own dynamic posix-group

2019-11-24 Thread Stefan Kania
objectClass: stkaPosixGroup gidNumber: 5000 cn: dynposix memberURL: ldap:///dc=example,dc=net?memberuid?sub?(title=admin) 4. I added the new objectclass stkaPosixAccout to my users: dn: cn=Stefan Kania,ou=users,dc=example,dc=net objectClass: posixAccount objectClass

Re: own dynamic posix-group

2019-11-26 Thread Stefan Kania
Am 25.11.19 um 19:59 schrieb Quanah Gibson-Mount: > There's work to change this behavior (See ITS#9121) for OpenLDAP 2.5. That would be a very good idea. So long I'll wait and maybe I will find a different solution. Stefan -- Stefan Kania Landweg 13 25693 St. Michaelisdonn smime.

Re: acl help access to 'own' attributes

2019-11-30 Thread Stefan Kania
; sendmailMTAMapName: virtuser > sendmailMTACluster: mail > sendmailMTAKey: t...@example.com > sendmailMTAMapValue: testuser > > [2] > uid=testuser,ou=,ou=,ou=,dc=,dc=,dc=local > -- Stefan Kania Landweg 13 25693 St. Michaelisdonn Signieren jeder E-

Re: acl help access to 'own' attributes

2019-11-28 Thread Stefan Kania
ndmailMTAMapObject > objectClass: ritAdditionalInfo > sendmailMTAMapName: virtuser > sendmailMTACluster: mail > sendmailMTAKey: t...@example.com > sendmailMTAMapValue: testuser > > [2] > uid=testuser,ou=,ou=,ou=,dc=,dc=,dc=local > -- Stefan Kania Landweg 13

ldapwhoami translate sasl-name to dn

2019-12-22 Thread Stefan Kania
Hello, I try to do the authentication in LDAP via Kerberos. The Kerberos-Database is in LDAP, no problem, I can login to the system as a normal user but when I do a "ldapwhomami" I get the following output: - u1-verw@ldapserver:~$ ldapwhoami SASL/GSSAPI authentication started SASL

Re: Mirrormode activ server

2020-01-24 Thread Stefan Kania
Hello Quanah Am 24.01.20 um 00:51 schrieb Quanah Gibson-Mount: > > If you have "stats" level logging, you could see which of your servers > is receving write ops via the logs. That's it, thank's for the push ;-) Sometimes it's all you need. The loadbalancer is running. Stefan smime.p7s

Mirrormode activ server

2020-01-23 Thread Stefan Kania
Hi, maybe I can't find it or I forgot it :-), but is there a way to find out which of my two servers in a mirrormode setup is active and which one is passive? Thanks for any hint Stefan smime.p7s Description: S/MIME Cryptographic Signature

Re: SSH groups

2020-02-19 Thread Stefan Kania
ain group of users able to connect to certain computers. > How do I do this ? > -- Stefan Kania Landweg 13 25693 St. Michaelisdonn Signieren jeder E-Mail hilft Spam zu reduzieren und schützt Ihre Privatsphäre. Ein kostenfreies Zertifikat erhalten Sie unter https://www.dgn.de/dgn

Re: Antw: Re: Replication of olcAccess

2020-01-13 Thread Stefan Kania
Thank you all for the your answers. I did it like I did it before. I put all the ACLs in the global part of the configuration and replicate just e the part with the ACLs, that works fine. I hope replication of attributes from the cn=config will work with 2.5 :-) Stefan Am 13.01.20 um 13:22

Replication of olcAccess

2020-01-04 Thread Stefan Kania
Hello, I try to replicate the olcAccess, olcLimits and olcDbIndex Attributes here is the Database where the olcx Attributes located on the Master dn: olcDatabase={1}mdb,cn=config olcAccess: {0}to dn.exact="" by * read olcAccess: {1}to attr=entry,uid by anonymous auth by *

