Linux som ADDC [Hjälp]
Jag håller just nu på med mitt examensarbete där jag ska deploya en server-miljö med endast linux som server. Detta ska fungera ihop med Windows-klienter och även Active directory osv. Jag har följt denna guiden på youtube och sedan installerat bind9 och isc-dhcp-server och konfat. Men när jag sedan ska öppna active directory via en Windows 8-klient får jag bara felmeddelanden.
Jag kan pinga både FQDN och hostnamn både till och från servern. Även via ip.
Om jag ändå går in i "Users and Computers" ändå och klickar change domain så hittas domänen, men jag kan fortfarande inte komma åt den:
Config-filer:
Zone-fil:
$TTL 86400
$ORIGIN emil.com.
@ IN SOA dc1.emil.com. admin.emil.com. (
1 ; serial
12h ; refresh rate
15m ; retry rate
3w ; expiry time
3h ; TTL
)
NS dc1.emil.com.
$ORIGIN emil.com.
dc1 A 192.168.6.10
Rev-zone:
$ORIGIN .
$TTL 86400 ; 1 day
6.168.192.in-addr.arpa IN SOA dc1.emil.com. admin.emil.com. (
4 ; serial
43200 ; refresh (12 hours)
900 ; retry (15 minutes)
1814400 ; expire (3 weeks)
10800 ; minimum (3 hours)
)
NS dc1.emil.com.
$ORIGIN 6.168.192.in-addr.arpa.
10 PTR dc1.emil.com.
$TTL 3600 ; 1 hour
40 PTR win.emil.com.
dhcpd.conf:
ddns-update-style interim;
authoritative;
key rndc-key {
algorithm hmac-md5;
secret etTM+d7J62juafWBvzvLGg==;}
allow unknown-clients;
use-host-decl-names on;
default-lease-time 1814400;
max-lease-time 1814400;
log-facility local7;
zone emil.com. {
primary localhost;
key rndc-key;
}
zone 6.168.192.in-addr.arpa. {
primary localhost;
key rndc-key;
}
# Emil LAN Scope
subnet 192.168.6.0 netmask 255.255.255.0 {
range 192.168.6.30 192.168.6.100;
option subnet-mask 255.255.255.0;
option routers 192.168.6.2;
option domain-name-servers 192.168.6.10;
option domain-name "emil.com";
ddns-domainname "emil.com.";
ddns-rev-domainname "in-addr.arpa.";
}
krb5.conf:
[libdefaults]
