On Tue, Feb 7, 2012 at 4:19 PM, Stephen Gallagher <sgall...@redhat.com>wrote:

> On Tue, 2012-02-07 at 16:12 +0100, Marco Pizzoli wrote:
> >
> >
> > On Tue, Feb 7, 2012 at 2:41 PM, Stephen Gallagher
> > <sgall...@redhat.com> wrote:
> >         On Tue, 2012-02-07 at 14:32 +0100, Jan Zelený wrote:
> >         > > On Tue, Feb 7, 2012 at 2:10 PM, Stephen Gallagher
> >         > <sgall...@redhat.com>wrote:
> >         > > > On Tue, 2012-02-07 at 14:04 +0100, Marco Pizzoli wrote:
> >         > > > > Hi guys,
> >         > > > > Again I need your help... I'm using     and I
> >         configured a
> >         > > > > domain/my_ldap. During the startup I see these logs:
> >         > > > >
> >         > > > > [cut]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_id_op_connect_step] (0x4000): beginning to
> >         connect
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [fo_resolve_service_send] (0x0100): Trying to resolve
> >         service 'LDAP'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [get_server_status]
> >         > > > > (0x1000): Status of server 'ldap01.dont.mind.it' is
> >         'name not
> >         > > > > resolved'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [get_port_status]
> >         > > > > (0x1000): Port status of port 389 for server
> >         'ldap01.dont.mind.it' is
> >         > > > > 'neutral'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [fo_resolve_service_activate_timeout] (0x2000):
> >         Resolve timeout set to
> >         > > > > 5 seconds
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [get_server_status]
> >         > > > > (0x1000): Status of server 'ldap01.dont.mind.it' is
> >         'name not
> >         > > > > resolved'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [resolv_is_address]
> >         > > > > (0x4000): [ldap01.dont.mind.it] does not look like an
> >         IP address
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [resolv_gethostbyname_step] (0x2000): Querying files
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [resolv_gethostbyname_files_send] (0x0100): Trying to
> >         resolve A record
> >         > > > > of 'ldap01.dont.mind.it' in files
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [set_server_common_status] (0x0100): Marking server
> >         > > > > 'ldap01.dont.mind.it' as 'resolving name'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [set_server_common_status] (0x0100): Marking server
> >         > > > > 'ldap01.dont.mind.it' as 'name resolved'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [be_resolve_server_done] (0x0100): Found address for
> >         server
> >         > > > > ldap01.dont.mind.it: [192.168.146.128] TTL 7200
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_uri_callback]
> >         > > > > (0x0400): Constructed uri
> >         'ldap://ldap01.dont.mind.it:389'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sss_ldap_init_send]
> >         > > > > (0x4000): Using file descriptor [24] for LDAP
> >         connection.
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sss_ldap_init_send]
> >         > > > > (0x0400): Setting 6 seconds timeout for connecting
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_ldap_connect_callback_add] (0x1000): New LDAP
> >         connection to
> >         > > > > [ldap://ldap01.dont.mind.it:389/??base] with fd [24].
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_get_rootdse_send]
> >         > > > > (0x4000): Getting rootdse
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x0400): calling
> >         ldap_search_ext with
> >         > > > > [(objectclass=*)][].
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs: [*]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs: [altServer]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [namingContexts]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [supportedControl]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [supportedExtension]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [supportedFeatures]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [supportedLDAPVersion]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [supportedSASLMechanisms]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [defaultNamingContext]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs: [lastUSN]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x1000): Requesting
> >         attrs:
> >         > > > > [highestCommittedUSN]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_step] (0x2000): ldap_search_ext
> >         called, msgid =
> >         > > > > 1
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_process_result]
> >         > > > > (0x2000): Trace: sh[0x7f6ec4b54440], connected[1],
> >         > > > > ops[0x7f6ec4b6a610], ldap[0x7f6ec4b579c0]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_process_message]
> >         > > > > (0x4000): Message type: [LDAP_RES_SEARCH_ENTRY]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_parse_entry]
> >         > > > > (0x4000): OriginalDN: [].
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_process_result]
> >         > > > > (0x2000): Trace: sh[0x7f6ec4b54440], connected[1],
> >         > > > > ops[0x7f6ec4b6a610], ldap[0x7f6ec4b579c0]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_process_message]
> >         > > > > (0x4000): Message type: [LDAP_RES_SEARCH_RESULT]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_generic_ext_done] (0x0400): Search result:
