Am Wed, Nov 13, 2024 at 09:24:28PM +0000 schrieb Kodiak Firesmith via sssd-users: > Hi Folks, > We need to start using LDAPS rather than non-TLS LDAP in our SSSD AD > environment. I only have a single AD domain so I can't test with other > domains to see if the problem is on the SSSD client side or AD server side. > > When we set ad_use_ldaps = True, we lose enumeration, and regardless of > debug level, all we see related to the issue is the following: > > Nov 13 14:28:37 u20-test.college.edu sssd_be[125884]: Could not start TLS > encryption. Error in the pull function. > Nov 13 14:28:37 u20-test.college.edu sssd_be[125884]: Could not start TLS > encryption. Error in the pull function. > Nov 13 14:28:37 u20-test.college.edu sssd_be[125884]: Backend is offline > > Documentation is a bit scant, which led me to believe that this would be a > simple matter of setting a single setting, but this didn't work out. After > that I poked around on the internet and ended up trying the following > additional sssd.conf settings: > > ldap_id_use_start_tls = False > ldap_uri = ldaps://ad1.college.edu,ldaps://ad2.college.edu > ldap_tls_cacert = /etc/sssd/certs/ad_ca.pem > > Unfortunately this resulted in the same error. When googling around for the > specific error, there were no exact matches which makes me think I've > encountered something sort of rare. I've been able to infer from searching > that Error in the pull function. is an error message from GnuTLS which I > assume SSSD wraps for LDAPS, but there are no hits for the full error message > above with the sssd_be syslog label. > > The AD environment is 2016, the client is a Ubuntu 20.04 LTS system. The > versions in use are requirements of the environment and I am unable to test > against newer releases. > > I hesitate to mention it in case it creates false leads, but the system is > largely compliant with the DoD MAC-1 Classified STIG, with all of the > controls that brings over. Surprisingly there were no controls that directly > affected SSSD or any LDAP libraries, and we're not enforcing FIPS validated > cryptographic modules so it's unlikely due to STIG controls IMO. > > Questions: > > - Under normal circumstances, should the ad_use_ldaps setting be all we need > for this to "just work"?
Hi, yes, SSSD relies on OpenLDAP here. So if somthing like kinit -k 'YOURCLIENTNAME$@COLLEGE.EDU' ldapsearch -Y GSS_SPNEGO -H ldaps://ad1.college.edu works, SSSD should work as well. > - Any ideas what we might be able to try in order to further root out the > issue? For testing you might want to try to set `ldap_tls_reqcert = never` to tell OpenLDAP to not check any certificate. You can also switch on the debug output of OpenLDAP's libldap by setting ldap_library_debug_level = -1 The output can be found in the SSSD debug logs in /var/log/sssd/. HTH bye, Sumit > > Thanks! > > - Kodiak > > Sent with [Proton Mail](https://proton.me/mail/home) secure email. > -- > _______________________________________________ > sssd-users mailing list -- sssd-users@lists.fedorahosted.org > To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org > Do not reply to spam, report it: > https://pagure.io/fedora-infrastructure/new_issue -- _______________________________________________ sssd-users mailing list -- sssd-users@lists.fedorahosted.org To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue