Guest User

Untitled

a guest
Jan 17th, 2019
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.92 KB | None | 0 0
  1. pitaya
  2.  
  3. search gggm.int
  4. nameserver 192.168.2.26
  5.  
  6. [libdefaults]
  7. default_realm = GGGM.INT
  8. dns_lookup_realm = false
  9. dns_lookup_kdc = true
  10.  
  11. [domain_realm]
  12. .gggm.int = GGGM.INT
  13.  
  14. [global]
  15. netbios name = PITAYA
  16. realm = GGGM.INT
  17. workgroup = GGGM
  18. server role = active directory domain controller
  19. dns forwarder = 192.168.2.1
  20. idmap_ldb:use rfc2307 = yes
  21. log level = 2
  22. server string = Pitaya
  23. winbind enum users = yes
  24. winbind enum groups = yes
  25. template homedir = /home/%U
  26. template shell = /bin/bash
  27. username map = /etc/samba/user.map
  28. kerberos method = secrets and keytab
  29.  
  30. tls enabled = yes
  31. tls keyfile = /var/lib/samba/private/tls/sambaKey.pem
  32. tls certfile = /var/lib/samba/private/tls/sambaCert.pem
  33. tls cafile = /var/lib/samba/private/tls/crt.ca-chain.pem
  34.  
  35. <Share configuration skipped...>
  36.  
  37. [sssd]
  38. services = nss, pam, sudo, ssh
  39. config_file_version = 2
  40. domains = GGGM.INT
  41. full_name_format = %1$s
  42.  
  43. [domain/GGGM.INT]
  44. ad_domain = gggm.int
  45. id_provider = ad
  46. auth_provider = ad
  47. access_provider = ad
  48. sudo_provider = ad
  49. use_fully_qualified_names = false
  50. ldap_id_mapping = false
  51. ldap_referrals = false
  52. override_homedir = /home/%u
  53. enumerate = true
  54. ldap_sudo_search_base = OU=sudoers,OU=gggm.int,DC=gggm,DC=int
  55. ad_gpo_access_control = permissive
  56. dyndns_update = false
  57.  
  58. Linux pitaya 4.14.79-v7+ #1159 SMP Sun Nov 4 17:50:20 GMT 2018 armv7l GNU/Linux
  59.  
  60. root@pitaya ~ # host pitaya
  61. pitaya.gggm.int has address 192.168.2.26
  62. root@pitaya ~ # host 192.168.2.26
  63. 26.2.168.192.in-addr.arpa domain name pointer pitaya.gggm.int.
  64. root@pitaya ~ # host -t SRV _ldap._tcp.gggm.int
  65. _ldap._tcp.gggm.int has SRV record 0 100 389 pitaya.gggm.int.
  66. root@pitaya ~ # host -t SRV _kerberos._tcp.gggm.int
  67. _kerberos._tcp.gggm.int has SRV record 0 100 88 pitaya.gggm.int.
  68. root@pitaya ~ #
  69.  
  70. root@pitaya ~ # kinit ghigad
  71. Password for ghigad@GGGM.INT:
  72. root@pitaya ~ # klist
  73. Ticket cache: FILE:/tmp/krb5cc_0
  74. Default principal: ghigad@GGGM.INT
  75.  
  76. Valid starting Expires Service principal
  77. 03/01/19 12:38:35 03/01/19 22:38:35 krbtgt/GGGM.INT@GGGM.INT
  78. renew until 04/01/19 12:38:32
  79. root@pitaya ~ #
  80.  
  81. root@pitaya ~ # smbclient -k -L pitaya
  82. Domain=[GGGM] OS=[Windows 6.1] Server=[Samba 4.5.12-Debian]
  83.  
  84. Sharename Type Comment
  85. --------- ---- -------
  86. netlogon Disk
  87. sysvol Disk
  88. IPC$ IPC IPC Service (Pitaya)
  89. Domain=[GGGM] OS=[Windows 6.1] Server=[Samba 4.5.12-Debian]
  90.  
  91. Server Comment
  92. --------- -------
  93.  
  94. Workgroup Master
  95. --------- -------
  96. root@pitaya ~ #
  97.  
  98. root@pitaya ~ # kdestroy
  99. root@pitaya ~ # kinit -k PITAYA$
  100. root@pitaya ~ # klist
  101. Ticket cache: FILE:/tmp/krb5cc_0
  102. Default principal: PITAYA$@GGGM.INT
  103.  
  104. Valid starting Expires Service principal
  105. 03/01/19 12:43:17 03/01/19 22:43:17 krbtgt/GGGM.INT@GGGM.INT
  106. renew until 04/01/19 12:43:17
  107. root@pitaya ~ #
  108.  
