[root@f37 ~]# kinit administrator Password for administrator@TEST.JP: [root@f37 ~]# net ads join -U administrator Password for [TEST\administrator]: Using short domain name -- TEST Joined 'F37' to dns domain 'test.jp' No DNS domain configured for f37. Unable to perform DNS Update. DNS update failed: NT_STATUS_INVALID_PARAMETER [root@f37 ~]# systemctl restart winbind [root@f37 ~]# wbinfo -u TEST\administrator TEST\guest TEST\krbtgt TEST\chibi [root@f37 ~]# wbinfo -n chibi S-1-5-21-772807454-1264691557-831995235-1103 SID_USER (1) [root@f37 ~]# net ads info LDAP server: 192.168.1.11 LDAP server name: dc.test.jp Realm: TEST.JP Bind Path: dc=TEST,dc=JP LDAP port: 389 Server time: 月, 23 1月 2023 15:33:56 JST KDC server: 192.168.1.11 Server time offset: -1 Last machine account password change: 月, 23 1月 2023 15:33:28 JST [root@f37 ~]# host -4 dc dc.test.jp has address 192.168.1.9 dc.test.jp has address 192.168.1.11 dc.test.jp has IPv6 address 2400:4052:46e0:b700:1bd:3342:9c82:8f7a dc.test.jp has IPv6 address 2400:4052:46e0:b700:dc90:9df8:f959:845d [root@f37 ~]# host -4 dc1 dc1.test.jp has address 192.168.1.112 dc1.test.jp has IPv6 address 2400:4052:46e0:b700:a0ec:6eb4:9b94:7a98 [root@f37 ~]# host -4 dc2 dc2.test.jp has address 192.168.1.113 dc2.test.jp has IPv6 address 2400:4052:46e0:b700:80f5:4d68:47bf:f214 [root@f37 ~]# host -t SRV _ldap._tcp.test.jp _ldap._tcp.test.jp has SRV record 0 100 389 dc.test.jp. _ldap._tcp.test.jp has SRV record 0 100 389 dc1.test.jp. _ldap._tcp.test.jp has SRV record 0 100 389 dc2.test.jp. [root@f37 ~]# host -t SRV _kerberos._udp.test.jp _kerberos._udp.test.jp has SRV record 0 100 88 dc1.test.jp. _kerberos._udp.test.jp has SRV record 0 100 88 dc2.test.jp. _kerberos._udp.test.jp has SRV record 0 100 88 dc.test.jp. [root@f37 ~]# host -t A test.jp test.jp has address 192.168.1.11 test.jp has address 192.168.1.9 test.jp has address 192.168.1.112 test.jp has address 192.168.1.113 [root@f37 ~]# cat /etc/redhat-release Fedora release 37 (Thirty Seven) [root@f37 ~]# samba -V Version 4.17.4 [root@f37 ~]# smbclient //192.168.1.9/netlogon -Uadministrator Password for [TEST\administrator]: Try "help" to get a list of possible commands. smb: \> ls . D 0 Mon Jan 23 07:56:08 2023 .. D 0 Mon Jan 23 08:07:14 2023 58424063 blocks of size 4096. 41354190 blocks available smb: \> exit [root@f37 ~]# smbclient //192.168.1.9/sysvol -Uadministrator Password for [TEST\administrator]: Try "help" to get a list of possible commands. smb: \> ls . D 0 Mon Jan 23 07:56:08 2023 .. D 0 Mon Jan 23 07:56:08 2023 test.jp Dr 0 Mon Jan 23 07:56:08 2023 58424063 blocks of size 4096. 41354190 blocks available smb: \> exit [root@f37 ~]# net ads lookup Information for Domain Controller: 192.168.1.11 Response Type: LOGON_SAM_LOGON_RESPONSE_EX GUID: 1454b515-9745-40e5-bd3d-d0f2bceb643a Flags: Is a PDC: yes Is a GC of the forest: yes Is an LDAP server: yes Supports DS: yes Is running a KDC: yes Is running time services: yes Is the closest DC: yes Is writable: yes Has a hardware clock: yes Is a non-domain NC serviced by LDAP server: no Is NT6 DC that has some secrets: no Is NT6 DC that has all secrets: yes Runs Active Directory Web Services: yes Runs on Windows 2012 or later: yes Forest: test.jp Domain: test.jp Domain Controller: dc.test.jp Pre-Win2k Domain: TEST Pre-Win2k Hostname: DC Server Site Name: Default-First-Site-Name Client Site Name: Default-First-Site-Name NT Version: 5 LMNT Token: ffff LM20 Token: ffff [root@f37 ~]# dig test.jp ; <<>> DiG 9.18.8 <<>> test.jp ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5090 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4000 ;; QUESTION SECTION: ;test.jp. IN A ;; ANSWER SECTION: test.jp. 600 IN A 192.168.1.112 test.jp. 600 IN A 192.168.1.9 test.jp. 600 IN A 192.168.1.11 test.jp. 600 IN A 192.168.1.113 ;; Query time: 1 msec ;; SERVER: 192.168.1.9#53(192.168.1.9) (UDP) ;; WHEN: Mon Jan 23 15:36:52 JST 2023 ;; MSG SIZE rcvd: 100 [root@f37 ~]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: administrator@TEST.JP Valid starting Expires Service principal 2023-01-23T15:33:05 2023-01-24T01:33:05 krbtgt/TEST.JP@TEST.JP renew until 2023-01-24T15:33:01 [root@f37 ~]# wbinfo -t checking the trust secret for domain TEST via RPC calls succeeded [root@f37 ~]# wbinfo -g TEST\domain computers TEST\domain controllers TEST\schema admins TEST\enterprise admins TEST\cert publishers TEST\domain admins TEST\domain users TEST\domain guests TEST\group policy creator owners TEST\ras and ias servers TEST\allowed rodc password replication group TEST\denied rodc password replication group TEST\read-only domain controllers TEST\enterprise read-only domain controllers TEST\cloneable domain controllers TEST\protected users TEST\key admins TEST\enterprise key admins TEST\dnsadmins TEST\dnsupdateproxy [root@f37 ~]#