**Requirements**
====== Development libraries and Programs ======
If you to plan to install Samba from sources, you must install the following dependencies. If you install Samba4 using package manager, you need only install the recommends dependencies.
** Required **
These packages are required for a successful build of Samba 4
* Python -- A good portion of Samba is written using python, including the build system itself (waf).
** Recommended optional development libraries and Programs: **
In most distributions these libraries will be labeled with a lib*-dev or lib*-devel, for example for the Debian or Ubuntu acl would be libacl1-dev, but in Fedora, RHEL, CentOS, and openSUSE its named libacl-devel.
* acl -- Required for a successful AD DC deployment. If this library is not included, samba will build successfully, however you will not be able to change ACL's from the windows frontend. You will receive and error when you provision and if you manually create the smb.conf with +s3fs, you will get Access is denied. from windows on any attempt to change ACL's.
* xattr
* blkid
* gnutls
* readline
* openldap -- Required to build the Samba3 components with LDAP support. Lacking this library the build will complete but attempts to provision (via upgrade) an Active Directory domain from an existing Samba3 LDAP Backend will fail. Also see samba-tool domain classicupgrade
* cups -- for printer sharing support
* bsd or setproctitle - for process title updating support
* xsltproc and docbook XSL stylesheets -- Required for building man pages and other documentation
===== Distribution Setup =====
The examples following will cover all of these libraries. It will also cover bind, kerberos, and file system tools. If you plan to use the internal DNS server, you do not need bind, but you do still need the package that contains the nsupdate binary.
=== Debian or Ubuntu ===
# apt-get install build-essential libacl1-dev libattr1-dev libblkid-dev libgnutls-dev libreadline-dev python-dev python-dnspython gdb pkg-config libpopt-dev libldap2-dev dnsutils libbsd-dev attr krb5-user docbook-xsl libcups2-dev acl
**//Note//**: docbook-xsl, xsltproc, and inkscape may be required for building the man pages.
**//Note//**: if you need pam winbind support you will need the libpam0g-dev package installed.
If you plan to use Samba4 Sernet Repository, follow the instructions in: [[reposwiki#samba4_sernet|Samba4 Sernet Repository Wiki]] and install this packages:
# apt-get install dnsutils attr krb5-user acl
=== Fedora ===
# yum install libacl-devel libblkid-devel gnutls-devel readline-devel python-devel gdb pkgconfig libattr-devel krb5-workstation
=== CentOS ===
# yum install gcc libacl-devel libblkid-devel gnutls-devel readline-devel python-devel gdb pkgconfig krb5-workstation zlib-devel setroubleshoot-server libaio-devel setroubleshoot-plugins policycoreutils-python libsemanage-python setools-libs-python setools-libs popt-devel libpcap-devel sqlite-devel libidn-devel libxml2-devel libacl-devel libsepol-devel libattr-devel keyutils-libs-devel cyrus-sasl-devel cups-devel bind-utils
====== File System Support ======
----
To use the advanced features of Samba4 you need a filesystem that supports both the "user" and "system" xattr namespaces.
You need this support on file systems that you will share with samba. For many users that will be their /home volume. However the 'samba-tool' provision command also tests support by creating a temporary file in the 'sysvol'. This might be /usr/local/samba for a local install, or might be somewhere else. That filesystem also needs to have ACL and XATTR support.
=== ext3/ext4 File System ===
If you are using either ext3 or ext4 for your file system you will need to include the options "user_xattr","acl" and "barrier=1" in your /etc/fstab. For example:
# / was on /dev/sda5 during installation
UUID=5e6e3446-5963-466e-86a7-b6376442d743 / ext4 errors=remount-ro,user_xattr,acl,barrier=1 1 1
Simply change ext4 to ext3 if you are using it. Normally you will want to just modify the existing line to add those options. Please use caution when modifying your fstab as it can lead to an un-bootable system if the wrong thing is modified.
The barrier=1 option ensures that tdb transactions are safe against unexpected power loss. A number of sites have corrupted their AD database in sam.ldb by not having this option enabled.
Then restart the server to apply the changes or type:
# mount -a
If you plan to use a Proxmox containar to deploy Samba4 AD DC; logging in Proxmox Server through ssh, modify /etc/fstab file and adjust with the following:
/dev/pve/data /var/lib/vz ext3 defaults,user_xattr,acl,barrier=1 1 1
Finally remount the file system:
# mount -a
You also need to compile your kernel with the XATTR, SECURITY, and POSIX_ACL options for your filesystem (In Debian and Ubuntu those options are enabled by default). For ext4 that means you need (change the 4 to a 3 for ext3):
CONFIG_EXT4_FS_XATTR=y
CONFIG_EXT4_FS_SECURITY=y
CONFIG_EXT4_FS_POSIX_ACL=y
If you are running a Linux 2.6 (or greater) kernel with CONFIG_IKCONFIG_PROC defined you can check this with the following command in Debian/Ubuntu:
# zgrep CONFIG_EXT4_FS /boot/config-`uname -r`
===== File Systems without xattr support (older filesystem) =====
If you don't have a filesystem with xattr support, then you can simulate it by adding the following line to your smb.conf:
posix:eadb = /usr/local/samba/eadb.tdb
that will place all extra file attributes (NT ACLs, DOS EAs, streams etc), in that tdb. It is not efficient, and doesn't scale well, but at least it gives you a choice when you don't have a modern filesystem.
