
		gbernardes
		
		(usa CentOS)
		
		Enviado em 30/06/2010 - 11:06h 
		Estou tentando implantar um proxy transparente com autenticação integrada ao Active Directory. Porém não consigo fazer com que o servidor entre no domínio, ja revirei internet, segui vários tutorias, porém sempre me deparo com o mesmo problema. Estou usando o seguinte cenário:
* Proxy -> CentOS 5.4
* AD -> Windows 2008 SBS
Abaixo o erro:
# net ads join -U root
root's password:
Using short domain name -- MEUDOMINIO
Failed to set servicePrincipalNames. Please ensure that
the DNS domain of this server matches the AD domain,
Or rejoin with using Domain Admin credentials.
Deleted account for 'SRV02' in realm 'MEUDOMINIO.LOCAL'
Failed to join domain: Type or value exists
Tentando de outra forma:
# net ads join -U root -S MEUDOMINIO.LOCAL
root's password:
[2010/06/30 10:47:08, 0] libads/sasl.c:ads_sasl_spnego_bind(330)
  kinit succeeded but ads_sasl_spnego_krb5_bind failed: Server not found in Kerberos database
Failed to join domain: Improperly formed account name
Erro de senha não é porque da outro erro:
# net ads join -U root -S MEUDOMINIO.LOCAL
root's password:
[2010/06/30 10:50:02, 0] libads/kerberos.c:ads_kinit_password(228)
  kerberos_kinit_password root@MEUDOMINIO.LOCAL failed: Preauthentication failed
Failed to join domain: Logon failure
Estou seguindo os seguintes tutoriais:
http://www.linuxman.pro.br/autenticando_o_squid_no_ad_via_ntlm.pdf
http://www.vivaolinux.com.br/artigo/Integrando-autenticacao-do-Squid-ao-Active-Directory/
Tentei vários outras formas, mas em todos resultei nesse mesmo problema. Segue abaixo os arquivos de configurãção:
/etc/krb5.conf
[libdefaults]
 default_realm = MEUDOMINIO.LOCAL
        krb4_config = /etc/krb.conf
        krb4_realms = /etc/krb.realms
        kdc_timesync = 1
        cchache_type = 4
        forwardale = true
        proxiable = true
   v4_instance_resolve = false
   v4_name_convert = {
        host = {
                rcmd = host
                ftp = ftp
                }
        plain = {
                something = something-else
                }
        }
        fcc-mit-ticketiflags = true
[realms]
 MEUDOMINIO.LOCAL = {
  kdc = 192.168.0.2
  admin_server = 192.168.0.2:749
  default_domain = 192.168.0.2
 }
[logging]
 default = FILE:/var/log/krb5libs.log
 kdc = FILE:/var/log/krb5kdc.log
 admin_server = FILE:/var/log/kadmind.log
[domain_realm]
 .meudominio.local = MEUDOMINIO.LOCAL
 meudominio.local = MEUDOMINIO.LOCAL
[login]
krb4_convert = true
krb4_get_tickets = false
_______________________________________________________
smb.conf
[global]
   workgroup = MEUDOMINIO
   password server = srv01.meudominio.local
   realm = MEUDOMINIO.LOCAL
   security = ads
   idmap uid = 10000-20000
   idmap gid = 10000-20000
   winbind separator = +
   template shell = /bin/bash
   winbind use default domain = true
   winbind offline logon = false
   netbios name = SRV02
   server string = Server 2
   load printers = no
   log file = /var/log/samba/log.%m
   max log size = 500
   auth methods = winbind
   encrypt passwords = yes
   winbind cache time = 15
   winbind enum users = yes
   local master = no
   os level = 233
   preferred master = no
   wins server = 192.168.0.2
   dns proxy = no
   ldap ssl = no
_________________________________________________________
/etc/nsswitch.conf
#
# Legal entries are:
#
#       nisplus or nis+         Use NIS+ (NIS version 3)
#       nis or yp               Use NIS (NIS version 2), also called YP
#       dns                     Use DNS (Domain Name Service)
#       files                   Use the local files
#       db                      Use the local database (.db) files
#       compat                  Use NIS on compat mode
#       hesiod                  Use Hesiod for user lookups
#       [NOTFOUND=return]       Stop searching if not found so far
#
# To use db, put the "db" in front of "files" for entries you want to be
# looked up first in the databases
#
# Example:
#passwd:    db files nisplus nis
#shadow:    db files nisplus nis
#group:     db files nisplus nis
passwd:     files winbind
shadow:     files
group:      files winbind
#hosts:     db files nisplus nis dns
hosts:      files dns winbind
# Example - obey only what nisplus tells us...
#services:   nisplus [NOTFOUND=return] files
#networks:   nisplus [NOTFOUND=return] files
#protocols:  nisplus [NOTFOUND=return] files
#rpc:        nisplus [NOTFOUND=return] files
#ethers:     nisplus [NOTFOUND=return] files
#netmasks:   nisplus [NOTFOUND=return] files
bootparams: nisplus [NOTFOUND=return] files
ethers:     files
netmasks:   files
networks:   files
protocols:  files
rpc:        files
services:   files
netgroup:   files
publickey:  nisplus
automount:  files
aliases:    files nisplus