Hi,
>     I have been trying to get working of opensolaris ldap client with 
> Sun DS 5.1, but fails. I have initialized the opensolaris ldap client 
> using "manual" method- it was fine without any errors.
>
> The issue is :-
> 1. I'm not able to log onto opensolaris system with ldap user ID, even 
> though super user from the same system can do su to ldap user id.
> 2. Whilst doing ssh to the system, if I supply correct ldap user 
> password reports no error in /var/adm/messages file but login is NOT 
> sucessful. Second if I supply wrong password for the ldap user I have 
> been trying to login, the following error message reported in 
> /var/adm/message file.
> May 27 19:06:31 opensolaris sshd[1762]: [ID 293258 auth.error] 
> libsldap: Status: 49
> Mesg: openConnection: simple bind failed - Invalid credentials
> May 27 19:07:23 opensolaris sshd[1771]: [ID 293258 auth.error] 
> libsldap: Status: 49
> Mesg: openConnection: simple bind failed - Invalid credentials
>
>
> I have the following information that might help pointing to correct 
> the issue which I'm experiencing.
>
> 1. getent passwd | grep <LDAP USERID>
>      - done not report anything.
> 2. From opensolaris ldapclient system as a root user
>      su  - <LDAP USERID>  : works pretty well and home directory gets 
> mounted.
> 3. /etc/pam.conf file
>
> # Authentication management
> #
> # login service (explicit because of pam_dial_auth)
> #
> login   auth requisite          pam_authtok_get.so.1
> login   auth required           pam_dhkeys.so.1
> login   auth required           pam_unix_cred.so.1
> login   auth binding            pam_unix_auth.so.1 server_policy
> login   auth required           pam_ldap.so.1 try_first_pass
> login   auth required           pam_dial_auth.so.1
> #
> # FOR SSHD
> #
> sshd    auth requisite          pam_authtok_get.so.1
> sshd    auth required           pam_dhkeys.so.1
> sshd    auth required           pam_unix_cred.so.1
> sshd    auth binding            pam_unix_auth.so.1 server_policy
> sshd    auth required           pam_ldap.so.1 try_first_pass
> sshd    auth required           pam_dial_auth.so.1
>
> #
> #
> # rlogin service (explicit because of pam_rhost_auth)
> #
> rlogin  auth sufficient         pam_rhosts_auth.so.1
> rlogin  auth requisite          pam_authtok_get.so.1
> rlogin  auth required           pam_dhkeys.so.1
> rlogin  auth required           pam_unix_cred.so.1
> rlogin  auth required           pam_unix_auth.so.1
> #
> # Kerberized rlogin service
> #
> krlogin auth required           pam_unix_cred.so.1
> krlogin auth required           pam_krb5.so.1
> #
> # rsh service (explicit because of pam_rhost_auth,
> # and pam_unix_auth for meaningful pam_setcred)
> #
> rsh     auth sufficient         pam_rhosts_auth.so.1
> rsh     auth required           pam_unix_cred.so.1
> #
> # Kerberized rsh service
> #
> krsh    auth required           pam_unix_cred.so.1
> krsh    auth required           pam_krb5.so.1
> #
> # Kerberized telnet service
> #
> ktelnet auth required           pam_unix_cred.so.1
> ktelnet auth required           pam_krb5.so.1
> #
> # PPP service (explicit because of pam_dial_auth)
> #
> ppp     auth requisite          pam_authtok_get.so.1
> ppp     auth required           pam_dhkeys.so.1
> ppp     auth required           pam_unix_cred.so.1
> ppp     auth required           pam_unix_auth.so.1
> ppp     auth required           pam_dial_auth.so.1
> #
> # Default definitions for Authentication management
> # Used when service name is not explicitly mentioned for authentication
> #
