diff --git a/01-fedora-rhel-networking.txt b/01-fedora-rhel-networking.txt index 4a14c58..b3eed02 100644 --- a/01-fedora-rhel-networking.txt +++ b/01-fedora-rhel-networking.txt @@ -1,7 +1,9 @@ https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/configuring_and_managing_networking/index # Terminal 'nmtui' is recommended method for network adapter using static IP address. Further below method is manual edit of config files. -yum install Netwosudo hostnamectl set-hostname new.name +sudo dnf install NetworkManager +sudo hostnamectl set-hostname new.name +ip link show NetworkManager --print-config | grep migrate-ifcfg-rh nmcli -f name,uuid,filename connection sudo nmcli connection show @@ -11,6 +13,7 @@ sudo nmcli con modify 'enp1s0' ifname enp1s0 ipv4.method manual ipv4.addresses 1 sudo nmcli con down 'enp1s0' sudo nmcli con up 'enp1s0' resolvectl status +systemd-resolve --status enp1s0 sudo systemctl restart networking sudo systemctl restart NetworkManager ip address show enp1s0 diff --git a/bind9.txt b/bind9.txt index 07a1c73..81f2f18 100644 --- a/bind9.txt +++ b/bind9.txt @@ -8,6 +8,8 @@ https://www.cyberciti.biz/faq/linux-unix-bind9-named-configure-views/ https://www.zytrax.com/books/dns/ch4/#split # Misc re-used commands +named -v +dig -t txt -c chaos VERSION.BIND @192.168.1.140 sudo systemctl status named sudo systemctl restart bind9 sudo systemctl status bind9 diff --git a/freeipa.md b/freeipa.md index 18d11bd..3675a9a 100644 --- a/freeipa.md +++ b/freeipa.md @@ -1,7 +1,45 @@ -# FreeIPA requires over 2Gb+ in /usr -firewall-cmd --add-service=freeipa-ldap --add-service=freeipa-ldaps +https://youtu.be/xzfHRJNjqDI +https://www.freeipa.org/page/Howto/ISC_DHCPd_and_Dynamic_DNS_update +# FreeIPA requires over 2Gb+ in /usr - Change to root, Check DNS +systemd-resolve --status enp1s0 firewall-cmd --add-service=freeipa-ldap --add-service=freeipa-ldaps --permanent -dnf install freeipa-server -man ipa-server-install -ipa-server-install -# man ipa-server-install --mkhomedir +dnf install freeipa-server freeipa-server-dns nfs-utils +ipa-server-install --mkhomedir + +User1 well, i don't know why freeipa thinks you have to use their bind, but all things being equal, i probably wouldn't +Question: I don't have to; it's recommended so I don't have to update zones all the time; to let freeipa do it. +User1 what do you mean update zones all the time? +Question: there are kerberos DNS records to be updated? I'm not sure yet how often they'll get updated? +User1 oh +Question: at least I have the luxury this time to bang my head through it (and backups of all the servers) lol +User1 you're just saying that freeipa does [however often] require modifications to dns data? and you want freeipa to be able to do that directly, rather than you going and getting the info and making the changes yourself on freeipa's behalf? +Question: yes +User1 i see +User1 surely freeipa support ddns, yes? +Question: yes +User1 then, all things being equal, there should be no issue with using your existing bind servers +Question: that's what I was thinking; the more I use bind, the more respect I have for it. +User2 rob0: I *think* freeipa has a named DLZ module that pulls records straight from LDAP +User2 not 100% sure (I know Samba does exactly that for AD-hosted zones, however) +User3 Does it work with IXFR queries, do you know? And I suppose UPDATE queries make the change in the LDAP backend? +User2 never tried IXFR, but yeah, Windows AD hosts heavily use UPDATE queries for self-registration +User2 usually with GSS-TSIG + +2. Join the server to the domain. + +// Join server to domain +sudo dnf install realmd oddjob oddjob-mkhomedir sssd adcli +sudo realm join -U Administrator internal.domain.com -u Administrator +// Type in domain admin password to authenticate. +// Tweak SSSD +vi /etc/sssd/sssd.conf +fallback_homedir = /home/%u +use_fully_qualified_names = False + +3. Install needed packages. + +// Install needed packages +sudo dnf update +sudo dnf install git gcc +// Allow weak crypto +update-crypto-policies --set DEFAULT:SHA1