Hi George This is not an answer, but I do have a suggestion. 1) Did you modify 
the config files manuall or did you use pam-auth-update. In any case Try 
downloading and installing Auth-Client-Config which is a python script which 
helps configure nsswitch.conf and pam configuration files. check what it does 
differently.  2) Did you happen to run debug and check the log files(syslog) to 
see if there's anything erroneous?   - Carlos Date: Fri, 21 Dec 2012 14:42:08 
-0500
From: [email protected]
To: [email protected]
Subject: Re: [MLUG] Linux LDAP Client for 389-ds - password policy

Hi Carlos,
I just did the last test I can think of - I pointed the CentOS client to the 
Ubuntu server. And yes, the client gets the Password Policies without the 
shadowAccount objectclass. For instance, I created new user and set up 
use-specific policy. Via the CentOS client I can login as this user and 
immediately get prompt to change my password "You are required to change your 
password immediately." Same procedure on Ubuntu client logs in the user without 
any notification. 


Then, I thought copying over from CentOS to Ubuntu /etc/pam_ldap.conf (on 
Ubuntu this is /etc/ldap.conf), /etc/nslcd.conf, /etc/openldap/ldap.cong (on 
Ubuntu /etc/ldap/ldap.conf) will change something. Nothing, still the same old. 


Here are the requested pam.d files:
Ubuntu:/etc/pam.d/common-account

 # here are the per-package modules (the "Primary" block)account [success=2 
new_authtok_reqd=done default=ignore]        pam_unix.so 

account [success=1 default=ignore]      pam_ldap.so # here's the fallback if no 
module succeedsaccount requisite                       pam_deny.so

# prime the stack with a positive return value if there isn't one already;# 
this avoids us returning an error just because nothing sets a success code# 
since the modules above will each just jump around

account required                        pam_permit.so# and here are more 
per-package modules (the "Additional" block)# end of pam-auth-update config


/etc/pam.d/common-auth# here are the per-package modules (the "Primary" 
block)auth    [success=2 default=ignore]      pam_unix.so nullok_secureauth    
[success=1 default=ignore]      pam_ldap.so use_first_pass

# here's the fallback if no module succeedsauth    requisite                    
   pam_deny.so# prime the stack with a positive return value if there isn't one 
already;# this avoids us returning an error just because nothing sets a success 
code

# since the modules above will each just jump aroundauth    required            
            pam_permit.so# and here are more per-package modules (the 
"Additional" block)auth    optional                        pam_cap.so 

# end of pam-auth-update config
/etc/pam.d/common-password# here are the per-package modules (the "Primary" 
block)password        [success=2 default=ignore]      pam_unix.so obscure sha512

password        [success=1 user_unknown=ignore default=die]     pam_ldap.so 
try_first_pass# here's the fallback if no module succeedspassword        
requisite                       pam_deny.so

# prime the stack with a positive return value if there isn't one already;# 
this avoids us returning an error just because nothing sets a success code# 
since the modules above will each just jump around

password        required                        pam_permit.so# and here are 
more per-package modules (the "Additional" block)password        optional       
 pam_gnome_keyring.so 

# end of pam-auth-update config
CentOS/etc/pam.d/system-auth-ac
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.

auth        required      pam_env.so
auth        sufficient    pam_fprintd.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_ldap.so use_first_pass

auth        required      pam_deny.so

account     required      pam_unix.so broken_shadow
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 500 quiet
account     [default=bad success=ok user_unknown=ignore] pam_ldap.so

account     required      pam_permit.so

password    requisite     pam_cracklib.so try_first_pass retry=3 type=
password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass 
use_authtok
password    sufficient    pam_ldap.so use_authtok

password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
session     optional      pam_mkhomedir.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet 
use_uid

session     required      pam_unix.so
session     optional      pam_ldap.so

/etc/pam.d/passwd-auth-ac
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.

auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_ldap.so use_first_pass

auth        required      pam_deny.so

account     required      pam_unix.so broken_shadow
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 500 quiet
account     [default=bad success=ok user_unknown=ignore] pam_ldap.so

account     required      pam_permit.so

password    requisite     pam_cracklib.so try_first_pass retry=3 type=
password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass 
use_authtok
password    sufficient    pam_ldap.so use_authtok

password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
session     optional      pam_mkhomedir.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet 
use_uid

session     required      pam_unix.so
session     optional      pam_ldap.so


One difference is that on Ubuntu I do not have cracklib installed. I plan to do 
so later, now I am just testing. 


I think if Ubuntu LDAP clients joins AD, how does it receive notifications for 
password expiration from it. It should be something similar but I can't figure 
it out.


Thank you,
George S.

Date: Thu, 20 Dec 2012 23:10:21 +0000
From: Carlos Lopez <[email protected]>To: <[email protected]>

Subject: Re: [MLUG] Linux LDAP Client for 389-ds - password policyMessage-ID: 
<[email protected]>Content-Type: text/plain; 
charset="iso-8859-1"




 HI George, can we see the configuration files. for example the /etc/pam.d/ and 
/etc/ldap files  - Carlos 





_______________________________________________
mlug mailing list
[email protected]
https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca       
                                  
_______________________________________________
mlug mailing list
[email protected]
https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca

Reply via email to