default_realm = EMIL.COM
# The following krb5.conf variables are only for MIT Kerberos.
krb4_config = /etc/krb.conf
krb4_realms = /etc/krb.realms
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
# The following encryption type specification will be used by MIT Kerberos
# if uncommented. In general, the defaults in the MIT Kerberos code are
# correct and overriding these specifications only serves to disable new
# encryption types as they are added, creating interoperability problems.
#
# Thie only time when you might need to uncomment these lines and change
# the enctypes is if you have local software that will break on ticket
# caches containing ticket encryption types it doesn't know about (such as
# old versions of Sun Java).
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
# The following libdefaults parameters are only for Heimdal Kerberos.
v4_instance_resolve = false
v4_name_convert = {
host = {
rcmd = host
ftp = ftp
}
plain = {
< something = something-else
}
}
fcc-mit-ticketflags = true
[realms]
EMIL.COM = {
kdc = dc1
admin_server = dc1
}
ATHENA.MIT.EDU = {
kdc = kerberos.mit.edu:88
kdc = kerberos-1.mit.edu:88
kdc = kerberos-2.mit.edu:88
admin_server = kerberos.mit.edu
default_domain = mit.edu
}
MEDIA-LAB.MIT.EDU = { ndrad
kdc = kerberos.media.mit.edu
admin_server = kerberos.media.mit.edu
}
ZONE.MIT.EDU = {
kdc = casio.mit.edu
kdc = seiko.mit.edu
admin_server = casio.mit.edu
}
MOOF.MIT.EDU = {
kdc = three-headed-dogcow.mit.edu:88
kdc = three-headed-dogcow-1.mit.edu:88
admin_server = three-headed-dogcow.mit.edu
}
CSAIL.MIT.EDU = {
kdc = kerberos-1.csail.mit.edu
kdc = kerberos-2.csail.mit.edu
admin_server = kerberos.csail.mit.edu
default_domain = csail.mit.edu
krb524_server = krb524.csail.mit.edu
}
IHTFP.ORG = {
kdc = kerberos.ihtfp.org
admin_server = kerberos.ihtfp.org
}
GNU.ORG = {
kdc = kerberos.gnu.org
kdc = kerberos-2.gnu.org
kdc = kerberos-3.gnu.org
admin_server = kerberos.gnu.org
}
1TS.ORG = {
kdc = kerberos.1ts.org
admin_server = kerberos.1ts.org
}
GRATUITOUS.ORG = {
kdc = kerberos.gratuitous.org
admin_server = kerberos.gratuitous.org
}
DOOMCOM.ORG = {
kdc = kerberos.doomcom.org
admin_server = kerberos.doomcom.org
}
ANDREW.CMU.EDU = {
kdc = kerberos.andrew.cmu.edu
kdc = kerberos2.andrew.cmu.edu
kdc = kerberos3.andrew.cmu.edu
admin_server = kerberos.andrew.cmu.edu
default_domain = andrew.cmu.edu
}
CS.CMU.EDU = {
kdc = kerberos.cs.cmu.edu
kdc = kerberos-2.srv.cs.cmu.edu
admin_server = kerberos.cs.cmu.edu
}
DEMENTIA.ORG = {
kdc = kerberos.dementix.org
kdc = kerberos2.dementix.org
admin_server = kerberos.dementix.org
}
stanford.edu = {
kdc = krb5auth1.stanford.edu
kdc = krb5auth2.stanford.edu
kdc = krb5auth3.stanford.edu
master_kdc = krb5auth1.stanford.edu
admin_server = krb5-admin.stanford.edu
default_domain = stanford.edu
}
UTORONTO.CA = {
kdc = kerberos1.utoronto.ca
kdc = kerberos2.utoronto.ca
kdc = kerberos3.utoronto.ca
admin_server = kerberos1.utoronto.ca
default_domain = utoronto.ca
}
[domain_realm]
.mit.edu = ATHENA.MIT.EDU
mit.edu = ATHENA.MIT.EDU
.media.mit.edu = MEDIA-LAB.MIT.EDU
media.mit.edu = MEDIA-LAB.MIT.EDU
.csail.mit.edu = CSAIL.MIT.EDU
csail.mit.edu = CSAIL.MIT.EDU
.whoi.edu = ATHENA.MIT.EDU
whoi.edu = ATHENA.MIT.EDU
.stanford.edu = stanford.edu
.slac.stanford.edu = SLAC.STANFORD.EDU
.toronto.edu = UTORONTO.CA
.utoronto.ca = UTORONTO.CA
[login]
krb4_convert = true
krb4_get_tickets = false
Jag använder mig av 192.168.6.2 som default-gateway då jag sitter i vmware workstation.
Ni får gärna säga till om ni vill ha någon log-fil då jag inte riktigt vet vilken jag ska kolla i detta läge. I syslogen kammar jag noll.
Mvh Emil
Intel Core i5 4670K | Noctua NH-D14 | MSI Z87 G-45 Gaming | Kingston 1600mhz 4x4gb | Asus Turbo 1060 6Gb | Samsung 840 Evo 250gb | Intel 520 Series 240gb | Western Digital caviar black 1Tb | Fractal Design Define R4 Black Pearl | Corsair 750HX | Win 10 64bit | Philips 273E 1920x1080 | Logitech G900 | Razer Blackwidow | Sennheiser PC360 G4me | Samsung Galaxt S9+ |