From: Daniel Müller on 2 Aug 2010 09:10 Dear all, after the feedbacks. I renew this HOWTO with replacation of a second SAMBA 4 PDC. We have 2 CentOS 5.5 servers on which we build a SAMBA4 forest with 2 Servers replication. We have one hosts called "node1" and the second "node2" Step1: On node1: Do not install the named coming with CentOs. This version can not do dns updates!!!! Install needs for samba. yum install libacl* libbb* gnutls* readline* python* gdb* autoconf* . Named installation: Here is a description on what to do: http://jason.roysdon.net/2009/10/16/building-bind-9-6-on-rhel5-centos5-for-d nssec-nsec3-support/ . The steps, yum -y install make gcc rpm-build libtool openssl-devel libcap-devel libidn-devel libxml2-devel openldap-devel postgresql-devel sqlite-devel mysql-devel krb5-devel xmlto . For named to compile correctly you need this 2 packages too: yum -y install curl* . You need python-dns-1.7.1-1.el5.noarch.rpm. You find it here:download.fedora.redhat.com/pub/fedora/epel/5/i386/python-dns-1.7.1-1.el 5.noarch.rpm. Download it and make a, rpm -ivh python-dns-1.7.1-1.el5.noarch.rpm. cd /usr/src/redhat/SRPMS. wget -c ftp://mirrors.kernel.org/pub/fedora/updates/12/SRPMS/bind-9.6.*.src. rpm. wget -c ftp://mirrors.kernel.org/pub/fedora/releases/12/Fedora/source/SRPMS/dnssec-c onf-*.src.rpm. rpm -ivh --nomd5 bind-9.6.*.src.rpm dnssec-conf-*.src.rpm. cd /usr/src/redhat/SPECS. rpmbuild -ba ./bind.spec. The built bind RPM is now in /usr/src/redhat/RPMS/i386/ or /usr/src/redhat/RPMS/x86_64/ depending on your Arch. rpmbuild --ba ./dnssec-conf.spec . The built dnssec-conf RPM is now in /usr/src/redhat/RPMS/noarch/. cd /usr/src/redhat/RPMS/*86*. rpm -Uvh bind-9.6.*.rpm bind-utils-9.6.*.rpm bind-libs-9.6.*.rpm ../noarch/dnssec-conf-1.21-*.noarch.rpm. Now bind is installed Config-File in /etc/named.conf I disabled in options: //dnssec-enable yes; //dnssec-validation yes; //dnssec-lookaside . trust-anchor dlv.isc.org.; Because I did not need them. To make bind work you have to add user named to the group named (To avoid this you can add the user named and group named before you compile named!!!). Set the rights to make named work correctly: chmod 770 /etc/named.conf. chmod 770 /etc/named.rfc1912.zones. chown root:named /etc/named.conf. chown named:named /etc/named.rfc1912.zones. chmod -R 770 /var/named. chown -R named:named /var/named. chown named:named /etc/rndc.key. chown named:named /var/run/named/. Now download and install samba: url: http://wiki.samba.org/index.php/Samba4/HOWTO. mkdir samba4. cd samba4. rsync -avz samba.org::ftp/unpacked/samba_4_0_test/ . cd /source4. ./autogen.sh . ./configure.devloper . Make . make install . Samba4 is now installed in /usr/local/samba . Provision it: cd /samba4/source4 . ./setup/provision --realm=samdom.example.com --domain=SAMDOM --adminpass=SOMEPASSWORD --server-role='domain controller' . In my case: ./setup/provision --realm=tuebingen.tst.loc --domain=TUEBINGEN--adminpass=SOMEPASSWORD --server-role='domain controller' . Now you nedd to add the PATH to roots .bash_profile in /root: --> PATH=$PATH:$HOME/bin:/usr/local/samba/bin:/usr/local/samba/sbin . which samba must answer: /usr/local/samba/sbin/samba Now you must set the lib paths: echo "/usr/local/samba/lib" > /etc/ld.so.conf.d/samba4.conf. Then: type ldconfig . The next things to do( named should have read and write) : Cd /usr/local/samba/private . Chown named:named krb5.conf . Chown -R named:named /usr/local/samba/private/dns. Chown named:named named.conf . Chown named:named named.conf.update . Chown named:named dns.keytab . Cp krb5.conf /etc # this will overwrite the org. krb5.conf. cd /etc/sysconfig . Vi named There add a line at the bootom: KEYTAB_FILE="/usr/local/samba/private/dns.keytab". export KEYTAB_FILE. Now you must update your /etc/named.conf , Be sure to have em listen on a IP not only 127.0.0.1: Here is mine: options { listen-on port 53 { 127.0.0.1;192.168.134.27; };# <--- ip of the samba4 server listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; allow-query { localhost;allyoursubnetshere; }; #<---do not forget to list your subnets here. recursion yes; forwarders { 192.168.134.253; };##put here your first dns if you have }; logging { channel default_debug { file "data/named.run"; severity dynamic; }; }; zone "." IN { type hint; file "named.ca"; }; include "/usr/local/samba/private/named.conf";####samba4 link include "/etc/named.rfc1912.zones"; In your /etc/resolv.conf you have one single entry: ¡ú nameserver localhost Now you have to put in your globals /usr/local/smba/etc/smb.conf Interfaces=eth0 Now samba -I -M single And you are done!!! Samba_dnsupdate --verbose will give you: [root(a)node1 etc]# samba_dnsupdate --verbose Looking for DNS entry A tuebingen.tst.loc 192.168.134.27 as tuebingen.tst.loc. Looking for DNS entry A node1.tuebingen.tst.loc 192.168.134.27 as node1.tuebingen.tst.loc. Looking for DNS entry CNAME 365d2a9f-bfe6-462d-965e-8622bfefc190._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc as 365d2a9f-bfe6-462d-965e-8622bfefc190._msdcs.tuebingen.tst.loc. Looking for DNS entry SRV _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 88 as _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc. Checking 0 100 88 node1.tuebingen.tst.loc. against SRV _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc Step2: We want node2 to join the domain as dc. The next step setting up the second samba4 on a centOs 5.5 and do replication: links:http://wiki.samba.org/index.php/Samba4_joining_a_domain First of all do all the same as for the first centOS samba4 but do not provision, no smb.conf in /usr/local/samba/etc. Important things: both servers must new each other. So if named is installed on the second (node2)you need to tell em in his named.conf that the first server(node1) is a forwarder to search for example ¡°tuebingen.tst.loc¡±: Example my named.conf on node2 - 192.168.135.27 is node1, options { listen-on port 53 { 127.0.0.1;192.168.134.28; }; listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; allow-query { localhost; 192.168.135.0/24; 192.168.134.0/24; }; recursion yes; forwarders { 192.168.134.253;192.168.134.27; }; }; logging { channel default_debug { file "data/named.run"; severity dynamic; }; }; zone "." IN { type hint; file "named.ca"; }; include "/etc/named.rfc1912.zones"; On node2 your /etc/hosts have entries like this: # Do not remove the following line, or various programs # that require network functionality will fail. 127.0.0.1 localhost.localdomain localhost ::1 localhost6.localdomain6 localhost6 192.168.134.28 node2.local node2 192.168.134.27 node1.tuebingen.tst.loc node1 Now you try ping tuebingen.tst.loc from node2. If it is possible you are on the right way: ping tuebingen.tst.loc. PING tuebingen.tst.loc (192.168.134.27) 56(84) bytes of data. 64 bytes from node1.tuebingen.tst.loc (192.168.134.27): icmp_seq=1 ttl=64 time=0.138 ms. Now you have to copy your /etc/krb5.conf from node1 to node2 /etc/krb5.conf. scp krb5.conf root(a)node2:/etc. edit krb5.conf. Make it look like that: [root(a)node2 ~]# cat /etc/krb5.conf [libdefaults] default_realm = TUEBINGEN.TST.LOC dns_lookup_realm = true dns_lookup_kdc = true ticket_lifetime = 24h forwardable = yes [realms] TUEBINGEN.TST.LOC = { kdc = node1.tuebingen.tst.loc:88 admin_server = node1.tuebingen.tst.loc:749 default_domain = tuebingen.tst.loc } [domain_realm] .tuebingen.tst.loc = TUEBINGEN.TST.LOC tuebingen.tst.loc = TUEBINGEN.TST.LOC Important is setting dns_lookup_realm=true; dns_lookup_kdc=true. Now a very important thing. On both servers the time must be equal. So do on both servers: date -s hhmm, ex: date-s 1952. Then try : kinit administrator. Password for administrator(a)TUEBINGEN.TST.LOC: Must give you this: Warning: Your password will expire in 34 days on Fri Sep 3 11:11:06 2010. Now change to join domain (node2): The place to join as dc to your domain is /samba4/source4 (on node2). There type: bin/net vampire tuebingen.tst.loc -Uadministrator --realm=tuebingen.tst.loc . If this is successful start samba . Now return no node1 the first server. Change to /samba4/source4. Now type: bin/ldbsearch -H /usr/local/samba/private/sam.ldb objectclass=ntdsdsa objectguid --cross-ncs . This must be the result of two dcs: [root(a)node1 source4]# bin/ldbsearch -H /usr/local/samba/private/sam.ldb objectclass=ntdsdsa objectguid --cross-ncs # record 1 dn: CN=NTDS Settings,CN=NODE1,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configur ation,DC=tuebingen,DC=tst,DC=loc objectGUID: 365d2a9f-bfe6-462d-965e-8622bfefc190 # record 2 dn: CN=NTDS Settings,CN=NODE2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configur ation,DC=tuebingen,DC=tst,DC=loc objectGUID: d6160c39-0810-4026-aa24-91c91797d892 #<-- this is the important entry of the new dc node2! # returned 2 records # 2 entries # 0 referrals So record 2 is the new dc in the forest. Now you must update your /usr/local/samba/private/dns/yourzone.list . Copy d6160c39-0810-4026-aa24-91c91797d892 and paste it in yourzone.list. Mine after change: ; -*- zone -*- ; generated by provision.pl $ORIGIN tuebingen.tst.loc. $TTL 1W @ IN SOA @ hostmaster ( 2010072311 ; serial 2D ; refresh 4H ; retry 6W ; expiry 1W ) ; minimum IN NS node1 IN A 192.168.134.27 ; node1 IN A 192.168.134.27 node2 IN A 192.168.134.28 #<----new dc entry node2. gc._msdcs IN A 192.168.134.27 365d2a9f-bfe6-462d-965e-8622bfefc190._msdcs IN CNAME node1 d6160c39-0810-4026-aa24-91c91797d892._msdcs IN CNAME node2 <---new dc entry here. ; ; global catalog servers _gc._tcp IN SRV 0 100 3268 node1 _gc._tcp.Default-First-Site-Name._sites IN SRV 0 100 3268 node1 _ldap._tcp.gc._msdcs IN SRV 0 100 3268 node1 _ldap._tcp.Default-First-Site-Name._sites IN SRV 0 100 389 node1 _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 389 node1 ; ; krb5 servers _kerberos._tcp IN SRV 0 100 88 node1 _kerberos._tcp.dc._msdcs IN SRV 0 100 88 node1 _kerberos._tcp.Default-First-Site-Name._sites IN SRV 0 100 88 node1 _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 88 node1 _kerberos._udp IN SRV 0 100 88 node1 ; MIT kpasswd likes to lookup this name on password change _kerberos-master._tcp IN SRV 0 100 88 node1 _kerberos-master._udp IN SRV 0 100 88 node1 ; ; kpasswd _kpasswd._tcp IN SRV 0 100 464 node1 _kpasswd._udp IN SRV 0 100 464 node1 ; ; heimdal 'find realm for host' hack _kerberos IN TXT TUEBINGEN.TST.LOC (END) Now you have to put two new entries on node1 /usr/local/samba/etc/smb.conf in the global section: dreplsrv:periodic_interval = 10 . dreplsrv:periodic_startup_interval = 5. Then ssh in node2 to /usr/local/samba/etc. net vampire has placed there a smb.conf. There in the global section set this above entries too: dreplsrv:periodic_interval = 10 . dreplsrv:periodic_startup_interval = 5. My globals on node1: [globals] netbios name = NODE1 workgroup = TUEBINGEN realm = TUEBINGEN.TST.LOC server role = domain controller