  109. checking the NETLOGON for domain[GGGM] dc connection to "pitaya.gggm.int" succeeded
  110.  
  111. root@pitaya ~ # samba-tool dbcheck
  112. Processing section "[netlogon]"
  113. Processing section "[sysvol]"
  114. pm_process() returned Yes
  115. schema_fsmo_init: we are master[yes] updates allowed[no]
  116. schema_fsmo_init: we are master[yes] updates allowed[no]
  117. Checking 400 objects
  118. Checked 400 objects (0 errors)
  119.  
  120. root@pitaya ~ # klist -kte
  121. Keytab name: FILE:/etc/krb5.keytab
  122. KVNO Timestamp Principal
  123. ---- ----------------- --------------------------------------------------------
  124. 3 31/12/18 12:16:18 host/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  125. 3 31/12/18 12:16:18 host/PITAYA@GGGM.INT (des-cbc-crc)
  126. 3 31/12/18 12:16:18 host/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  127. 3 31/12/18 12:16:18 host/PITAYA@GGGM.INT (des-cbc-md5)
  128. 3 31/12/18 12:16:18 host/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  129. 3 31/12/18 12:16:18 host/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  130. 3 31/12/18 12:16:18 host/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  131. 3 31/12/18 12:16:18 host/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  132. 3 31/12/18 12:16:18 host/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  133. 3 31/12/18 12:16:18 host/PITAYA@GGGM.INT (arcfour-hmac)
  134. 3 31/12/18 12:16:18 gc/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  135. 3 31/12/18 12:16:18 gc/PITAYA@GGGM.INT (des-cbc-crc)
  136. 3 31/12/18 12:16:18 gc/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  137. 3 31/12/18 12:16:18 gc/PITAYA@GGGM.INT (des-cbc-md5)
  138. 3 31/12/18 12:16:18 gc/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  139. 3 31/12/18 12:16:18 gc/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  140. 3 31/12/18 12:16:18 gc/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  141. 3 31/12/18 12:16:18 gc/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  142. 3 31/12/18 12:16:18 gc/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  143. 3 31/12/18 12:16:18 gc/PITAYA@GGGM.INT (arcfour-hmac)
  144. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  145. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (des-cbc-crc)
  146. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  147. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (des-cbc-md5)
  148. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  149. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  150. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  151. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  152. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  153. 3 31/12/18 12:16:18 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (arcfour-hmac)
  154. 3 31/12/18 12:16:18 ldap/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  155. 3 31/12/18 12:16:18 ldap/PITAYA@GGGM.INT (des-cbc-crc)
  156. 3 31/12/18 12:16:18 ldap/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  157. 3 31/12/18 12:16:18 ldap/PITAYA@GGGM.INT (des-cbc-md5)
  158. 3 31/12/18 12:16:18 ldap/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  159. 3 31/12/18 12:16:18 ldap/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  160. 3 31/12/18 12:16:18 ldap/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  161. 3 31/12/18 12:16:18 ldap/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  162. 3 31/12/18 12:16:18 ldap/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  163. 3 31/12/18 12:16:18 ldap/PITAYA@GGGM.INT (arcfour-hmac)
  164. 3 31/12/18 12:16:18 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  165. 3 31/12/18 12:16:18 restrictedkrbhost/PITAYA@GGGM.INT (des-cbc-crc)
  166. 3 31/12/18 12:16:18 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  167. 3 31/12/18 12:16:18 restrictedkrbhost/PITAYA@GGGM.INT (des-cbc-md5)
  168. 3 31/12/18 12:16:18 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  169. 3 31/12/18 12:16:18 restrictedkrbhost/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  170. 3 31/12/18 12:16:18 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  171. 3 31/12/18 12:16:18 restrictedkrbhost/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  172. 3 31/12/18 12:16:18 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  173. 3 31/12/18 12:16:18 restrictedkrbhost/PITAYA@GGGM.INT (arcfour-hmac)
  174. 3 31/12/18 12:16:18 krbtgt/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  175. 3 31/12/18 12:16:18 krbtgt/PITAYA@GGGM.INT (des-cbc-crc)
  176. 3 31/12/18 12:16:18 krbtgt/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  177. 3 31/12/18 12:16:18 krbtgt/PITAYA@GGGM.INT (des-cbc-md5)
  178. 3 31/12/18 12:16:18 krbtgt/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  179. 3 31/12/18 12:16:19 krbtgt/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  180. 3 31/12/18 12:16:19 krbtgt/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  181. 3 31/12/18 12:16:19 krbtgt/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  182. 3 31/12/18 12:16:19 krbtgt/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  183. 3 31/12/18 12:16:19 krbtgt/PITAYA@GGGM.INT (arcfour-hmac)
  184. 3 31/12/18 12:16:19 PITAYA$@GGGM.INT (arcfour-hmac)
  185. 3 31/12/18 12:16:19 PITAYA$@GGGM.INT (aes256-cts-hmac-sha1-96)
  186. 3 31/12/18 12:16:19 PITAYA$@GGGM.INT (aes128-cts-hmac-sha1-96)
  187. 3 31/12/18 12:16:19 PITAYA$@GGGM.INT (des-cbc-md5)
  188. 3 31/12/18 12:16:19 PITAYA$@GGGM.INT (des-cbc-crc)
  189.  