> >         Success(0), no
> >         > > > > errmsg set
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_get_rootdse_done]
> >         > > > > (0x4000): Got rootdse
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [get_naming_context]
> >         > > > > (0x0200): Using value from [namingContexts] as naming
> >         context.
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_set_search_base]
> >         > > > > (0x0100): Setting option [ldap_sudo_search_base] to
> >         > > > > [dc=dont,dc=mind.it].
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_parse_search_base] (0x0100): Search base added:
> >         > > > > [SUDO][dc=dont.mind.it][SUBTREE][]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_server_opts_from_rootdse] (0x0200): No known
> >         USN scheme is
> >         > > > > supported by this server!
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_get_server_opts_from_rootdse] (0x0200): Will use
> >         modification
> >         > > > > timestamp as usn!
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [fo_set_port_status]
> >         > > > > (0x0100): Marking port 389 of server
> >         'ldap01.dont.mind.it' as 'not
> >         > > > > working'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_handle_release]
> >         > > > > (0x2000): Trace: sh[0x7f6ec4b54440], connected[1],
> >         ops[(nil)],
> >         > > > > ldap[0x7f6ec4b579c0], destructor_lock[0],
> >         release_memory[0]
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [remove_connection_callback] (0x4000): Successfully
> >         removed connection
> >         > > > > callback.
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_id_op_connect_done] (0x0010): Authentication
> >         mechanism not
> >         > > > > Supported by server
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_id_op_connect_done] (0x4000): attempting
> >         failover retry on op #1
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_id_op_connect_step] (0x4000): beginning to
> >         connect
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [fo_resolve_service_send] (0x0100): Trying to resolve
> >         service 'LDAP'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [get_server_status]
> >         > > > > (0x1000): Status of server 'ldap01.dont.mind.it' is
> >         'name resolved'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [get_port_status]
> >         > > > > (0x1000): Port status of port 389 for server
> >         'ldap01.dont.mind.it' is
> >         > > > > 'not working'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [fo_resolve_service_send] (0x0020): No available
> >         servers for service
> >         > > > > 'LDAP'
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_id_release_conn_data] (0x4000): releasing unused
> >         connection
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_id_op_connect_done] (0x0020): Failed to connect,
> >         going offline
> >         > > > > (5 [Input/output error])
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [be_mark_offline]
> >         > > > > (0x2000): Going offline!
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [be_run_offline_cb]
> >         > > > > (0x0080): Going offline. Running callbacks.
> >         > > > > (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         > > > > [sdap_id_op_connect_done] (0x4000): notify offline to
> >         op #1
> >         > > > > [cut]
> >         > > > >
> >         > > > > My LDAP server is OpenLDAP. and I have configured the
> >         tls part.
> >         > > > >
> >         > > > > [root@fedora16 ~]# netstat -ntlp |grep slapd
> >         > > > > tcp        0      0 0.0.0.0:636
> >         0.0.0.0:*
> >         > > > > LISTEN      2951/slapd
> >         > > > > tcp        0      0 0.0.0.0:389
> >         0.0.0.0:*
> >         > > > > LISTEN      2951/slapd
> >         > > > > tcp        0      0 :::636                      :::*
> >         > > > > LISTEN      2951/slapd
> >         > > > > tcp        0      0 :::389                      :::*
> >         > > > > LISTEN      2951/slapd
> >         > > > >
> >         > > > > This is the interesting part of my domain/my_ldap
> >         section of sssd.conf
> >         > > > >
> >         > > > > [domain/my_ldap]
> >         > > > > description = LDAP Users domain
> >         > > > > min_id = 7000
> >         > > > > max_id = 8000
> >         > > > > timeout = 10
> >         > > > > enumerate = TRUE
> >         > > > > entry_cache_timeout = 5400
> >         > > > > cache_credentials = TRUE
> >         > > > > account_cache_expiration = 0
> >         > > > > id_provider = ldap
> >         > > > > use_fully_qualified_names = FALSE
> >         > > > > auth_provider = ldap
> >         > > > > access_provider = permit
> >         > > > > chpass_provider = ldap
> >         > > > > lookup_family_order = ipv4_first
> >         > > > > dns_resolver_timeout = 5
> >         > > > > #dns_discovery_domain =
> >         > > > > #override_gid =
> >         > > > > case_sensitive = True
> >         > > > >
> >         > > > > ldap_uri = ldap://ldap01.dont.mind.it:389
> >         > > > > ldap_chpass_uri = ldap://ldap01.dont.mind.it:389
> >         > > > > ldap_search_base =
> >         > > > >
> >         
> > dc=dont,dc=mind.it?sub?(objectClass=inetOrgPerson)<http://mind.it?sub?%28objectClass=inetOrgPerson%29>