interfaces = 192.168.134.27 dreplsrv:periodic_interval = 10 dreplsrv:periodic_startup_interval = 5 My globals on node2: [globals] netbios name = NODE2 workgroup = TUEBINGEN realm = TUEBINGEN.TST.LOC server role = domain controller dreplsrv:periodic_interval=10 dreplsrv:periodic_startup_interval=5 Then on Both Servers: Restart samba service named restart. rndc flush. A litle bit testing: I put the a user Sammler to my domain using the win7 Domain-Tools: On second server node2 cd /samba4/source4 then: bin/ldbsearch -H ldap://node2 -Uadministrator%password name='sam*' dn # record 1 dn: CN=Sammler sm. Sammler,OU=Keine Systemsteuerung,DC=tuebingen,DC=tst,DC=loc # Referral ref: ldap://tuebingen.tst.loc/CN=Configuration,DC=tuebingen,DC=tst,DC=loc # returned 2 records # 1 entries # 1 referrals ----------------------------------------------- EDV Daniel M¨¹ller Leitung EDV Tropenklinik Paul-Lechler-Krankenhaus Paul-Lechler-Str. 24 72076 T¨¹bingen Tel.: 07071/206-463, Fax: 07071/206-499 eMail: mueller(a)tropenklinik.de Internet: www.tropenklinik.de ----------------------------------------------- -----Urspr¨¹ngliche Nachricht----- Von: Daniel M¨¹ller [mailto:mueller(a)tropenklinik.de] Gesendet: Montag, 26. Juli 2010 11:35 An: 'samba(a)lists.samba.org' Betreff: HOWTO centOS 5.5 samba4 dns dynamic update For all, after I had several problems making samba4 working as it should on centOs5. 5 here is a short guide setting it up to work. First of all do not install the bind package coming with centos 5.5!! Install needs for samba yum install libacl* gnutls* readline* python* gdb* autoconf* Named installation: Here is a description on what to do: http://jason.roysdon.net/2009/10/16/building-bind-9-6-on-rhel5-centos5-for-d nssec-nsec3-support/ The steps, yum -y install make gcc rpm-build libtool autoconf openssl-devel libcap-devel libidn-devel libxml2-devel openldap-devel postgresql-devel sqlite-devel mysql-devel krb5-devel xmlto For named to compile correctly you need this 2 packages too: yum -y install curl* download.fedora.redhat.com/pub/fedora/epel/5/i386/python-dns-1.7.1-1.el5.noa rch.rpm cd /usr/src/redhat/SRPMS wget -c ftp://mirrors.kernel.org/pub/fedora/updates/11/SRPMS/bind-9.6.*.src. rpm wget -c ftp://mirrors.kernel.org/pub/fedora/updates/11/SRPMS/dnssec-conf-*.src.rpm cd /usr/src/redhat/SRPMS wget -c ftp://mirrors.kernel.org/pub/fedora/updates/12/SRPMS/bind-9.6.*.src. rpm wget -c ftp://mirrors.kernel.org/pub/fedora/releases/12/Fedora/source/SRPMS/dnssec-c onf-*.src.rpm rpm -ivh --nomd5 bind-9.6.*.src.rpm dnssec-conf-*.src.rpm cd /usr/src/redhat/SPECS rpmbuild -ba ./bind.spec The built bind RPM is now in /usr/src/redhat/RPMS/i386/ or /usr/src/redhat/RPMS/x86_64/ depending on your Arch. rpmbuild --ba ./dnssec-conf.spec The built dnssec-conf RPM is now in /usr/src/redhat/RPMS/noarch/ cd /usr/src/redhat/RPMS/*86* rpm -Uvh bind-9.6.*.rpm bind-utils-9.6.*.rpm bind-libs-9.6.*.rpm ../noarch/dnssec-conf-1.21-*.noarch.rpm Now bind is installed Config-File in /etc/named.conf I disabled in options: //dnssec-enable yes; //dnssec-validation yes; //dnssec-lookaside . trust-anchor dlv.isc.org.; To make bind work you have to add user named to the group named. Set the rights to make named work correctly chmod 770 /etc/named.conf chmod 770 /etc/named.rfc1912.zones chown root:named /etc/named.conf chown /etc/named.rfc1912.zones chmod -R 770 /var/named chown -R named:named /var/named Now download and install samba: url: http://wiki.samba.org/index.php/Samba4/HOWTO mkdir samba4 cd samba4 rsync -avz samba.org::ftp/unpacked/samba_4_0_test/ . cd /source4 ./autogen.sh ./configure.devloper make make install Samba4 