I don't believe that anyone has ever made a fully-functional replacement
for an AD server, because the ADS domain security model uses a proprietary
TDATA attached to the Kerberos principal record to connect the NT security
model to the Kerberos model, and they won't reveal the details of that
TDATA's format.
I suppose it might be possible to extract the necessary
data from a working AD server and stuff it into another Kerberos KDC
without knowing how the data were created, but I've not heard of anyone
doing it.* Without this, Windows hosts will not be able to use domain
accounts.
If you want to dismantle your AD tree and replace it with an all-Linux
network, then the job is both easier and more difficult. Easier because
you don't have to figure out how to work with AD's quirks, but harder
because there may be no way to transfer the passwords. (You'd have to
extract the password hashes from an AD DC and stuff them into your new
KDC, just as in the previous paragraph.)