> other   auth requisite          pam_authtok_get.so.1
> other   auth required           pam_dhkeys.so.1
> other   auth required           pam_unix_cred.so.1
> other   auth binding            pam_unix_auth.so.1 server_policy
> other   auth required           pam_ldap.so.1 try_first_pass
> #
> # passwd command (explicit because of a different authentication module)
> #
> passwd  auth binding            pam_passwd_auth.so.1 server_policy
> passwd  auth required           pam_ldap.so.1
> #
> # cron service (explicit because of non-usage of pam_roles.so.1)
> #
> cron    account required        pam_unix_account.so.1
> #
> #
> # Default definition for Account management
> # Used when service name is not explicitly mentioned for account 
> management
> #
> other   account requisite       pam_roles.so.1
> other   account required        pam_unix_account.so.1
> #
> # Default definition for Session management
> # Used when service name is not explicitly mentioned for session 
> management
> #
> other   session required        pam_unix_session.so.1
> #
> # Default definition for Password management
> # Used when service name is not explicitly mentioned for password 
> management
> #
> other   password required       pam_dhkeys.so.1
> other   password requisite      pam_authtok_get.so.1
> other   password requisite      pam_authtok_check.so.1
> other   password sufficient     pam_authtok_store.so.1
> #
> #
> # Support for Kerberos V5 authentication and example configurations can
> # be found in the pam_krb5(5) man page under the "EXAMPLES" section.
> #
> gdm-autologin auth  required    pam_unix_cred.so.1
> gdm-autologin auth  sufficient  pam_allow.so.1
> gdm-autologin account  sufficient  pam_allow.so.1
> gdm-autologin session  sufficient  pam_allow.so.1
> gdm-autologin password  sufficient  pam_allow.so.1
>
> 4. /etc/nsswitch.conf
>
> passwd:     files ldap
> group:      files ldap
>
> # consult /etc "files" only if ldap is down.
> hosts:      files dns
>
> # Note that IPv4 addresses are searched for in all of the ipnodes 
> databases
> # before searching the hosts databases.
> ipnodes:    files dns
>
> networks:   files ldap [NOTFOUND=return]
> protocols:  files ldap [NOTFOUND=return]
> rpc:        files ldap [NOTFOUND=return]
> ethers:     files ldap [NOTFOUND=return]
> netmasks:   files ldap [NOTFOUND=return]
> bootparams: files ldap [NOTFOUND=return]
> publickey:  files ldap [NOTFOUND=return]
>
> netgroup:   files ldap
>
> automount:  files ldap
> aliases:    files ldap
>
> # for efficient getservbyname() avoid ldap
> services:   files ldap
>
> printers:   user files ldap
>
> auth_attr:  files ldap
> prof_attr:  files ldap
>
> project:    files ldap
>
> tnrhtp:     files ldap
> tnrhdb:     files ldap
>
> 5. /var/ldap/ldap_client_file entries
> # Do not edit this file manually; your changes will be lost.Please use 
> ldapclient (1M) instead.
> #
> NS_LDAP_FILE_VERSION= 2.0
> NS_LDAP_SERVERS= 10.145.83.101
> NS_LDAP_SEARCH_BASEDN= dc=chn99,dc=sun,dc=com
> NS_LDAP_CACHETTL= 0
> NS_LDAP_SERVICE_SEARCH_DESC= passwd:ou=People,dc=chn99,dc=sun,dc=com?one
> NS_LDAP_SERVICE_SEARCH_DESC= group:ou=Group,dc=chn99,dc=sun,dc=com?one
> NS_LDAP_SERVICE_AUTH_METHOD= pam_ldap:simple
>
> 6. /var/ldap/ldap_client_cred
> #
> # Do not edit this file manually; your changes will be lost.Please use 
> ldapclient (1M) instead.
> #
>
> Any help to resolve this issue, would greatly appreciated.
>
> Thanks,
> Saravanan 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.opensolaris.org/pipermail/security-discuss/attachments/20090528/8591bdac/attachment.html>

Reply via email to