' appended to it ( i.e. computer_name$ ). There must be an entry
|
||||
in both /etc/passwd and the smbpasswd file. Some people have reported
|
||||
in both /etc/passwd and the smbpasswd file.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
Some people have also reported
|
||||
that inconsistent subnet masks between the Samba server and the NT
|
||||
client have caused this problem. Make sure that these are consistent
|
||||
client can cause this problem. Make sure that these are consistent
|
||||
for both client and server.
|
||||
</para>
|
||||
</sect2>
|
||||
@ -899,13 +905,13 @@ I get a message about my account being disabled.</title>
|
||||
|
||||
<para>
|
||||
Enable the user accounts with <userinput>smbpasswd -e <replaceable>username</replaceable>
|
||||
</userinput>, this is normally done, as an account is created.
|
||||
</userinput>, this is normally done as an account is created.
|
||||
</para>
|
||||
|
||||
</sect2>
|
||||
|
||||
<sect2>
|
||||
<title>Until a few minutes after samba has started, clients get the error "Domain Controller Unavailable"</title>
|
||||
<title>Until a few minutes after Samba has started, clients get the error "Domain Controller Unavailable"</title>
|
||||
<para>
|
||||
A domain controller has to announce on the network who it is. This usually takes a while.
|
||||
</para>
|
||||
|
Loading…
x
Reference in New Issue
Block a user