Samba AD DC on Rhel9
Posted by im_vatsa@reddit | linuxadmin | View on Reddit | 19 comments
I have been tasked to explore options to migrate from windows active directory to samba AD dc with minimal.
- most of my clients are windows machine
I belong to banking domain..
Wat are ur opinion on moving to samba AD dc and is rhel9 an good option or I need to look into debain or other ?
And is it easy to migrate after addding samba AD dc along Microsoft ad?
UserSPD@reddit
I believe the tools offered by rcdevs security will help you with migration easily.
cjbarone@reddit
If you're not hosting Exchange internally, and are wanting to get off the MS Stack, and have people willing to learn Linux, go for it.
I use it on Debian. Over 50 sites using it, and it's been rock solid compared to random Windows Updates killing DCs on Windows Server....
edthesmokebeard@reddit
on Windows Server... what? The post just ended.
ImNotABotScoutsHonor@reddit
Are you a goddamn bot?
You must be to not understand ellipses and their usage in the multiple comments you've replied to on this post that used them...
edthesmokebeard@reddit
Were you going to finish your sentence?
Unnamed-3891@reddit
Samba AD has always seemed more of a curiosity. It’s hard to take things seriously when you have to manually setup rsync cron jobs for sysvol replication (at least that used to be the case some time ago).
The combination of banking industry and the request posed raise a lot of questions…
edthesmokebeard@reddit
Was there more to your post? You made some bold statements then it just trailed off.
Unnamed-3891@reddit
What statement did you find bold?
J4yD4n@reddit
Don't do it. It's possible, but it's absolutely horrific. You have real Microsoft AD. Don't switch to Temu AD.
RealmOfTibbles@reddit
To add to this domain function level is 2012 R2 at best, schema level can be higher but things won’t work.
hortimech@reddit
It is up to 2016 now, please keep up.
RealmOfTibbles@reddit
To my knowledge unless your using samba plus releases rhel9 does not have the new enough version packaged for it.
Yes newer recent releases do have it. My last work ran a standalone ad dc on 22.04 which also didn’t support it and sadly got scrapped before the initial support was tested in 24.04 releases when we looked to upgrade.
hortimech@reddit
The RHEL Samba packages have never been able to provision an AD domain, redhat decided to go with freeipa instead and that isn't AD. If you do want a DC on RHEL and don't want to pay Samba+, then there are always the Tranquil IT Samba packages. Ubuntu is probably always going to be behind the latest Samba versions on their LTS releases.
dodexahedron@reddit
🤣
Seriously though, OP.
Just don't.
It was fine for NT domains and got along ok for a while until MS started giving a shit about hardening things that had been allowed to go lax in the name of NT4 compatibility and who knows what else for so long. It does not make for a good time in a modern AD environment, if operating as a legit domain controller.
So don't do it unless you're enough of an AD (and Linux, and Samba) guru that you don't need to ask the question you asked.
Group policy is painful.
You really need to not run SMB on a Samba DC other than the netlogon and sysvol for the dc.
Replication is painful.
Kerberos support is not actually supported in Windows-compatible form (MS uses MIT Kerberos), is rickety, and has big gapscin features, capabilities, and basic functionality you have out of the box in windows, including credential guard.
Documentation is even worse than Microsoft Server documentation for being randomly and painfully out of date. Blogs around the net are just as bad (or worse), plus a heaping helping of cargo cult administration in those.
It still accepts blank machine account passwords.
LAPS is broken past windows 10.
Linux is incapable of faithfully representing NTFS ACLs, which causes all sorts of fun edge cases issues with all sorts of things that mostly manifest as security holes you are not aware of or annoying but not show-stopping random access denied responses to normal system operations from windows domain members. It fakes it entirely through Samba itself, which also cant do the job fully because SMB ACLs are also not the same as NT ACLs (but at least are closer than Unix file modes, so get most of the job done most of the time). It makes heavy use of extended attributes to replicate as much of Windows ACL behavior as possible, and it REALLY amplifies the volume of tiny random IO for all operations (ZFS can actually help reduce the IOPS pain of that and supports NFS ACLs, too, which were based on NTFS ACLs...but linux does not natively support them, so you have some difficult hoops to jump through to make that all happen...).
Today, it is ok-ish as a print server or light duty file server, but really is woefully and dangerously inadequate in modern AD as a DC and is a nightmare to install, troubleshoot, configure, troubleshoot, test, troubleshoot, actually set up in production trusting that things will be ok, troubleshoot, find 50cworkaroubds for things that all just slightly don't work quite right, troubleshoot, authoritative ntds restore on your PDCe when you hose the production directory, troubleshoot, take a cold shower, troubleshoot, and drink yourself into an early grave, after the next monthly windows security update makes the Samba DC that you just finally got barely working kinda (a little) becomes unusable again due to a change announced years ago that Samba never had support for hacked into it despite the increasingly urgent announcements from MS along the way.
Shit, you can't even audit smb1 snd ntlm usage, on Samba today, as "well" as windows only recently got somewhat better audit log text descriptions for. And that's a looowwww bar.
Anyone who claims with their whole chest that Samba can participate in modern AD as a domain controller without introducing serious security issues doesn't know they've already been pwned.
Just use Windows for AD. Let Linux boxen join AD via kerberos and LDAP. That works well.
_st_daime_@reddit
It's doable, however, can you clarify with details what's the problem you currently have, what are you trying to achieve with this kind of change? Ex. Performance? Cost optimization?
GurgleBlaster68@reddit
I run DCs on Debian. No major problems at all after setup, only a couple of small issues when upgrading Debian (started with 9, now on 13). But my domain is small, about 50 Windows clients. Personally, I wouldn't dare to run it in the banking industry, because of various requirements, but that's on me.
dataexception@reddit
Depending on the size of your organization, you might want to look at Nubus core edition.
mschauf@reddit
Try Univention - its Enterprise ready AD!
hemohes222@reddit
Have you looked at Zentyal?