Re: ldapwhoami translate sasl-name to dn

2019-12-23 Thread Stefan Kania
Thank you for your help, now it's working. I should have read the log more closely, that's was the log said :-) Burt sometimes you just need an input from someone else. Am 23.12.19 um 09:40 schrieb Michael Ströder: > On 12/20/19 8:54 PM, Stefan Kania wrote: >> I would like to get the or

Re: Replication of olcAccess

2020-01-07 Thread Stefan Kania
Hi Quanah, I kow that there is a problem, but at the moment I don't know how to solve it, can you give me a hint about my configuration of the replication. Stefan Am 07.01.20 um 02:08 schrieb Quanah Gibson-Mount: > > > --On Saturday, January 4, 2020 5:35 PM +0100 Stefan Kania

acl for attrs with regex

2020-09-08 Thread Stefan Kania
Hello, I would like to set ACLs to a bunch of attributes via ACL. Is it possible to use regular expressions in the x field for attrs, someting like access to attrs.regex=[a.*] by . read by * break I couldn't figure it out :-( If it is possible could someone please write a short example

delta-syncrepl "got search entry without Sync State control"

2020-09-08 Thread Stefan Kania
I try to set up a delta-syncrepl configured via slapd.d. Building the configuration with Ansilbe. I got the following errormessages on my two consumers: Sep 08 19:45:49 ldapslave-01 slapd[3198]: do_syncrep2: rid=001 got search entry without Sync State control

Re: @Quanah About your blog

2020-09-15 Thread Stefan Kania
Am 15.09.20 um 10:40 schrieb Bastian Tweddell: > Could you please send a link to this blog post? Here it is: https://mishikal.wordpress.com smime.p7s Description: S/MIME Cryptographic Signature

Re: delta-syncrepl "got search entry without Sync State control"

2020-09-15 Thread Stefan Kania
the forrest " :-) (as we say in Germany).  I comared the subschema of both consumer and provider there are the same. I try to access the accesslog with ldapsearch with my rep-user and I can access the database. Can anyone have a look at my configuration please. Stefan Am 09.09.20 um 10

Re: delta-syncrepl "got search entry without Sync State control"

2020-09-16 Thread Stefan Kania
Hi Quanah, Am 15.09.20 um 21:12 schrieb Quanah Gibson-Mount: > Also, overlay order matters.  For any replicated database, the > SYNCPROV overlay should always be in the {0} index slot (primary or > accesslog db). If it is delta-syncrepl, the ACCESSLOG overlay should > be in the {1} index slot on

Re: delta-syncrepl "got search entry without Sync State control"

2020-09-16 Thread Stefan Kania
ed to know if it's written somewhere that the two parts of the delta-syncrepl-setup must be in a certain order. -- Stefan Kania Landweg 13 25693 St. Michaelisdonn Signieren jeder E-Mail hilft Spam zu reduzieren und schützt Ihre Privatsphäre. Ein kostenfreies Zertifikat erhalten Sie unter

Re: @Quanah About your blog

2020-09-14 Thread Stefan Kania
Thank's a lot for your explanation Stefan Am 14.09.20 um 17:43 schrieb Quanah Gibson-Mount: > > > --On Sunday, September 13, 2020 9:19 PM +0200 Stefan Kania > wrote: > >> Hi Quanah, >> >> I got a question about your blog about MMR. You wrote: >> >

Re: OpenLDAP and Ansible

2020-08-31 Thread Stefan Kania
Am 30.08.20 um 23:28 schrieb Quanah Gibson-Mount: > > I would strongly advise updating this to use delta-syncrepl instead of > standard syncrepl. You are right, I will change it :-) This was just the first step. -- Stefan Kania Landweg 13 25693 St. Michaelisdonn Signieren jed

Re: delta-syncrepl "got search entry without Sync State control"

