Any ideas? I’m running out of ideas here. Let me know if I can provide any 
other details.

On Feb 28, 2014, at 1:20 AM, Ron Scott-Adams <[email protected]> wrote:

> Ah, now I’ve gotten somewhere. I added an MX entry and flipped the domain so 
> I can test logging in via IMAP. That worked fine, as did SMTP. So my only 
> auth problem is with the SOGo web interface and any DAV logins. So, we’re 
> dealing with my SOGo Apache conf now, yeah?
> 
> tohuw@joab:~$ sudo cat /etc/apache2/conf.d/SOGo.conf 
> Alias /SOGo.woa/WebServerResources/ \
>       /usr/lib/GNUstep/SOGo/WebServerResources/
> Alias /SOGo/WebServerResources/ \
>       /usr/lib/GNUstep/SOGo/WebServerResources/
> AliasMatch /SOGo/so/ControlPanel/Products/(.*)/Resources/(.*) \
>            /usr/lib/GNUstep/SOGo/$1.SOGo/Resources/$2
> 
> <Directory /usr/lib/GNUstep/SOGo/>
>     AllowOverride None
>     Order deny,allow
>     Allow from all
> 
>     # Explicitly allow caching of static content to avoid browser specific 
> behavior.
>     # A resource's URL MUST change in order to have the client load the new 
> version.
>     <IfModule expires_module>
>       ExpiresActive On
>       ExpiresDefault "access plus 1 year"
>     </IfModule>
> </Directory>
> 
> <LocationMatch 
> "^/SOGo/so/ControlPanel/Products/.*UI/Resources/.*\.(jpg|png|gif|css|js)">
>   SetHandler default-handler
> </LocationMatch>
> 
> ## Uncomment the following to enable proxy-side authentication, you will then
> ## need to set the "SOGoTrustProxyAuthentication" SOGo user default to YES and
> ## adjust the "x-webobjects-remote-user" proxy header in the "Proxy" section
> ## below.
> #<Location /SOGo>
> #  AuthType XXX
> #  Require valid-user
> #  SetEnv proxy-nokeepalive 1
> #  Allow from all
> #</Location>
> 
> ProxyRequests Off
> SetEnv proxy-nokeepalive 1
> ProxyPreserveHost On
> 
> # When using CAS, you should uncomment this and install cas-proxy-validate.py
> # in /usr/lib/cgi-bin to reduce server overloading
> #
> # ProxyPass /SOGo/casProxy http://localhost/cgi-bin/cas-proxy-validate.py
> # <Proxy http://localhost/app/cas-proxy-validate.py>
> #   Order deny,allow
> #   Allow from your-cas-host-addr
> # </Proxy>
> 
> ProxyPass /SOGo http://127.0.0.1:20000/SOGo retry=0
> 
> <Proxy http://127.0.0.1:20000/SOGo>
> ## adjust the following to your configuration
>   RequestHeader set "x-webobjects-server-port" "443"
>   RequestHeader set "x-webobjects-server-name" "joab.tohuw.net"
>   RequestHeader set "x-webobjects-server-url" "https://joab.tohuw.net";
> 
> ## When using proxy-side autentication, you need to uncomment and
> ## adjust the following line:
> #  RequestHeader set "x-webobjects-remote-user" "%{REMOTE_USER}e"
> 
>   RequestHeader set "x-webobjects-server-protocol" "HTTP/1.0"
> 
>   AddDefaultCharset UTF-8
> 
>   Order allow,deny
>   Allow from all
> </Proxy>
> 
> # Create a rule to allow the url to be all lower-case
> RewriteEngine On
> RewriteRule ^/SOGo/(.*)$ /SOGo/$1 [env=REMOTE_HOST:%{REMOTE_ADDR},PT]
> Redirect permanent /webmail https://tohuw.net/SOGo
> 
> # CardDav (Mac) Support
> NameVirtualHost 0.0.0.0:8843
> <VirtualHost 0.0.0.0:8843>
>     ServerName tohuw.net
>     SSLEngine On
>     SSLCertificateFile /etc/ssl/certs/tohuw_net.crt
>     SSLCertificateKeyFile /etc/ssl/private/tohuw_net.key
>     SSLCertificateChainFile /etc/ssl/certs/tohuw_net.ca-bundle
> 
>     ProxyRequests Off
>     SetEnv proxy-nokeepalive 1
>     ProxyPreserveHost On
> 
>     ProxyPassInterpolateEnv On
>     ProxyPass /principals http://127.0.0.1:20000/SOGo/dav/ interpolate
>     ProxyPass /SOGo/dav/ http://127.0.0.1:20000/SOGo/dav/ interpolate
>     ProxyPass / http://127.0.0.1:20000/SOGo/dav/ interpolate
> 
>     <Proxy http://127.0.0.1:20000>
>         RequestHeader set "x-webobjects-server-port" "8843"
>         RequestHeader set "x-webobjects-server-name" "joab.tohuw.net:8843"
>         RequestHeader set "x-webobjects-server-url" 