  190. root@pitaya ~ # wbinfo -a ghigad
  191. Enter ghigad's password:
  192. plaintext password authentication succeeded
  193. Enter ghigad's password:
  194. challenge/response password authentication failed
  195. wbcAuthenticateUserEx(GGGMghigad): error code was NT_STATUS_WRONG_PASSWORD (0xc000006a)
  196. error message was: Wrong Password
  197. Could not authenticate user ghigad with challenge/response
  198. root@pitaya ~ #
  199.  
  200. root@pitaya ~ # kinit -k
  201. kinit: Preauthentication failed while getting initial credentials
  202. root@pitaya ~ #
  203.  
  204. [2019/01/03 12:51:23.391820, 3] ../source4/auth/kerberos/krb5_init_context.c:80(smb_krb5_debug_wrapper)
  205. Kerberos: Failed to decrypt PA-DATA -- host/pitaya.gggm.int@GGGM.INT (enctype aes256-cts-hmac-sha1-96) error Decrypt integrity check failed for checksum type hmac-sha1-96-aes256, key type aes256-cts-hmac-sha1-96
  206. [2019/01/03 12:51:23.392318, 5] ../source4/dsdb/common/util.c:5252(dsdb_update_bad_pwd_count)
  207. Not updating badPwdCount on CN=PITAYA,OU=Domain Controllers,DC=gggm,DC=int after wrong password
  208. [2019/01/03 12:51:23.392435, 3] ../source4/auth/kerberos/krb5_init_context.c:80(smb_krb5_debug_wrapper)
  209. Kerberos: Failed to decrypt PA-DATA -- host/pitaya.gggm.int@GGGM.INT
  210.  
  211. [sssd]
  212. services = nss, pam, sudo, ssh, pac, ifp
  213.  
  214. root@pitaya /usr/sbin # sssctl domain-status gggm.int
  215. Online status: Offline
  216.  
  217. Active servers:
  218. AD Global Catalog: not connected
  219. AD Domain Controller: pitaya.gggm.int
  220.  
  221. Discovered AD Global Catalog servers:
  222. None so far.
  223.  
  224. Discovered AD Domain Controller servers:
  225. - pitaya.gggm.int
  226.  
  227. root@pitaya ~ # rm /etc/krb5.keytab
  228. root@pitaya ~ # net ads keytab create -P
  229. kerberos_kinit_password GGGM@GGGM.INT failed: Client not found in Kerberos database
  230. kerberos_kinit_password GGGM@GGGM.INT failed: Client not found in Kerberos database
  231. kerberos_kinit_password GGGM@GGGM.INT failed: Client not found in Kerberos database
  232. kerberos_kinit_password GGGM@GGGM.INT failed: Client not found in Kerberos database
  233. root@pitaya ~ # net ads keytab create -U ghigad
  234. Enter ghigad's password:
  235. kerberos_kinit_password GGGM@GGGM.INT failed: Client not found in Kerberos database
  236. kerberos_kinit_password GGGM@GGGM.INT failed: Client not found in Kerberos database
  237.  
