[tech] Active Directory migration status

David Adam zanchey at ucc.gu.uwa.edu.au
Mon Feb 27 12:29:32 AWST 2017


TLDR: more work to be done.

Thanks to [*OX], [JVB], [TPG] and [BOB], we got a test environment for the 
migration from LDAP + NT Domain to Active Directory up and running.

This took a while. Some notes as follows:

I abused the current LDAP setup somewhat; there is now another entry for a 
classic domain called UCCDOMAYNE, which happens to have the same SID as 
the production domain UCCDOMAIN. This allows for a test setup using live 
data initially.

We initially started with a FreeBSD VM, in order to closely mimic the 
current setup with the domain controller on Molmol. This caused a lot of 
problems; the binary packages for Samba 4.4 on FreeBSD crash with a 
segmentation fault when trying to provision a new domain. We spent a 
couple of hours working out whether there was some problem with our data 
affecting the upgrade process, but then I discovered that even a 
clean-slate provision operation segfaults! I've reported this upstream 
[1].

We decided to move to a Debian VM (samson.ucc) running testing for two 
reasons: the segfault above, and also the guidance from Samba[2] 
suggesting that running a fileserver on the DC is unwise.

Using Samba 4.5.4-Debian, the migration process was a lot smoother and we 
have a running test domain (UCCDOMAYNE / adtest.ucc.gu.uwa.edu.au). 
Windows computers are able to join the domain and logons work; 
interestingly, users are still pointed at Molmol home directories and 
Windows tries to use the same password, which works!

Getting the Linux machines on the domain is proving trickier. Although the 
upgrade process cleanly migrates the users and groups, including home 
directory and shell data, exposing that data to NSS and PAM on Linux is 
proving a bit tricky. We have Winbind working, but it requires a lot of 
annoying setup on local machines and doesn't appear to allow users to have 
a GID of 0. Other options include using nss-pam-ldapd backed by Kerberos, 
which I have not managed to get working yet.

[TPG] managed to separate the handling of MIFARE cards from LDAP, instead 
storing them in the dispense database. This led to problems, although I 
don't know what they were; perhaps he can comment.

There is no adduser capabiility yet. I was hoping we could just use the 
standard Active Directory tools, but that doesn't seem to allocate a Unix 
user ID or shell, so we probably have to stick to a custom script for now.

Some bright spark - I hope it wasn't me - has previously set the winadmin 
group to have the same Windows security ID as the Domain Controllers 
group (using net groupmap in our current live system). We need to change 
this.

Password changing has not been tested.

RADIUS has not been tested (required for VPN and wireless).

Webmail has not been tested.

Proxmox has been tested, and [BOB] tells me that it works.

David Adam
zanchey at ucc.gu.uwa.edu.au

[1]: https://lists.freebsd.org/pipermail/freebsd-questions/2017-February/276273.html
[2]: https://wiki.samba.org/index.php/Setting_up_Samba_as_an_Active_Directory_Domain_Controller#Using_the_Domain_Controller_as_a_File_Server


More information about the tech mailing list