On Tue, Mar 2, 2010 at 12:05 AM, Moritz Willers <mo at wit.ch> wrote:
> How do you bind your Linux systems to the directory? Do you use sasl/gssapi 
> binding, a proxy account or do they bind anonymously? ?What's the ldap.conf?
ldap_version 3
base dc=my-domain

nss_base_passwd cn=users,cn=accounts,dc=my-domain?sub
nss_base_group cn=groups,cn=accounts,dc=my-domain?sub
nss_schema rfc2307bis
nss_map_attribute uniqueMember member
nss_initgroups_ignoreusers root,dirsrv

nss_reconnect_maxsleeptime 8
nss_reconnect_sleeptime 1
bind_timelimit 5
timelimit 15

uri ldap://my-ldap-server


>
> I'm not sure if you are aware that 'authenticationMethod=sasl/GSSAPI' means 
> that the OS (nscd) must use Kerberos/GSSAPI to bind to the directory to do 
> lookups? ?Do you have all the GSSAPI identity mapping set up on the directory 
> server? ?Can you perform a gssapi authenticated ldapsearch against the 
> directory server?
>
> Or do you just want Solaris integrated to LDAP (with simple binding or 
> anonymously) but care about the users being authenticated iva Kerberos when 
> they log in?
That's the idea. I would like to use kerberos ticket  to authenticate.
However OS client is still trying to get userPassword from the LDAP
server instead of using kerberos ticket with these settings:

NS_LDAP_FILE_VERSION= 2.0
NS_LDAP_SERVERS= my-ldap-server
NS_LDAP_SEARCH_BASEDN= dc=my-domain
NS_LDAP_AUTH= none
NS_LDAP_SEARCH_SCOPE= sub
NS_LDAP_CACHETTL= 0
NS_LDAP_CREDENTIAL_LEVEL= anonymous
NS_LDAP_SERVICE_SEARCH_DESC= passwd:cn=users,cn=accounts,dc=my-domain
NS_LDAP_SERVICE_SEARCH_DESC= groups:cn=groups,cn=accounts,dc=my-domain
NS_LDAP_OBJECTCLASSMAP= passwd:posixAccount=posixAccount


>
> - mo
>
> On 1 Mar 2010, at 11:22am, Piotr Jasiukajtis wrote:
>
>> Forwarding that to the sparks-discuss
>>
>>
>> ---------- Forwarded message ----------
>> From: Piotr Jasiukajtis <estseg at gmail.com>
>> Date: Mon, Mar 1, 2010 at 12:20 PM
>> Subject: Re: [kerberos-discuss] ldapclient mod -a
>> authenticationMethod=sasl/GSSAPI
>> To: Doug Leavitt <Doug.Leavitt at sun.com>
>> Cc: kerberos-discuss at opensolaris.org
>>
>>
>> Hi Doug,
>>
>> The main reason I use nss-ldap from 3rd party is because with native
>> one I can't log in using kerberos/ldap account.
>>
>> At this moment I upgraded system to b133. I can log into the system's
>> console using 3rd party nss-ldap.
>> With the same configuration (just cp nss-ldap...) ?I'm not able to do
>> so with native nss-ldap:
>> login[918]: [ID 468494 daemon.crit] login account failure: No account
>> present for user
>>
>> I have ldapclient running with the following setting:
>> NS_LDAP_FILE_VERSION= 2.0
>> NS_LDAP_AUTH= sasl/GSSAPI
>> NS_LDAP_SEARCH_SCOPE= sub
>> NS_LDAP_CACHETTL= 0
>> NS_LDAP_CREDENTIAL_LEVEL= self
>> NS_LDAP_OBJECTCLASSMAP= passwd:posixAccount=posixAccount
>>
>> As a 'root' user I have already host/ principal ticket. Also I am able
>> to obtain TGT with 'kinit'.
>>
>> In logs I get:
>> login[499]: [ID 738555 daemon.warning] libsldap: Metaslot disabled for
>> self credential mode
>>
>> and
>> getent[543]: [ID 293258 daemon.warning] libsldap: Status: 7 ?Mesg:
>> Session error no available conn.
>> pfexec[546]: [ID 293258 daemon.warning] libsldap: Status: 7 ?Mesg:
>> openConnection: GSSAPI bind failed - 82 Local error
>>
>> Any idea how to solve that?
>>
>> On Fri, Feb 26, 2010 at 8:56 PM, Doug Leavitt <Doug.Leavitt at sun.com> 
>> wrote:
>>> Hi Piotr,
>>>
>>>> I'm not sure it's a right alias, however it's related to the GSSAPI.
>>>>
>>>> I have a snv_129 kerberos+ldap client machine. Kerberos is already
>>>> configured. KDC is running on Linux.
>>>>
>>>> Original nss_ldap library is replaced with nss-ldap from
>>>>
>>>> http://freeipa.org/downloads/solaris/nss_ldap/10/RHATnss-ldap-253-12.i386.pkg
>>>
>>>
>>> This is the root of your problem. ?The nss-ldap that you replaced
>>> the OpenSolaris nss-ldap with is not compatible with OpenSolaris
>>> components. ?Linux nss-ldap is a different source base with different
>>> characteristics and behaviors and is not compatible with OpenSolaris's
>>> current naming system.
>>>
>>> If you choose to install Linux nss-ldap you need to understand that
>>> none of the advanced facilities like nscd caching, per-user
>>> LDAP/Kerberos support or using any of the Solaris nss_ldap tools
>>> including ldapclient, ldap_cachemgr or ldaplist will function when
>>> you do this.
>>>
>>> All of these components including Solaris pam_ldap require the use
>>> of Solaris nss_ldap and other internal interfaces associated with each
>>> of these pieces.
>>>
>>> By replacing Solaris nss_ldap with Linux nss_ldap you have broken
>>> the LDAP naming services stack which is why you are getting all
>>> those error messages.
>>>
>>> The correct solution is to not replace nss_ldap with the incompatible
>>> components.
>>>
>>> Linux nss_ldap is not a substitute library for the current OpenSolaris
>>> nss_ldap naming libraries.
>>>
>>> I hope that answers your question.
>>>
>>> Doug.
>>>
>>
>>
>>
>> --
>> Piotr Jasiukajtis | estibi | SCA OS0072
>> http://estseg.blogspot.com
>>
>>
>>
>> --
>> Piotr Jasiukajtis | estibi | SCA OS0072
>> http://estseg.blogspot.com
>> _______________________________________________
>> sparks-discuss mailing list
>> sparks-discuss at opensolaris.org
>> http://mail.opensolaris.org/mailman/listinfo/sparks-discuss
>
>



-- 
Piotr Jasiukajtis | estibi | SCA OS0072
http://estseg.blogspot.com

Reply via email to