===== Testing the File System =====
To test your filesystem support, run the following 4 commands as root:
# touch test.txt
# setfattr -n user.test -v test test.txt
# setfattr -n security.test -v test2 test.txt
# getfattr -d test.txt
# getfattr -n security.test -d test.txt
You should see output like this:
# file: test.txt
user.test="test"
# file: test.txt
security.test="test2"
For ACL testing do the following as root:
# touch test3.txt
# setfacl -m g:adm:rwx test3.txt
# getfacl test3.txt
and you should get a line like group:adm:rwx in your output.
If you get any "Operation not supported" errors then it means your kernel is not configured correctly, or your filesystem is not mounted with the right options.
If you get any "Operation not permitted" errors then it probably means you didn't try the test as root.
If you are using the posix:eadb option then you don't need to test your filesystem in this manner.
====== DNS Server ======
----
A working DNS setup is essential to the correct operation of Samba and AD. Without the right DNS entries, Kerberos won't work, which in turn means that many of the basic features won't work! It is worth spending some extra time to ensure your DNS setup is correct, as debugging problems caused by mis-configured DNS can take a lot of time later on. To manage DNS entries the DNS MMC on a Windows client can be used, or samba-tool on Linux - see DNS Administration for more information.
Samba provides two posible backend for DNS:
- **Internal DNS**: The internal DNS server is built into Samba and uses AD as backend. Also it is the default DNS solution when you provisioning/upgrading an Samba AD controller. The internal DNS is a new implementation, that allows to quick and easy setup of the DNS backend, that is required for every AD installation. No further work is required to set it up. Currently it covers the important and required parts for AD.
- **Bind9 dlz plugin**: BIND can be setup to provide DNS resolving for zones managed in AD. They are accessable from BIND through the DLZ (dynamically loadable zones) plug-in. If you already having BIND running, plan complex DNS setups or you require special functions (zone transfers only from defined hosts, etc.), that are currently not supported by the internal DNS, BIND should be the preferred backend.
===== Internal DNS =====
If you chose the internal server as DNS backend for your environment, there are two options that can be added to your smb.conf to control the behavior of DNS at this point:
# Don't allow any updates | allow unsigned updates | only allow signed updates
allow dns updates = False | nonsecure | signed
# If recursive queries = yes is set, the following is also needed
dns forwarder =
**//Note://** You should add this options after provisioned your Samba4.
** Limitations / Known issues ([[https://wiki.samba.org/index.php/DNS#Limitations_.2F_Known_issues]]) **
* Unordered List ItemThe internal server is not a caching resolver.
* The samba_dnsupdate command produces warnings when used with signed updates. We're currenly investigating a fix for the warnings, but the updates actually succeed. Client systems like samba3 or Win7 work fine.
* Currently, recursive queries are not possible without using a forwarder.
* Negative replies do not come with an authority record (not required by RFC, but Windows seems to like that).
* Shared-key TSIG is not implemented.
* Stub zones are not implemented.
===== Bind9 DLZ plugin =====
Bind as backend for your Samba Active Directory Domain Controller is currently supported in version 9.8 and 9.9 only. Users of Bind 9.7 are strongly encouraged to upgrade!
Recent version of Debian (Debian 7 and up) and Ubuntu (12.04 LTS) have Bind 9.8.x and Bind 9.9.x.
But make sure that your vendor compiled Bind with the '- -with-gssapi' and '- -with-dlopen' options before using it as Samba AD DNS backend. In Debian Wheezy the '- -with-dlopen' not is present, but Bind9 works fine with dlz plugin.
To install Bind9 DNS server from repositories:
# apt-get install bind9 bind9utils
To check compiled options for your Bind9 installation
# named -V
To configure forwarders:
* Edit /etc/bind/named.conf.options and add the forwarders. You must locate and uncomment the lines associated with the forwarders.
To enable external queries:
* Edit /etc/bind/named.conf.options and add the following between "{ ... }"
allow-query { 10.12.0.0/16; };
For any networks you can add "any;"
Then restart bind9 deamon to apply the changes:
# service bind9 restart
===== Changing DNS backend =====
You can change the DNS backend without problem.