2020-09-09 Thread Stefan Kania
Hi Quanah, thank's for the help. Up to now I did the delta-syncreple only via slapd.conf, now I'm will get it work with slapd.d AND Ansilble. After your posting I looked at my configuration and I saw it. Sometimes you need someone to bring you an the right track. Thank's, not only for this answer,

@Quanah About your blog

2020-09-13 Thread Stefan Kania
Hi Quanah, I got a question about your blog about MMR. You wrote: Add the syncprov and accesslog overlays to the existing primary database.  Note that it will be renumber from dn: olcDatabase={2}mdb,cn=config to dn: olcDatabase={3}mdb,cn=config But you did not explain why you renumber the

ldapsearch -Y EXTERNAL not working

2020-10-15 Thread Stefan Kania
Hello, I just compiled OpenLDAP 2.5alpha on a debian 10 system. I used this howto: https://tylersguides.com/guides/install-openldap-source-debian-stretch/ Slapd is running and I load the following ldif: - dn: cn=config objectClass: olcGlobal cn: config olcArgsFile:

Re: OpenLDAP 2.5.0 ALPHA released

2020-10-15 Thread Stefan Kania
s" completed without errors on both > RHEL8 and Fedora 32. > > best regards, > Jokke H. -- Stefan Kania Landweg 13 25693 St. Michaelisdonn Signieren jeder E-Mail hilft Spam zu reduzieren und schützt Ihre Privatsphäre. Ein kostenfreies Zertifikat erhalten Sie unter https://www.

Re: ldapsearch -Y EXTERNAL not working

2020-10-15 Thread Stefan Kania
The problem was sitting in front of the monitor ^^ I must uses ldapi:/// insted of ldaps://.  Sometimes it's good to take a break :-) Am 15.10.20 um 18:55 schrieb Stefan Kania: > Hello, > > I just compiled OpenLDAP 2.5alpha on a debian 10 system. I used this howto: > https://tyle

OpenLDAP and Ansible

2020-08-29 Thread Stefan Kania
I wrote some Ansible roles to set up a testing environment, mybe someone is interested in testing the roles. You can find all files and a descripton on my page: https://www.kania-online.de/using-ansible-to-set-up-an-openldap-environment/ smime.p7s Description: S/MIME Cryptographic Signature

Re: delta-syncrepl "got search entry without Sync State control"

2020-09-22 Thread Stefan Kania
Am 21.09.20 um 22:09 schrieb Quanah Gibson-Mount: > > > --On Sunday, September 20, 2020 5:29 PM +0200 Stefan Kania > wrote: > >> first the provider: >> - >> dn: olcBackend={0}mdb,cn=config >> objectClass: olcBackendConfig &g

Re: error 53 text=consumer state is newer than provider!

2020-09-22 Thread Stefan Kania
Am 21.09.20 um 22:01 schrieb Quanah Gibson-Mount: > > > --On Monday, September 21, 2020 8:53 PM +0200 Stefan Kania > wrote: > >> hi, >> >> replication is now running, but when I setup all three servers (one >> provider and two consumers) I get the fo

error 53 text=consumer state is newer than provider!

2020-09-21 Thread Stefan Kania
hi, replication is now running, but when I setup all three servers (one provider and two consumers) I get the following errormessage on the provider SEARCH RESULT tag=101 err=53 nentries=0 text=consumer state is newer than provider! And on the

Re: delta-syncrepl "got search entry without Sync State control"

2020-09-16 Thread Stefan Kania
Am 16.09.20 um 09:35 schrieb Michael Ströder: > But as usual > there are many opportunities to improve docs and I guess pull requests > are welcome to make this more explicit. As soon as my Ansible-script is running, I will write the documentation and if it is interesting for the project it

Re: delta-syncrepl "got search entry without Sync State control"