  238. root@pitaya ~ # kinit ghigad
  239. Password for ghigad@GGGM.INT:
  240. root@pitaya ~ # net ads keytab create -k
  241. root@pitaya ~ # klist -ke
  242. Keytab name: FILE:/etc/krb5.keytab
  243. KVNO Principal
  244. ---- --------------------------------------------------------------------------
  245. 3 host/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  246. 3 host/PITAYA@GGGM.INT (des-cbc-crc)
  247. 3 host/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  248. 3 host/PITAYA@GGGM.INT (des-cbc-md5)
  249. 3 host/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  250. 3 host/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  251. 3 host/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  252. 3 host/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  253. 3 host/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  254. 3 host/PITAYA@GGGM.INT (arcfour-hmac)
  255. 3 gc/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  256. 3 gc/PITAYA@GGGM.INT (des-cbc-crc)
  257. 3 gc/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  258. 3 gc/PITAYA@GGGM.INT (des-cbc-md5)
  259. 3 gc/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  260. 3 gc/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  261. 3 gc/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  262. 3 gc/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  263. 3 gc/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  264. 3 gc/PITAYA@GGGM.INT (arcfour-hmac)
  265. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  266. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (des-cbc-crc)
  267. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  268. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (des-cbc-md5)
  269. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  270. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  271. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  272. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  273. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  274. 3 e3514235-4b06-11d1-ab04-00c04fc2dcd2/PITAYA@GGGM.INT (arcfour-hmac)
  275. 3 ldap/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  276. 3 ldap/PITAYA@GGGM.INT (des-cbc-crc)
  277. 3 ldap/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  278. 3 ldap/PITAYA@GGGM.INT (des-cbc-md5)
  279. 3 ldap/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  280. 3 ldap/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  281. 3 ldap/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  282. 3 ldap/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  283. 3 ldap/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  284. 3 ldap/PITAYA@GGGM.INT (arcfour-hmac)
  285. 3 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  286. 3 restrictedkrbhost/PITAYA@GGGM.INT (des-cbc-crc)
  287. 3 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  288. 3 restrictedkrbhost/PITAYA@GGGM.INT (des-cbc-md5)
  289. 3 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  290. 3 restrictedkrbhost/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  291. 3 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  292. 3 restrictedkrbhost/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  293. 3 restrictedkrbhost/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  294. 3 restrictedkrbhost/PITAYA@GGGM.INT (arcfour-hmac)
  295. 3 krbtgt/pitaya.gggm.int@GGGM.INT (des-cbc-crc)
  296. 3 krbtgt/PITAYA@GGGM.INT (des-cbc-crc)
  297. 3 krbtgt/pitaya.gggm.int@GGGM.INT (des-cbc-md5)
  298. 3 krbtgt/PITAYA@GGGM.INT (des-cbc-md5)
  299. 3 krbtgt/pitaya.gggm.int@GGGM.INT (aes128-cts-hmac-sha1-96)
  300. 3 krbtgt/PITAYA@GGGM.INT (aes128-cts-hmac-sha1-96)
  301. 3 krbtgt/pitaya.gggm.int@GGGM.INT (aes256-cts-hmac-sha1-96)
  302. 3 krbtgt/PITAYA@GGGM.INT (aes256-cts-hmac-sha1-96)
  303. 3 krbtgt/pitaya.gggm.int@GGGM.INT (arcfour-hmac)
  304. 3 krbtgt/PITAYA@GGGM.INT (arcfour-hmac)
  305. 3 PITAYA$@GGGM.INT (des-cbc-crc)
  306. 3 PITAYA$@GGGM.INT (des-cbc-md5)
  307. 3 PITAYA$@GGGM.INT (aes128-cts-hmac-sha1-96)
  308. 3 PITAYA$@GGGM.INT (aes256-cts-hmac-sha1-96)
  309. 3 PITAYA$@GGGM.INT (arcfour-hmac)
  310.  
  311. root@pitaya ~ # rm /etc/krb5.keytab
  312. root@pitaya ~ # samba-tool domain exportkeytab /etc/krb5.keytab --principal=PITAYA$
  313. Export one principal to /etc/krb5.keytab
  314. root@pitaya ~ # klist -ke
  315. Keytab name: FILE:/etc/krb5.keytab
  316. KVNO Principal
  317. ---- --------------------------------------------------------------------------
  318. 3 PITAYA$@GGGM.INT (arcfour-hmac)
  319. 3 PITAYA$@GGGM.INT (aes256-cts-hmac-sha1-96)
  320. 3 PITAYA$@GGGM.INT (aes128-cts-hmac-sha1-96)
  321. 3 PITAYA$@GGGM.INT (des-cbc-md5)
  322. 3 PITAYA$@GGGM.INT (des-cbc-crc)
  323. root@pitaya ~ # service sssd restart
  324. root@pitaya ~ # sssctl domain-status gggm.int
  325. Online status: Online
  326.  
  327. Active servers:
  328. AD Global Catalog: pitaya.gggm.int
  329. AD Domain Controller: pitaya.gggm.int
  330.  
  331. Discovered AD Global Catalog servers:
  332. - pitaya.gggm.int
  333.  
  334. Discovered AD Domain Controller servers:
  335. - pitaya.gggm.int
Add Comment
Please, Sign In to add comment