** Changing from Internal DNS to BIND **
* Setup BIND.
* Shutdown Samba.
* Migrate the zonefiles to BIND9_DLZ:
# samba_upgradedns --dns-backend=BIND9_DLZ
* Remove the 'dns' option from the 'server services = ' parameter in your smb.conf, or change it to '-dns':
server services = ........ -dns
===== Changing from BIND to Internal DNS =====
* Unordered List ItemShutdown BIND and Samba.
* Migrate the zonefiles to internal DNS:
# samba_upgradedns --dns-backend=SAMBA_INTERNAL
* Add 'dns' option to the 'server services = ' parameter in your smb.conf:
server services = ........ dns
* Start Samba
===== Debugging Bind as Samba AD backend =====
For enabling debugging on the Bind DLZ module, change the following line in '/usr/local/samba/private/named.conf' from
database "dlopen .../bin/modules/bind9/dlz_bind9.so";
to
database "dlopen .../bin/modules/bind9/dlz_bind9.so -d 3";
If you are running Bind 9.9, then add the '-d 3' to the corresponding line.
Stop Bind and run the service manually to capture logs:
# /usr/sbin/named -u named -f -g 2>&1 | tee named.log
===== Known issues and ways to fix/workaround =====
** New added DNS entries are not resolvable **
If you have problems with resolving new added DNS entries using the BIND9 DLZ interface, you maybe want to check the following:
Files in 'samba/private/dns/sam.ldb.d/' are hardlinks to 'samba/private/sam.ldb.d/'. Maybe you've copied/moved it across filesystems and the hardlinking got lost and you're now running with two different copies of the databases at the moment (You can test this by adding a new DNS entry, e. g. by 'samba-tool'. If you can't resolve it, check if the inodes differ).
If you 'ls -i' on the two folders, you should see, that the following files have the same inodes (what indicates, that they are hard-linked):
# cd /usr/local/samba/private/
# ls -lai sam.ldb.d/
32404 -rw-rw---- 2 root bind 4251648 Mar 5 11:39 DC=DOMAINDNSZONES,DC=UGENT2,DC=BE.ldb
32405 -rw-rw---- 2 root bind 4251648 Mar 5 11:39 DC=FORESTDNSZONES,DC=UGENT2,DC=BE.ldb
32397 -rw-rw---- 2 root bind 421888 Mar 6 00:11 metadata.tdb
# ls -lai dns/sam.ldb.d/
32404 -rw-rw---- 2 root bind 4251648 Mar 5 11:39 DC=DOMAINDNSZONES,DC=UGENT2,DC=BE.ldb
32405 -rw-rw---- 2 root bind 4251648 Mar 5 11:39 DC=FORESTDNSZONES,DC=UGENT2,DC=BE.ldb
32397 -rw-rw---- 2 root bind 421888 Mar 6 00:11 metadata.tdb
If the files in the two folders have different inode numbers, then they aren't hard-links. To fix this, run:
# samba_upgradedns --dns-backend=BIND9_DLZ
This will recreate the DNS files with correct hard links and permissions. Then restart Bind.
** DDNS updates not working **
Check that the file '/etc/krb5.conf' is readable by Bind.
====== Configure NTP ======
----
Active Directory requires an accurate time synchronization between the clients and the DC(s). It's highly recommended to run NTP or another form of synchronization. The Configure NTP page shows the full NTP configuration process including SELinux policies.
You require a recent ntpd version (=>4.2.6) that supports signed NTP. E. g. the version shipped with RHEL6 and Ubuntu < 11.04 are too old. The ntpd of Debian Squeeze supports signed ntp.
To install NTP:
# apt-get install ntp
To check ntpd version:
# ntpd --version
To enable supports for signed NTP, adjust the config in /etc/ntp.conf:
# Local clock
server 127.127.1.0
fudge 127.127.1.0 stratum 12
# For signed NTP
ntpsigndsocket /usr/local/samba/var/lib/ntp_signd/
# For SerNet packages. If you are using it comment the above line and uncomment the next line
# ntpsigndsocket /var/lib/samba/ntp_signd/
Finally add "mssntp" to "restrict default" line in your /etc/ntp.conf
Restart NTP:
# service ntp restart
To view NTP peers list:
# ntpq -pn
To sync with other NTP servers:
# ntpd -qg
You can check if ntpd is syncronized after 5 or 10 minutes:
# ntptrace
After sync is necessary save the time to hardware clock:
# hwclock -w
====== Check that your network IP addrees is static ======
----
# nano /etc/network/interfaces
Example to configure network interfaces:
# The primary network interface
allow-hotplug eth0
iface eth0 inet static
address 10.1.112.84
netmask 255.255.255.0
gateway 10.1.112.254