2020-09-20 Thread Stefan Kania
dex slot (primary or > accesslog db). If it is delta-syncrepl, the ACCESSLOG overlay should > be in the {1} index slot on the primary db. > > Regards, > Quanah > > > -- > > Quanah Gibson-Mount > Product Architect > Symas Corporation > Packaged, certified, and

overlay autoca in OpenLDAP 2.5

2020-10-20 Thread Stefan Kania
Hello, I play around al little bit with the OpenLDAP 2.5alpha. I'm trying the new overlay for the certificates. I start with the configuration with slapd.conf, because it's faster to change ;-). I started with the two lines from the manpage: overlay autoca caKeybits 4096 --- The

Re: overlay autoca in OpenLDAP 2.5

2020-10-23 Thread Stefan Kania
Am 20.10.20 um 22:54 schrieb Howard Chu: > Stefan Kania wrote: >> >> Am 20.10.20 um 22:20 schrieb Howard Chu: >>> Stefan Kania wrote: >>>> But when I create a user or a server there is no certificate. In the >>>> manpage said: >>>> ---

Removing Overlay entry from cn=config

2020-08-03 Thread Stefan Kania
Hello, I start experimenting with Ansible and OpenLDAP. Now I try to set up the overlay "synprov". I noticed that everytime I start my playbook the configuration over the overlay is added to the configuration again and again, so I now have: -- # {0}syncprov, {1}mdb, config dn:

new index on consumer

2020-12-10 Thread Stefan Kania
Hello If I create a new index on a provider in slapd.conf NOT in cn=config (using mdb). I have to do a slapindex on the provider. When I configure the same index in consumer slapd.conf do I have to do the slapindex here too? Greeting Stefan -- smime.p7s Description: S/MIME Cryptographic

ACL for authz-regexp

2020-12-20 Thread Stefan Kania
Hello, I try to figure out which ACL I need to get the rewriting of the sasl-username working. I have in my slapd.conf the following lines: -- authz-regexp uid=(.+),cn=gssapi,cn=auth ldap:///dc=example,dc=net??sub?(uid=$1) --- If I do a "ldapwhoami" without any

Re: overlay autoca in OpenLDAP 2.5

2020-10-20 Thread Stefan Kania
Am 20.10.20 um 22:20 schrieb Howard Chu: > Stefan Kania wrote: >> But when I create a user or a server there is no certificate. In the >> manpage said: >> - >> Certificates for users and servers are generated on demand using a >> Search request >>

Re: pw-totp

2021-06-07 Thread Stefan Kania
Am 07.06.21 um 16:35 schrieb Michael Ströder: > On 6/7/21 3:40 PM, Stefan Kania wrote: >> >> >> Am 07.06.21 um 15:29 schrieb Michael Ströder: >>> To build with libargon2 (which supports all ARGON2 arguments): >>> >>> --enable-argon2 --with-arg

Re: pw-totp

2021-06-07 Thread Stefan Kania
missing files :-). Did I miss anything else in my configure-line? Thank's Stefan Am 07.06.21 um 11:29 schrieb Michael Ströder: > On 6/7/21 10:23 AM, Stefan Kania wrote: >> ARGON2 is not part of the actual version 2.5.5 I only find the sources >> on git.openldap.org. > > Not t

Re: pw-totp

2021-06-07 Thread Stefan Kania
Am 07.06.21 um 15:29 schrieb Michael Ströder: > To build with libargon2 (which supports all ARGON2 arguments): > > --enable-argon2 --with-argon2=libargon2 Now it's compiling but still the same error :-( Jun 07 15:37:24 ldap25-p02 slapd[8154]: olcPasswordHash: value #0: scheme not available

Re: pw-totp

2021-06-07 Thread Stefan Kania
fig olcDatabase: {-1}frontend olcPasswordHash: {ARGON2} -- Now also {TOTP1ANDPW} is working. Thank's a lot. I learned a lot the last days Stefan Am 07.06.21 um 20:13 schrieb Quanah Gibson-Mount: > > > --On Monday, June 7, 2021 9:03 PM +0200 Stefan Kania &

