Not the original reporter, but the issue I mention in comment #32 was
resolved when this update was applied.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1572122
Title:
Samba upgrade to 3.
No the original reporter either, but I can confirm that my Win7+ and
Ubuntu clients can access shares on my Samba file servers after this
update was applied.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
Richard,
Setting "client ipc signing = auto" indeed corrected the problem, and I
was able to join the file server back to the domain. This may be a fix
for others with the particular issue I have.
However, I now have a slightly different issue. This one involved users
being denied access to restr
Here is a reference to the exact problem on the Samba list:
https://lists.samba.org/archive/samba/2016-April/199395.html
No answer as of yet, but there is a lot of noise on the list about
recent Samba upgrade issues.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Actually, the problem we are having does not appear to be related to bug
#1573221. The issue described in the original bug report there does not
affect any of our clients. All are able to connect regardless of the
setting of 'client use spnego.' We are experiencing a problem more
similar to the ori
When upgrading our DC from Ubuntu 13.04 to 14.04 we were also upgraded
from Samba 3.6.9 to 4.3.8. Now Ubuntu clients cannot authenticate and
(as ghomem mentions) Ubuntu member servers are not able to join the
domain. Unfortunately downgrading Samba on 14.04 is not as simple as
using dpkg or apt. He
This should be fixed ASAP as it is causing large scale issues.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1572824
Title:
Samba Domain Member cannot check passwords against Samba AD DC after
"Ba
After implementing #4, I experienced the same issue as #26.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/821233
Title:
indicator-weather crashed with AttributeError in
export_location_details():
Public bug reported:
Ubuntu 10.04.4 LTS
samba:
Installed: 2:3.4.7~dfsg-1ubuntu3.10
Samba seems to segfault at random intervals for no apparent (to me) reason.
Below is a backtrace.
I'm really not sure what to say beyond this. If someone will let me
know, I'll be glad to provide whatever oth
Problem confirmed on 10.04 Lucid. Symptoms are exactly the same as Mike
described.
--
autofs fails to look up master map from ldap in Intrepid
https://bugs.launchpad.net/bugs/332677
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubu
I can confirm this on version 2.30.1 Ubuntu 10.04 upgraded from 9.x
A clean reinstall is an unacceptable solution in a large corporate
environment. Breaking both the upgrade path and the ability to interact
freely with Windows clients on a network is a sure and quick way to be
shown the door. I ho
Public bug reported:
Binary package hint: ubuntu-docs
Here: https://help.ubuntu.com/9.10/serverguide/C/certificates-and-
security.html#certificate-authority
Step 7 presently states:
"There should now be a new file, /etc/ssl/newcerts/01.pem, containing
the same output. Copy and paste everything
It seems the latest release of OpenLDAP addresses these issues. Per the
changlog:
OpenLDAP 2.4 Change Log
OpenLDAP 2.4.16 Release (2009/04/05)
Fixed libldap GnuTLS with x509v1 CA certs (ITS#5992)
Fixed libldap GnuTLS with CA chains (ITS#5991)
Fixed libldap GnuTLS TLSVerify
FWIW: This same bad behavior is manifest on Jaunty w/OpenLDAP 2.4.15 and
libldap-2.4-2.
Abbreviated output of: gnutls-cli --x509cafile /usr/share/ca-
certificates/my.crt -p 636 our.ldapserver.com
---
Processed 3 CA certificate(s).
Resolving 'our.ldapserver.com'...
Connecting to '127.0.1.1
14 matches
Mail list logo