Hallo there and thank you for your answer
i finally made it and moved on but now i face other problem.
My configs look like...
kerberos attributes on the ldap php side are:
**krb5KDCFlags*
**krb5KeyVersionNumber*
**krb5MaxLife*
**krb5MaxRenew*
**krb5PrincipalName*
*
*
*
objectClass
*krb5Principal
*krb5KDCEntry
*



sasl configs:
*
*
*log_level: -1*
*pwcheck_method:auxprop saslauthd*
*mech_list: GSSAPI EXTERNAL LOGIN PLAIN NTLM DIGEST-MD5 CRAM-MD5*
*auxprop_plugin: ldapdb*
*ldapdb_uri: ldaps://10.0.0.12:636/ ldapi:///*
*ldapdb_id: cn=ldapmaster,ou=kerberos,dc=teipir,dc=gr*
*ldapdb_pw: {SSHA}I3uStTuu03acS7E/Wp85xNBawCqzvgtY*
*ldapdb_mech: GSSAPI EXTERNAL*
*ldapdb_starttls: try*


My access list is :
*access to * by * write*

but i also set up as i saw on the sasl-regexp config the mapping below
*sasl-regexp*
*    uid=(.+),cn=(.+),cn=.+,cn=auth*
*    ldap:///dc=$2,dc=gr??sub?(|(uid=$1)(cn...@$2))*
*sasl-regexp*
*    uid=(.+),cn=.+,cn=auth*
*    ldap:///dc=teipir,dc=gr??sub?(|(uid=$1)(krb5principalname...@teipir.gr
))*
*sasl-regexp*
*    uidnumber=0\\\+gidnumber=0,cn=peercred,cn=external,cn=auth*
*    cn=ldapmas...@teipir.gr,ou=kerberos,dc=teipir,dc=gr*

+
*i have an idea of making work like the one below so as to give access to
all of the users registered*
*requiring them a password is that correct:*
*
*
*# This is needed so sasl-regexp/GSSAPI works correctly*
*access to attrs=krb5PrincipalName*
*    by anonymous auth*
*
*
*# Kerberos attributes may only be accessible to root/ldapmaster*
*access to
attrs=krb5KeyVersionNumber,krb5PrincipalRealm,krb5EncryptionType,krb5KDCFlags,krb5Key,krb5MaxLife,krb5MaxRenew,krb5PasswordEnd,krb5ValidEnd,krb5ValidStart,krb5RealmNam
*
*    by * none*
*
*
*# We will be using userPassword to provide simple BIND access, so we don't
want this to be user editable*
*access to attrs=userPassword*
*    by anonymous auth*
* *
*
*
*# Anything else we may have forgotten is writable by admin, and viewable by
authenticated users*
*access to dn.subtree="dc=teipir,dc=gr"*
*    by users read*


when i do like :
*ldapsearch -X "dn:cn=spiros,ou=Managers,dc=teipir,dc=gr" -w 1234 -d 255*

and although i set up to require a password (on the sasl config )

and i get something like that:

*SASL/GSSAPI authentication started*
*ldap_sasl_interactive_bind_s: Insufficient access (50)*
*        additional info: SASL(-14): authorization failure: not authorized*
*
*
or when i use any other command client side i have full access to the tree
with no password required






2010/3/19 Dan White <dwh...@olp.net>

> On 19/03/10 12:39 +0200, Μανόλης Βλαχάκης wrote:
>
>> Hallo there everyone
>>
>> i hope you can help me with my issue cause it really bothers me for a week
>>
>> i set up an ldap on gentoo and after modifying heimdal kerberos and tls
>> i am stuck to that point:
>> i get these errors...
>>
>> additional info: SASL(-13): authentication failure: GSSAPI Failure:
>> gss_accept_sec_context
>>
>> +
>>
>> AS-REQ host/proof.teipir...@teipir.gr <http://teipir.gr/> from
>>
>> IPv4:10.0.0.12 for krbtgt/TEIPIR.GR
>> <http://teipir.gr/>@TEIPIR.GR<http://teipir.gr/>
>>
>> 2010-03-18T16:32:58 Client sent patypes: none
>> 2010-03-18T16:32:58 Looking for ENC-TS pa-data -- host/proof.teipir.gr@
>> TEIPIR.GR <http://teipir.gr/>
>>
>> 2010-03-18T16:32:58 No preauth found, returning PREAUTH-REQUIRED -- host/
>> proof.teipir...@teipir.gr <http://teipir.gr/>
>>
>> 2010-03-18T16:32:58 sending 268 bytes to IPv4:10.0.0.12
>>
>
> Is there one host involved or two, and do they both have valid credential
> caches (klist)?
>
> Does your openldap user have access to /etc/krb5.keytab? What does your
> cyrus sasl config look like (if it exists)?
>
> Assuming you're using an ldapsearch command from the client, what options
> are you passing?
>
> Do you have any custom SASL config items in your openldap config
> (sasl-host, sasl-realm or sasl-secprops)?
>
> --
> Dan White
>



-- 
Manolis Vlachakis

Nelly's Family Hotel
Visit    :   www.nellys-hotel.gr
              www.nellys.gr
Skype : manolis.vlachakis

Reply via email to