On Thu, Jul 22, 2010 at 11:07 AM, Sumit Bose <sb...@redhat.com> wrote:

> On Thu, Jul 22, 2010 at 10:19:37AM +0200, Sumit Bose wrote:
> > On Wed, Jul 21, 2010 at 03:22:29PM -0400, Scott Duckworth wrote:
> >
> > ...
> >
> > >
> > > "something bad happened" isn't very useful.  And since SSS refuses to
> try
> > > and authenticate users without an encrypted connection, I can't easily
> use
> > > wireshark and friends to debug at the protocol level.  While I could
> > > probably patch the source to print the actual LDAP error with
> > > ldap_err2string(), or maybe gdb the process and set a breakpoint when
> things
> > > go wrong to hopefully get some more useful information, this is beyond
> what
> > > I'd normally consider doing when deploying new software.  Any
> suggestions?
> >
> > I'm currently installing eDirectory and I will try to reproduce the
> > behaviour you have found.
>
> I have run some basic authentication test with eDirectory 8.8-SP5 and
> everything worked fine. I have to admit that I have used the current
> master of sssd which includes a lot of changes to the LDAP code. Would
> you mind to test our current beta release from
> http://kojipkgs.fedoraproject.org/packages/sssd/1.2.91/21.fc14/ . It is
> for rawhide but should work fine on F13, too.
>

Sure, I'll give it a shot and report back what I find.


> I also didn't use LDAP aliases. Can you check if setting DEREF in
> /etc/openldap/ldap.conf helps? If not, can you give a short description
> how aliases are used in your case so that I can set up a similar
> environment?
>

Setting DEREF to always in /etc/openldap/ldap.conf works.  Aliasing is only
needed for one DN in our tree: everyone's default group is aliased to
another DN in another branch of the tree.  I wish there were some way to
enable aliasing on a per-map basis (e.g. only groups or only users) so that
you'd only take the performance hit where necessary, but I'm not aware of
any NSS LDAP client that does this.


> Thanks.
>
> bye,
> Sumit
>
> >
> > >
> > > Moving on...
> > >
> > > We will need to dereference LDAP aliases but I have not yet been able
> to
> > > find a setting to enable this.  I also have not found the equivalent of
> the
> >
> > I have added a RFE to sssd trac
> > (https://fedorahosted.org/sssd/ticket/568). As a sort term fix you can
> > add the appropriate DEREF option to /etc/openldap/ldap.conf.
> >
> > > pam_password_prohibit_message setting in /etc/ldap.conf; while not
> strictly
> > > required, it is nice to refer users to the proper way to change
> passwords in
> > > our environment.
> >
> > Currently there is only a configurable message if password resets by
> > root fail. I have added https://fedorahosted.org/sssd/ticket/569 to
> > track this.
> >
> > bye,
> > Sumit
> >
> > >
> > > Any help would be appreciated.  Thanks!
> > >
> > > Scott Duckworth, Systems Programmer II
> > > Clemson University School of Computing
> >
> > > _______________________________________________
> > > Freeipa-users mailing list
> > > Freeipa-users@redhat.com
> > > https://www.redhat.com/mailman/listinfo/freeipa-users
> >
> > _______________________________________________
> > Freeipa-users mailing list
> > Freeipa-users@redhat.com
> > https://www.redhat.com/mailman/listinfo/freeipa-users
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-users@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Reply via email to