Re: pw-totp

2021-06-07 Thread Stefan Kania
Am 07.06.21 um 17:18 schrieb Quanah Gibson-Mount: > > > --On Monday, June 7, 2021 4:40 PM +0200 Stefan Kania > wrote: > >> >> >> Am 07.06.21 um 15:29 schrieb Michael Ströder: >>> To build with libargon2 (which supports all ARGON2 arguments): >&

totp1andpw

2021-06-17 Thread Stefan Kania
Hi to all, I'm still testing TOPT with OpenLDAP 2.5. I got TOTP1 running. So a user with an OTP can use the six-digit number from googleauthenticator (or freeOTP+) to authenticate while using ldapsearch. Then I switch to TOTP1ANDPW I generate a secretkey for the TOTP-part of userPassword. Then I

Re: totp1andpw

2021-06-18 Thread Stefan Kania
Am 17.06.21 um 23:51 schrieb Michael Ströder: > Using the old totp module is a waste of time. ok ok ok :-) I now used the otp module together with argon2 als password, and it's running. But why, if it's old and not working, is pw-totp still part of 2.5. I only ask because I like to understand

Re: Configure autoca in slapd.d

2021-05-31 Thread Stefan Kania
uot;userPrivateKey;binary" - The certificates for the user will be created. Now only one thing is missing. How can I replace the self-signed certificate with my own certificate? Stefan Am 24.05.21 um 16:40 schrieb Stefan Kania: > Hallo, > > I try to get autoca running using the confi

pw-totp

2021-06-05 Thread Stefan Kania
Hello, I try to set up TOTP1 and TOTP1ANDPW as passworthash. I use Debian 10 with Kernel 5.9 from the backports. As OpenLDAP I use 2.5.5. I set up everything via Ansible. My configure-options are: - ./configure --with-cyrus-sasl --with-tls=openssl --enable-overlays=mod

Re: pw-totp

2021-06-06 Thread Stefan Kania
Hi Quanah, Am 05.06.21 um 22:11 schrieb Quanah Gibson-Mount: > > > --On Saturday, June 5, 2021 4:27 PM +0200 Stefan Kania > wrote: > >> Hello, >> >> I try to set up TOTP1 and TOTP1ANDPW as passworthash. I use Debian 10 >> with Kernel 5.9 from the backp

Re: pw-totp

2021-06-06 Thread Stefan Kania
n as I try to do anything or restart slapd, the slapd chrashes. Am 06.06.21 um 11:01 schrieb Dieter Klünter: > Am Sat, 5 Jun 2021 15:27:40 +0200 > schrieb Stefan Kania : > >> Hello, >> >> I try to set up TOTP1 and TOTP1ANDPW as passworthash. I use Debian 10 >> with K

Re: pw-totp

2021-06-07 Thread Stefan Kania
Hi Quanah Am 05.06.21 um 22:11 schrieb Quanah Gibson-Mount: > > Personally I'd combine that with ARGON2 password hashes for secure > password hash storage + 2 Factor auth. ARGON2 is not part of the actual version 2.5.5 I only find the sources on git.openldap.org. Will it ever become part of the

Re: Configure autoca in slapd.d

2021-05-24 Thread Stefan Kania
Am 24.05.21 um 16:55 schrieb Howard Chu: > Stefan Kania wrote: >> Hallo, >> >> I try to get autoca running using the configuration via slapd.d. With >> slapd.conf it'S working with this configuration: >> --- >> overlay autoca >> caKeybits 4

Configure autoca in slapd.d

2021-05-24 Thread Stefan Kania
Hallo, I try to get autoca running using the configuration via slapd.d. With slapd.conf it'S working with this configuration: --- overlay autoca caKeybits 4096 userKeybits 4096 serverKeybits 4096 --- When I try to configure it with the following settings: - dn:

