The premise here is that you need the ldap user to start ldap...after
that, who cares, right? I would not configure any daemon users in ldap
and I have no issues with my system, this is primarily to allow OpenlDAP
restart without waiting and to always allow root logins. I would not
add anything more than root and ldap to this configuration.
There is more than way to do it, but I prefer belt and suspenders when
it comes to authentication.
Thanks,
--
Joshua M. Miller - RHCE,VCP
Craig White wrote:
On Mon, 2007-05-14 at 19:30 -0700, Joshua Miller wrote:
Craig,
I would also suggest adding the following line to your /etc/ldap.conf,
which will prevent LDAP group lookups on root and the ldap user and
allow your machine to boot faster and allow you to login as root when
your LDAP server is down:
nss_initgroups_ignoreusers root,ldap
This will not rely on the timeout suggested previously.
----
this is interesting and I'm thinking about this but there are a fair
number of daemon users ( < 100 ) and this is only the tip of the
iceberg.
Thanks
Craig
----
Thanks,
Joshua M. Miller
Craig White wrote:
On Mon, 2007-05-14 at 15:51 -0700, Joshua M. Miller wrote:
Is this a client or is this the LDAP server?
----
This is both the master server and of course, a client for users
----
Also, which LDAP server do
you employ?
----
# rpm -qa|grep openldap
openldap-servers-2.3.27-5
openldap-2.3.27-5
openldap-clients-2.3.27-5
the version that comes from RHELv5
I have this same setup on many different networks and have never had a
problem with RHEL 3 or RHEL 4 but something doesn't seem to work right
in RHELv5 even though I have chosen 'local authentication is sufficient'
in the checkbox of 'system-config-authentication' just like always as
you can sort of tell from the contents of /etc/pam.d/system-auth below
----
Thanks,
--
Joshua M. Miller - RHCE,VCP
Craig White wrote:
My main server, I upgraded from RHEL 3 to RHEL 5 and I imported my LDAP
DSA to the upgraded server which is the main server for our network
including the LDAP master.
I want to use both local authentication and LDAP authentication as I
normally do but I am really struggling here.
in /etc/nsswitch:
passwd: files ldap
shadow: files ldap
group: files ldap
which is normal
and 'getent passwd' command will return all my users & groups from
both /etc/passwd|group and LDAP and users can login to various services
from either LDAP or /etc/passwd
# ssh [EMAIL PROTECTED]
[EMAIL PROTECTED]'s password:
Last login: Mon May 14 11:24:12 2007 from xxx
[EMAIL PROTECTED] ~]# exit
that works well (root from /etc/passwd)
# ssh [EMAIL PROTECTED]
[EMAIL PROTECTED]'s password:
-sh-3.1$
that works well (craig is in LDAP not /etc/passwd)
But if I try to restart services whose user is in /etc/passwd such as
restarting LDAP, BIND (named), etc. the system hangs and hopefully times
out and it even prevents it from booting up unless I shut off LDAP
authentication on startup and set it after startup
# cat /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth sufficient pam_ldap.so use_first_pass
auth required pam_deny.so
account required pam_unix.so broken_shadow
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 500 quiet
account [default=bad success=ok user_unknown=ignore] pam_ldap.so
account required pam_permit.so
password requisite pam_cracklib.so try_first_pass retry=3
password sufficient pam_unix.so md5 shadow nullok try_first_pass
use_authtok
password sufficient pam_ldap.so use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in
crond quiet use_uid
session required pam_unix.so
session optional pam_ldap.so
HELP!
_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list
_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list
_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list