Hi, I have been trying to get working of opensolaris ldap client with Sun DS 5.1, but fails. I have initialized the opensolaris ldap client using "manual" method- it was fine without any errors.
The issue is :- 1. I'm not able to log onto opensolaris system with ldap user ID, even though super user from the same system can do su to ldap user id. 2. Whilst doing ssh to the system, if I supply correct ldap user password reports no error in /var/adm/messages file but login is NOT sucessful. Second if I supply wrong password for the ldap user I have been trying to login, the following error message reported in /var/adm/message file. May 27 19:06:31 opensolaris sshd[1762]: [ID 293258 auth.error] libsldap: Status: 49 Mesg: openConnection: simple bind failed - Invalid credentials May 27 19:07:23 opensolaris sshd[1771]: [ID 293258 auth.error] libsldap: Status: 49 Mesg: openConnection: simple bind failed - Invalid credentials I have the following information that might help pointing to correct the issue which I'm experiencing. 1. getent passwd | grep <LDAP USERID> - done not report anything. 2. From opensolaris ldapclient system as a root user su - <LDAP USERID> : works pretty well and home directory gets mounted. 3. /etc/pam.conf file # Authentication management # # login service (explicit because of pam_dial_auth) # login auth requisite pam_authtok_get.so.1 login auth required pam_dhkeys.so.1 login auth required pam_unix_cred.so.1 login auth binding pam_unix_auth.so.1 server_policy login auth required pam_ldap.so.1 try_first_pass login auth required pam_dial_auth.so.1 # # FOR SSHD # sshd auth requisite pam_authtok_get.so.1 sshd auth required pam_dhkeys.so.1 sshd auth required pam_unix_cred.so.1 sshd auth binding pam_unix_auth.so.1 server_policy sshd auth required pam_ldap.so.1 try_first_pass sshd auth required pam_dial_auth.so.1 # # # rlogin service (explicit because of pam_rhost_auth) # rlogin auth sufficient pam_rhosts_auth.so.1 rlogin auth requisite pam_authtok_get.so.1 rlogin auth required pam_dhkeys.so.1 rlogin auth required pam_unix_cred.so.1 rlogin auth required pam_unix_auth.so.1 # # Kerberized rlogin service # krlogin auth required pam_unix_cred.so.1 krlogin auth required pam_krb5.so.1 # # rsh service (explicit because of pam_rhost_auth, # and pam_unix_auth for meaningful pam_setcred) # rsh auth sufficient pam_rhosts_auth.so.1 rsh auth required pam_unix_cred.so.1 # # Kerberized rsh service # krsh auth required pam_unix_cred.so.1 krsh auth required pam_krb5.so.1 # # Kerberized telnet service # ktelnet auth required pam_unix_cred.so.1 ktelnet auth required pam_krb5.so.1 # # PPP service (explicit because of pam_dial_auth) # ppp auth requisite pam_authtok_get.so.1 ppp auth required pam_dhkeys.so.1 ppp auth required pam_unix_cred.so.1 ppp auth required pam_unix_auth.so.1 ppp auth required pam_dial_auth.so.1 # # Default definitions for Authentication management # Used when service name is not explicitly mentioned for authentication # other auth requisite pam_authtok_get.so.1 other auth required pam_dhkeys.so.1 other auth required pam_unix_cred.so.1 other auth binding pam_unix_auth.so.1 server_policy other auth required pam_ldap.so.1 try_first_pass # # passwd command (explicit because of a different authentication module) # passwd auth binding pam_passwd_auth.so.1 server_policy passwd auth required pam_ldap.so.1 # # cron service (explicit because of non-usage of pam_roles.so.1) # cron account required pam_unix_account.so.1 # # # Default definition for Account management # Used when service name is not explicitly mentioned for account management # other account requisite pam_roles.so.1 other account required pam_unix_account.so.1 # # Default definition for Session management # Used when service name is not explicitly mentioned for session management # other session required pam_unix_session.so.1 # # Default definition for Password management # Used when service name is not explicitly mentioned for password management # other password required pam_dhkeys.so.1 other password requisite pam_authtok_get.so.1 other password requisite pam_authtok_check.so.1 other password sufficient pam_authtok_store.so.1 # # # Support for Kerberos V5 authentication and example configurations can # be found in the pam_krb5(5) man page under the "EXAMPLES" section. # gdm-autologin auth required pam_unix_cred.so.1 gdm-autologin auth sufficient pam_allow.so.1 gdm-autologin account sufficient pam_allow.so.1 gdm-autologin session sufficient pam_allow.so.1 gdm-autologin password sufficient pam_allow.so.1 4. /etc/nsswitch.conf passwd: files ldap group: files ldap # consult /etc "files" only if ldap is down. hosts: files dns # Note that IPv4 addresses are searched for in all of the ipnodes databases # before searching the hosts databases. ipnodes: files dns networks: files ldap [NOTFOUND=return] protocols: files ldap [NOTFOUND=return] rpc: files ldap [NOTFOUND=return] ethers: files ldap [NOTFOUND=return] netmasks: files ldap [NOTFOUND=return] bootparams: files ldap [NOTFOUND=return] publickey: files ldap [NOTFOUND=return] netgroup: files ldap automount: files ldap aliases: files ldap # for efficient getservbyname() avoid ldap services: files ldap printers: user files ldap auth_attr: files ldap prof_attr: files ldap project: files ldap tnrhtp: files ldap tnrhdb: files ldap 5. /var/ldap/ldap_client_file entries # Do not edit this file manually; your changes will be lost.Please use ldapclient (1M) instead. # NS_LDAP_FILE_VERSION= 2.0 NS_LDAP_SERVERS= 10.145.83.101 NS_LDAP_SEARCH_BASEDN= dc=chn99,dc=sun,dc=com NS_LDAP_CACHETTL= 0 NS_LDAP_SERVICE_SEARCH_DESC= passwd:ou=People,dc=chn99,dc=sun,dc=com?one NS_LDAP_SERVICE_SEARCH_DESC= group:ou=Group,dc=chn99,dc=sun,dc=com?one NS_LDAP_SERVICE_AUTH_METHOD= pam_ldap:simple 6. /var/ldap/ldap_client_cred # # Do not edit this file manually; your changes will be lost.Please use ldapclient (1M) instead. # Any help to resolve this issue, would greatly appreciated. Thanks, Saravanan -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.opensolaris.org/pipermail/security-discuss/attachments/20090528/d04c4c18/attachment.html>