Support #386
Updated by Daniel Curtis over 10 years ago
Samba4. It’s almost here. A true Active Directory replacement for the open source world has arrived. Needless to say, I’m pretty excited about it. What’s really cool is that you can manage it using your own LDAP editor, or you can simply use the AD tools straight from Microsoft. Since I’ve administered Active Directory networks for years, this is my preferred method of administering it. In addition Active Directory has such a strong foothold in modern businesses, most IT administrators will be used to performing day to day tasks through the Microsoft AD tools. I’ll show you how I installed Samba4 and got it working as a replacement for AD domain controllers on a fresh install of FreeBSD 9. h2. Preparing the System Here’s the overview of the network: DC1: sambaLDAP01.example.com DC2: sambaLDAP02.example.com DC01 IP: 192.168.1.254 DC02 IP: 192.168.1.253 Existing Router/DNS Server: 192.168.1.1 Domain: example.com * First of all, Samba4 is really bleeding edge at the time of this writing, so you’ll want to make sure your ports tree is up to date: <pre> portsnap fetch extract portsnap update </pre> * Now Samba4 requires ACL’s to be enabled on the file system. Wherever you’ve installed the Samba4 data is the partition you’ll need to add ACL’s. This example is the bare bones simple install of /swap and / <pre> edit /etc/fstab </pre> * Since I’m going to install Samba4 to the / partition, I’ll add the ACL option to it: <pre> # Device Mountpoint FStype Options Dump Pass# /dev/ada0p2 / ufs rw,acls 1 1 /dev/ada0p3 none swap sw 0 0 </pre> Since I don’t feel like rebooting my system to apply it, I’ll simply remount the partition: <pre> mount -o acls / </pre> * You will also need to update your @resolv.conf@ file to reflect the domain: <pre> edit /etc/resolv.conf </pre> * Here’s an example of what it should look like: <pre> # Generated by resolvconf search EXAMPLE.COM domain example.com nameserver 192.168.1.254 nameserver 192.168.1.253 nameserver 192.168.1.1 #Fallback DNS IP </pre> You will also need to ensure that all of your systems are getting NTP time from the same NTP source. Starting with FreeBSD9, ntpd will start automatically if you set it up using the sysinstall tool. Refer to FreeBSD’s documentation on how to use it. h2. Installing Samba4 * Install Samba4: <pre> cd /usr/ports/net/samba4 make config make install clean </pre> *NOTE*: If you plan to use BIND as the DNS server, make sure to set it when running @make config@. * Now let’s provision Samba4 as a Domain Controller (for the DNS we’ll use BIND9_DLZ for now; since this is what I set earlier). Since I am also running on a system with ZFS, I need to specify the @--use-ntvfs@ option: <pre> mkdir /var/db/samba4 /usr/local/samba/bin/samba-tool domain provision --use-ntvfs --use-rfc2307 --interactive </pre> > Realm: *example.com* > Domain [example]: *example* > Server Role (dc, member, standalone) [dc]: *dc* > DNS backend (SAMBA_INTERNAL, BIND9_FLATFILE, BIND9_DLZ, NONE) [SAMBA_INTERNAL]: *BIND9_DLZ* > DNS forwarder IP address (write 'none' to disable forwarding): *192.168.1.1* > Administrator password: *SuperSecretPassword* > Retype password: *SuperSecretPassword* * Now let’s start Samba4: <pre> /usr/local/samba/sbin/samba </pre> * Now let’s finish configuring Kerberos <pre> ln -s /usr/local/samba/share/setup/krb5.conf /etc/krb5.conf edit /etc/krb5.conf </pre> * Now, you’ll need to modify @krb5.conf@ to match your domain. The following is an example config (CAPS DO MATTER): <pre> [libdefaults] default_realm = EXAMPLE.COM dns_lookup_realm = false dns_lookup_kdc = true </pre> h2. Testing Samba4 * First let’s run this to test the domain: <pre> /usr/local/samba/bin/smbclient -L localhost -U% </pre> * You should see output for your domain. Now let’s test the administrative login: <pre> /usr/local/samba/bin/smbclient //localhost/netlogon -UAdministrator%'' -c 'ls' </pre> * If that’s all good, let’s test DNS: <pre> host -t SRV _ldap._tcp.example.com </pre> > _ldap._tcp.example.com has SRV record 0 100 389 sambaLDAP01.example.com. * And now let’s test the Kerberos DNS record: <pre> host -t SRV _kerberos._udp.example.com </pre> > _kerberos._udp.example.com has SRV record 0 100 88 sambaLDAP01.example.com. * And finally, let’s test our DNS A record: <pre> host -t A sambaLDAP01.example.com </pre> > sambaLDAP01.example.com has address 192.168.1.254 * Now let’s test logging in as Administrator user (using Kerberos): <pre> kinit administrator@EXAMPLE.COM </pre> * And now run this to see your Kerberos ticket: <pre> klist </pre> h2. Auto Starting Samba Since Samba4 hasn’t been fully ported for FreeBSD yet, there’s no RC startup script. Here’s a quick and dirty startup script: <pre> edit /usr/local/etc/rc.d/samba </pre> Here’s the contents of my script. I make no promises that it’ll work 100% of the time, and it doesn’t do any pre-requisite checks, but here you go: <pre> #!/bin/sh # # $FreeBSD: release/9.0.0/etc/rc.d/samba # # PROVIDE: samba # REQUIRE: NETWORKING syslogd named # KEYWORD: nojail . /etc/rc.subr name="samba" rcvar=`set_rcvar` command="/usr/local/samba/sbin/${name}" stop_cmd="samba_stop" start_cmd="samba_start" restart_cmd="samba_restart" samba_start() { echo "Starting Samba4." ${command} } samba_stop() { echo "Stopping Samba4." killall samba rm -v -- /usr/local/samba/var/run/samba.pid rm -v -- /usr/local/samba/var/run/smbd.pid } samba_restart() { echo "Stopping Samba4." killall samba rm -v -- /usr/local/samba/var/run/samba.pid rm -v -- /usr/local/samba/var/run/smbd.pid echo "Starting Samba4." ${command} } load_rc_config $name run_rc_command "$1" </pre> Now let’s add it to rc.conf: <pre> echo 'samba_enable="YES"' >> /etc/rc.conf </pre> h2. Configuring BIND 9 h2. Resources * http://wiki.samba.org/index.php/Samba_AD_DC_HOWTO