> "https://joab.tohuw.net:8843";
>         RequestHeader set "x-webobjects-server-protocol" "HTTP/1.0"
>         RequestHeader set "x-webobjects-remote-host" "127.0.0.1"
>         AddDefaultCharset UTF-8
>         Order allow,deny
>         Allow from all
>     </Proxy>
> </VirtualHost>
> 
> 
> On Feb 28, 2014, at 12:11 AM, Ron Scott-Adams <[email protected]> wrote:
> 
>> Hi Christian. Thanks again for your assistance. What you say about the 
>> database makes sense, and is rather what I expected. 
>> 
>> The LDAP search returns results fine. The difference in our ACLs is nominal, 
>> to my understanding.
>> 
>> tohuw@joab:~$ ldapsearch -Q -LLL -Y EXTERNAL -H ldapi:/// -b 
>> uid=tohuw,ou=users,dc=tohuw,dc=net -D uid=sogo,ou=Services,dc=tohuw,dc=net
>> dn: uid=tohuw,ou=Users,dc=tohuw,dc=net
>> objectClass: inetOrgPerson
>> objectClass: posixAccount
>> objectClass: shadowAccount
>> uid: tohuw
>> sn: Scott-Adams
>> givenName: Ron
>> cn: Ron Scott-Adams
>> gecos: Ron Scott-Adams
>> loginShell: /bin/bash
>> homeDirectory: /home/tohuw
>> uidNumber: 1000
>> gidNumber: 1000
>> mail: [email protected] 
>> 
>> On Feb 27, 2014, at 4:17 AM, Christian Mack <[email protected]> 
>> wrote:
>> 
>>> Hello Ron Scott-Adams
>>> 
>>> 
>>> Am 2014-02-26 03:11, schrieb Ron Scott-Adams:
>>>> It’s also worth mentioning that my postgres database is empty, though
>>>> the base schema seems to be present:
>>>> sogo=# \d
>>>>                      List of relations
>>>> Schema |               Name               |   Type   | Owner 
>>>> --------+----------------------------------+----------+-------
>>>> public | sogo_folder_info                 | table    | sogo
>>>> public | sogo_folder_info_c_folder_id_seq | sequence | sogo
>>>> public | sogo_sessions_folder             | table    | sogo
>>>> public | sogo_user_profile                | table    | sogo
>>>> (4 rows)
>>>> 
>>>> Is that normal due to no user having ever successfully logged in, or is
>>>> something else wrong that may be contributing to my login issue?
>>>> 
>>> 
>>> Yes, that is normal.
>>> All other information and tables are created on the fly, when logging in
>>> the first time.
>>> 
>>> 
>>>> Also, I should mention I also tested logging in as the SOGo ldap user
>>>> via ldapwhoami, and it succeeded.
>>>> 
>>> 
>>> ldapwhoami only shows, that your account exists, and the password is
>>> correct.
>>> It doesn't show which privileges you have in the LDAP tree.
>>> 
>>> 
>>>> Lastly, everything else in the stack seems to work:
>>>> Postfix/Dovecot/Sieve channel a message correctly when testing via
>>>> Telnet. It’s non-trivial to test too far beyond that, though, and
>>>> obviously, this is a login issue specific to SOGo. I’m sure there’s
>>>> something simple I’m not considering, but what?
>>>> 
>>>> 
>>>> On Feb 25, 2014, at 6:21 PM, Ron Scott-Adams <[email protected]
>>>> <mailto:[email protected]>> wrote:
>>>>> 
>>>>> After adding the LDAP clause to my conf and restarting SOGo, I get no
>>>>> further information in sogo.log. For the record, the ACL entry for the
>>>>> SOGo LDAP user follows. It’s identical to the permissions in my
>>>>> functional SOGo implementation, and the DIT is structured the same.
>>>>> 
>>>>> dn: olcDatabase={1}hdb,cn=config
>>>>> changetype: modify
>>>>> add: olcAccess
>>>>> olcAccess: to dn.subtree="ou=Users,dc=tohuw,dc=net" by
>>>>> dn="uid=sogo,ou=Services,dc=tohuw,dc=net" write
>>>>> *
>>> < cut >
>>> 
>>> In my openLDAP olcAccess is in
>>> dn: olcDatabase={-1}frontend,cn=config
>>> 
>>> But I am not sure, this is your problem.
>>> Could you try an ldapsearch with the
>>> dn="uid=sogo,ou=Services,dc=tohuw,dc=net" user?
>>> Please search for another users entrys.
>>> 
>>> 
>>> Kind regards,
>>> Christian Mack
>>> 
>>> -- 
>>> Christian Mack
>>> Abteilung Basisdienste
>>> KIM IT-Services
>>> Universität Konstanz
>>> 
>> 
> 

-- 
[email protected]
https://inverse.ca/sogo/lists

Reply via email to