is now installed in /usr/local/samba Now you nedd to add the PATH to roots .bash_profile in /root --> PATH=$PATH:$HOME/bin:/usr/local/samba/bin:/usr/local/samba/sbin which samba must answer: /usr/local/samba/sbin/samba Now you must set the lib paths: echo "/usr/local/samba/lib" > /etc/ld.so.conf.d/samba4.conf The next things to do( named should have read and write) : Cd /usr/local/samba/private Chown named:named krb5.conf Chown -R named:named /usr/local/samba/private/dns Chown named:named named.conf Chown named:named named.conf.update Chown named:named dns.keytab Cp krb5.conf /etc # this will overwrite the org. krb5.conf Cd /etc/sysconfig Vi named There add a line at the bootom: KEYTAB_FILE="/usr/local/samba/private/dns.keytab" export KEYTAB_FILE Now you must update your /etc/named.conf , Be sure to have em listen on a IP not only 127.0.0.1: Here ist mine options { listen-on port 53 { 127.0.0.1;192.168.134.27; }; listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; allow-query { localhost; }; recursion yes; forwarders { 192.168.134.253; };##put here your first dns if you have }; logging { channel default_debug { file "data/named.run"; severity dynamic; }; }; zone "." IN { type hint; file "named.ca"; }; include "/usr/local/samba/private/named.conf";####samba4 link include "/etc/named.rfc1912.zones"; Now you have to put in your globals /usr/local/smba/etc/smb.conf Interfaces=eth0 Now samba -I -M single And you are done!!! Samba_dnsupdate --verbose will give you: [root(a)node1 etc]# samba_dnsupdate --verbose Looking for DNS entry A tuebingen.tst.loc 192.168.134.27 as tuebingen.tst.loc. Looking for DNS entry A node1.tuebingen.tst.loc 192.168.134.27 as node1.tuebingen.tst.loc. Looking for DNS entry CNAME 365d2a9f-bfe6-462d-965e-8622bfefc190._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc as 365d2a9f-bfe6-462d-965e-8622bfefc190._msdcs.tuebingen.tst.loc. Looking for DNS entry SRV _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 88 as _kerberos._tcp.Default-First-Site-Name._sites. dc._msdcs.tuebingen.tst.loc. Checking 0 100 88 node1.tuebingen.tst.loc. against SRV _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 88 Looking for DNS entry SRV _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc node1. tuebingen.tst.loc 389 as _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc. Checking 0 100 389 node1.tuebingen.tst.loc. against SRV _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs.tuebingen.tst.loc node1. tuebingen.tst.loc 389 Looking for DNS entry SRV _kerberos._tcp.dc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 88 as _kerberos._tcp.dc._msdcs.tuebingen.tst.loc. Checking 0 100 88 node1.tuebingen.tst.loc. against SRV _kerberos._tcp.dc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 88 Looking for DNS entry SRV _ldap._tcp.dc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 389 as _ldap._tcp.dc._msdcs.tuebingen.tst.loc. Checking 0 100 389 node1.tuebingen.tst.loc. against SRV _ldap._tcp.dc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 389 Looking for DNS entry SRV _ldap._tcp.e67cd6da-dbd0-492d-96e2-2dc778abaebe.domains._msdcs.tuebingen.tst .loc node1.tuebingen.tst.loc 389 as _ldap._tcp.e67cd6da-dbd0-492d-96e2-2dc778abaebe.domains._msdcs.tuebingen.tst .loc. Checking 0 100 389 node1.tuebingen.tst.loc. against SRV _ldap._tcp.e67cd6da-dbd0-492d-96e2-2dc778abaebe.domains._msdcs.tuebingen.tst .loc node1.tuebingen.tst.loc 389 Looking for DNS entry SRV _ldap._tcp.Default-First-Site-Name._sites.gc._msdcs.tuebingen.tst.loc node1. tuebingen.tst.loc 3268 as _ldap._tcp.Default-First-Site-Name._sites.gc._msdcs.tuebingen.tst.loc. Checking 0 