[root@f39 ~]# kinit administrator Password for administrator@TEST.JP: [root@f39 ~]# net ads join -U administrator Password for [TEST\administrator]: Using short domain name -- TEST Joined 'F39' to dns domain 'test.jp' No DNS domain configured for f39. Unable to perform DNS Update. DNS update failed: NT_STATUS_INVALID_PARAMETER [root@f39 ~]# systemctl restart winbind [root@f39 ~]# wbinfo -u TEST\guest TEST\administrator TEST\krbtgt TEST\chibi [root@f39 ~]# wbinfo -n chibi S-1-5-21-4146484090-20972705-1600113342-1103 SID_USER (1) [root@f39 ~]# net ads info LDAP server: 192.168.1.50 LDAP server name: dc1.test.jp Realm: TEST.JP Bind Path: dc=TEST,dc=JP LDAP port: 389 Server time: 水, 29 3月 2023 03:09:44 JST KDC server: 192.168.1.50 Server time offset: -1 Last machine account password change: 水, 29 3月 2023 03:08:56 JST [root@f39 ~]# host -4 dc dc.test.jp has address 192.168.1.29 dc.test.jp has address 192.168.1.9 dc.test.jp has IPv6 address 2400:4052:46e0:b700:8972:a9a2:cd9e:8a72 dc.test.jp has IPv6 address 2400:4052:46e0:b700:ad3f:95c3:59e1:13a2 [root@f39 ~]# host -4 dc1 dc1.test.jp has address 192.168.1.50 dc1.test.jp has IPv6 address 2400:4052:46e0:b700:4853:34a4:e683:3f3e [root@f39 ~]# host -t SRV _ldap._tcp.test.jp _ldap._tcp.test.jp has SRV record 0 100 389 dc1.test.jp. _ldap._tcp.test.jp has SRV record 0 100 389 dc.test.jp. [root@f39 ~]# host -t A test.jp test.jp has address 192.168.1.50 test.jp has address 192.168.1.29 test.jp has address 192.168.1.9 [root@f39 ~]# cat /etc/redhat-release Fedora release 39 (Rawhide) [root@f39 ~]# samba -V Version 4.18.0 [root@f39 ~]# smbclient //192.168.1.9/netlogon -Uadministrator Password for [TEST\administrator]: Try "help" to get a list of possible commands. smb: \> ls . D 0 Tue Mar 28 13:06:38 2023 .. D 0 Tue Mar 28 13:17:45 2023 124843263 blocks of size 4096. 111077994 blocks available smb: \> exit [root@f39 ~]# smbclient //192.168.1.9/sysvol -Uadministrator Password for [TEST\administrator]: Try "help" to get a list of possible commands. smb: \> ls . D 0 Tue Mar 28 13:06:38 2023 .. D 0 Tue Mar 28 13:06:38 2023 test.jp Dr 0 Tue Mar 28 13:06:38 2023 124843263 blocks of size 4096. 111078055 blocks available smb: \> exit [root@f39 ~]# net ads lookup Information for Domain Controller: 192.168.1.50 Response Type: LOGON_SAM_LOGON_RESPONSE_EX GUID: f83d5561-2b59-4a6b-9813-67c27ecc8e9b Flags: Is a PDC: no Is a GC of the forest: yes Is an LDAP server: yes Supports DS: yes Is running a KDC: yes Is running time services: yes Is the closest DC: yes Is writable: yes Has a hardware clock: no Is a non-domain NC serviced by LDAP server: no Is NT6 DC that has some secrets: no Is NT6 DC that has all secrets: yes Runs Active Directory Web Services: yes Runs on Windows 2012 or later: yes Forest: test.jp Domain: test.jp Domain Controller: dc1.test.jp Pre-Win2k Domain: TEST Pre-Win2k Hostname: DC1 Server Site Name: Default-First-Site-Name Client Site Name: Default-First-Site-Name NT Version: 5 LMNT Token: ffff LM20 Token: ffff [root@f39 ~]# dig test.jp ; <<>> DiG 9.18.13 <<>> test.jp ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56930 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4000 ;; QUESTION SECTION: ;test.jp. IN A ;; ANSWER SECTION: test.jp. 600 IN A 192.168.1.9 test.jp. 600 IN A 192.168.1.29 test.jp. 600 IN A 192.168.1.50 ;; Query time: 0 msec ;; SERVER: 192.168.1.9#53(192.168.1.9) (UDP) ;; WHEN: Wed Mar 29 03:12:24 JST 2023 ;; MSG SIZE rcvd: 84 [root@f39 ~]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: administrator@TEST.JP Valid starting Expires Service principal 2023-03-29T03:08:32 2023-03-29T13:08:32 krbtgt/TEST.JP@TEST.JP renew until 2023-03-30T03:08:27 [root@f39 ~]# wbinfo -t checking the trust secret for domain TEST via RPC calls succeeded [root@f39 ~]# wbinfo -g TEST\domain computers TEST\cert publishers TEST\domain users TEST\domain guests TEST\ras and ias servers TEST\domain admins TEST\schema admins TEST\enterprise admins TEST\group policy creator owners TEST\allowed rodc password replication group TEST\denied rodc password replication group TEST\enterprise read-only domain controllers TEST\cloneable domain controllers TEST\protected users TEST\key admins TEST\enterprise key admins TEST\domain controllers TEST\read-only domain controllers TEST\dnsadmins TEST\dnsupdateproxy [root@f39 ~]#