> <http://mind.it?sub?
> >         > > > > %28objectClass=inetOrgPerson%29> ldap_schema =
> >         rfc2307bis
> >         > > > > ldap_default_bind_dn = cn=mydn,dc=dont,dc=mind.it
> >         > > > > ldap_default_authtok_type = pippo
> >         > > > > #ldap_default_authtok
> >         > > > > ldap_user_object_class = posixAccount
> >         > > > > ldap_user_name = uid
> >         > > > > ldap_user_uid_number = uidNumber
> >         > > > > ldap_user_gid_number = gidNumber
> >         > > > > ldap_user_gecos = gecos
> >         > > > > ldap_user_home_directory = homeDirectory
> >         > > > > ldap_user_shell = loginShell
> >         > > > > ldap_user_uuid = entryUUID
> >         > > > > ldap_user_modify_timestamp = modifyTimestamp
> >         > > > > ldap_user_shadow_last_change = shadowLastChange
> >         > > > > ldap_user_shadow_min = shadowMin
> >         > > > >
> >         > > > > #### INIZIO - SSL/TLS ####
> >         > > > > #
> >         > > > > # Imposto la richiesta e la validazione del
> >         certificato
> >         > > > > ldap_tls_reqcert = demand
> >         > > > > #
> >         > > > > #ldap_tls_cacert =
> >         > > > > ldap_tls_cacertdir = /etc/pki/tls/certs
> >         > > > > #ldap_tls_cert =
> >         > > > > #ldap_tls_key =
> >         > > > > #ldap_tls_cipher_suite =
> >         > > > > ldap_id_use_start_tls = false
> >         > > > > #### FINE - SSL/TLS ####
> >         > > > >
> >         > > > > Could you help me in understanding what is the cause
> >         of the backend
> >         > > > > discard?
> >         > > >
> >         > > > Can you tell us if it works if you do:
> >         > > >
> >         > > > ldapsearch -H ldap://ldap.dont.mind.it -x -w \
> >         > > > -D cn=mydn,dc=dont,dc=mind.it -b dc=dont,dc=mind.it \
> >         > > > objectClass=inetOrgPerson
> >         > >
> >         > > Hi, yes it works. Obviously I posted a camoufled binddn,
> >         basedn, etc...
> >         >
> >         > I think you should also try the command with -ZZ argument to
> >         test if TLS
> >         > initialization isn't getting in your way. Also please check
> >         that
> >         > /etc/pki/tls/certs contains hashes (symlinks) of
> >         certificates you wish to use.
> >         >
> >         > >
> >         > > By executing your ldapsearch I obtain this:
> >         > > [cut]
> >         > > # search result
> >         > > search: 2
> >         > > result: 0 Success
> >         > >
> >         > > # numResponses: 164
> >         > > # numEntries: 163
> >         > >
> >         > > I already checked by tcpdump-ing the dialog between sssd
> >         and the ldap
> >         > > server and I saw only one ldapsearch executed, and this
> >         was simply against
> >         > > the rootDSE. I expected to see another one against my user
> >         db / basedn.
> >
> >
> >
> >         The only way that
> >         (Tue Feb  7 13:44:04 2012) [sssd[be[my_ldap]]]
> >         [sdap_id_op_connect_done]
> >         (0x0010): Authentication mechanism not Supported by server
> >
> >         is possible is if we get ENOTSUP back from the connection
> >         attempt. This
> >         can only happen if:
> >
> >            if (state->do_auth && sasl_mech && state->use_rootdse) {
> >                if (!sdap_is_sasl_mech_supported(state->sh, sasl_mech))
> >         {
> >                    tevent_req_error(req, ENOTSUP);
> >                    return;
> >                }
> >            }
> >
> >         So that sounds to me like the list of supportedSASLMechanisms
> >         in the
> >         RootDSE is wrong.
> >
> >
> >         Marco, please try this:
> >
> >         ldapsearch -H ldap://ldap.dont.mind.it -x -b '' -s base \
> >         supportedSASLMechanisms
> >
> >         And tell us what it says. If that option returns nothing, I
> >         think that's
> >         probably a misconfiguration on the server (such as not having
> >         this
> >         attribute be readable by anonymous users). That said, we
> >         should probably
> >         assume by default that SASL/SIMPLE is always supported, even
> >         if the
> >         server is being stupid.
> >
> > Here it is:
> >
> > [root@fedora16 ~]# ldapsearch -v -x -h 127.0.0.1 -b "" -s base -D
> > "cn=Manager,dc=dont,dc=mind.it" -wmy_pw supportedSASLMechanisms
> > ldap_initialize( ldap://127.0.0.1 )
> > filter: (objectclass=*)
> > requesting: supportedSASLMechanisms
> > # extended LDIF
> > #
> > # LDAPv3
> > # base <> with scope baseObject
> > # filter: (objectclass=*)
> > # requesting: supportedSASLMechanisms
> > #
> >
> > #
> > dn:
> > supportedSASLMechanisms: GSSAPI
> >
> > # search result
> > search: 2
> > result: 0 Success
> >
> > # numResponses: 2
> > # numEntries: 1
>
>
> According to that, your LDAP server doesn't support any authentication
> except GSSAPI (probably Kerberos). Obviously ldapsearch still works, so
> it looks to me like the LDAP server isn't properly reporting what it
> reports.
>
> Please open a bug. SSSD should be assuming that we always support
> SIMPLE.
>

Done. https://fedorahosted.org/sssd/ticket/1180

Please, could you tell me if this problem will be targeted for 1.7.x or 1.8
release?

Thanks
_______________________________________________
sssd-devel mailing list
sssd-devel@lists.fedorahosted.org
https://fedorahosted.org/mailman/listinfo/sssd-devel

Reply via email to