100 3268 node1.tuebingen.tst.loc. against SRV _ldap._tcp.Default-First-Site-Name._sites.gc._msdcs.tuebingen.tst.loc node1. tuebingen.tst.loc 3268 Looking for DNS entry SRV _ldap._tcp.gc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 3268 as _ldap._tcp.gc._msdcs.tuebingen.tst.loc. Checking 0 100 3268 node1.tuebingen.tst.loc. against SRV _ldap._tcp.gc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 3268 Looking for DNS entry SRV _ldap._tcp.pdc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 389 as _ldap._tcp.pdc._msdcs.tuebingen.tst.loc. Checking 0 100 389 node1.tuebingen.tst.loc. against SRV _ldap._tcp.pdc._msdcs.tuebingen.tst.loc node1.tuebingen.tst.loc 389 Looking for DNS entry SRV _gc._tcp.Default-First-Site-Name._sites.tuebingen. tst.loc node1.tuebingen.tst.loc 3268 as _gc._tcp.Default-First-Site-Name._sites.tuebingen.tst.loc. Checking 0 100 3268 node1.tuebingen.tst.loc. against SRV _gc._tcp.Default-First-Site-Name._sites.tuebingen.tst.loc node1.tuebingen.tst.loc 3268 Looking for DNS entry SRV _kerberos._tcp.Default-First-Site-Name._sites.tuebingen.tst.loc node1.tuebingen.tst.loc 88 as _kerberos._tcp.Default-First-Site-Name._sites. tuebingen.tst.loc. Checking 0 100 88 node1.tuebingen.tst.loc. against SRV _kerberos._tcp.Default-First-Site-Name._sites.tuebingen.tst.loc node1.tuebingen.tst.loc 88 Looking for DNS entry SRV _ldap._tcp.Default-First-Site-Name._sites.tuebingen.tst.loc node1.tuebingen. tst.loc 389 as _ldap._tcp.Default-First-Site-Name._sites.tuebingen.tst.loc. Checking 0 100 389 node1.tuebingen.tst.loc. against SRV _ldap._tcp.Default-First-Site-Name._sites.tuebingen.tst.loc node1.tuebingen. tst.loc 389 Looking for DNS entry SRV _gc._tcp.tuebingen.tst.loc node1.tuebingen.tst.loc 3268 as _gc._tcp.tuebingen.tst.loc. Checking 0 100 3268 node1.tuebingen.tst.loc. against SRV _gc._tcp.tuebingen. tst.loc node1.tuebingen.tst.loc 3268 Looking for DNS entry SRV _kerberos._tcp.tuebingen.tst.loc node1.tuebingen.tst.loc 88 as _kerberos._tcp.tuebingen.tst.loc. Checking 0 100 88 node1.tuebingen.tst.loc. against SRV _kerberos._tcp.tuebingen.tst.loc node1.tuebingen.tst.loc 88 Looking for DNS entry SRV _kpasswd._tcp.tuebingen.tst.loc node1.tuebingen.tst.loc 464 as _kpasswd._tcp.tuebingen.tst.loc. Checking 0 100 464 node1.tuebingen.tst.loc. against SRV _kpasswd._tcp.tuebingen.tst.loc node1.tuebingen.tst.loc 464 Looking for DNS entry SRV _ldap._tcp.tuebingen.tst.loc node1.tuebingen.tst.loc 389 as _ldap._tcp.tuebingen.tst.loc. Checking 0 100 389 node1.tuebingen.tst.loc. against SRV _ldap._tcp.tuebingen.tst.loc node1.tuebingen.tst.loc 389 Looking for DNS entry SRV _kerberos._udp.tuebingen.tst.loc node1.tuebingen.tst.loc 88 as _kerberos._udp.tuebingen.tst.loc. Checking 0 100 88 node1.tuebingen.tst.loc. against SRV _kerberos._udp.tuebingen.tst.loc node1.tuebingen.tst.loc 88 Looking for DNS entry SRV _kpasswd._udp.tuebingen.tst.loc node1.tuebingen.tst.loc 464 as _kpasswd._udp.tuebingen.tst.loc. Checking 0 100 464 node1.tuebingen.tst.loc. against SRV _kpasswd._udp.tuebingen.tst.loc node1.tuebingen.tst.loc 464 No DNS updates needed Greetings Daniel ----------------------------------------------- EDV Daniel M¨¹ller Leitung EDV Tropenklinik Paul-Lechler-Krankenhaus Paul-Lechler-Str. 24 72076 T¨¹bingen Tel.: 07071/206-463, Fax: 07071/206-499 eMail: mueller(a)tropenklinik.de Internet: www.tropenklinik.de ----------------------------------------------- -- To unsubscribe from this list go to the following URL and read the instructions: https://lists.samba.org/mailman/options/samba
|
Pages: 1 Prev: Must restart nmbd to connect Next: Kerberos: Principal may not act as server ERROR |