Re: LDAP-proxy with meta-backend

2021-02-23 Thread Stefan Kania
Am 23.02.21 um 16:50 schrieb Tilman Kranz: > Hi Stefan, > > On Sun, 2021-02-14 at 18:46 +0100, Stefan Kania wrote: >> I would like to set up a OpenLDAP proxy with meta-backend. I have a test >> environment with two windows 2019 ADs and one OpenLDAP-server c

replication of cn=config

2021-04-11 Thread Stefan Kania
Hello, I just try to set up the replication for cn=config using the example from the documentation: https://www.openldap.org/doc/admin24/replication.html I have 3 Provider in an MMR with delta-syncrpl. Delta-syncrepl is working fine I can add and change objects from all three providers. Then I

Re: Antw: [EXT] Re: replication of cn=config

2021-04-14 Thread Stefan Kania
t is unsafe? > >> >> Additionally, you'd need to provide what the logs show when making the >> change, as far as replication is concerned, to discern why it's failing. >> It could be to one of the issues already fixed for OpenLDAP 2.5, but >> without log info, t

Re: ldapmodify: wrong attributeType at line N

2021-02-04 Thread Stefan Kania
Am 04.02.21 um 16:30 schrieb Harri T.: >   dn: uid=john,ou=People,dc=example,dc=com >   changetype: modify >   replace: shadowWarning >   shadowWarning: 7 - >   replace: mail >   mail: john@example.com You are missing the line with just a "-" between the two attributes. --

LDAP-proxy with meta-backend

2021-02-14 Thread Stefan Kania
Hi, I would like to set up a OpenLDAP proxy with meta-backend. I have a test environment with two windows 2019 ADs and one OpenLDAP-server configured as proxy. At the beginning all the authentication are med with admin-accounts, it's the first step just testing. Here is my slapd.conf:

openldap and oauth2

2021-09-13 Thread Stefan Kania
Hello to all, short question. Is OpenLDAP supporting oauth2? If yes, can some one point me to a howto? Stefan smime.p7s Description: S/MIME Cryptographic Signature

symas openldap-packages and kerberos

2021-12-17 Thread Stefan Kania
Hello to all, I'm trying to get GSSAPI authentication running with the symas-packages. I generated a ldap.keytab file and it's readable for the ldap-user running the slapd. With the Debian-packages I ad: - export KRB5_KTNAME="/path/to/ldap.keytab" - I don't want to use the system

Re: symas openldap-packages and kerberos

2021-12-20 Thread Stefan Kania
Hi Dieter Am 18.12.21 um 07:28 schrieb Dieter Klünter: > /etc/sasl2/slapd.conf > mech_list: gssapi digest-md5 cram-md5 external > keytab: /etc/openldap/ldap.keytab > > /etc/ldap.conf > KRB5_KTNAME=/etc/openldap/krb5.keytab > SASL_MECH GSSAPI > SASL_REALM My.SASL.REALM The configuration is

Re: symas openldap-packages and kerberos

2021-12-22 Thread Stefan Kania
Am 22.12.21 um 13:18 schrieb Dieter Klünter: > /* OpenLDAP SASL options */ > [...] > /* OpenLDAP GSSAPI options */ > #define LDAP_OPT_X_GSSAPI_DO_NOT_FREE_CONTEXT 0x6200 > #define LDAP_OPT_X_GSSAPI_ALLOW_REMOTE_PRINCIPAL 0x6201 -- I did: root@ldap25-p02:/opt/openldap-2.6.0# grep -ir

Re: symas openldap-packages and kerberos

2021-12-22 Thread Stefan Kania
Am 22.12.21 um 13:01 schrieb Dieter Klünter: > You probabely missed the header files, check /usr/include/gssapi/ > and /usr/include/krb5/ > and probabely some more. > and check the libraries in /usr/lib64/sasl2/ > I installed libkrb5-dev krb5-multidev libsasl2-dev I found:

Re: symas openldap-packages and kerberos [solved]

2021-12-27 Thread Stefan Kania
nisms: OTP supportedSASLMechanisms: CRAM-MD5 supportedSASLMechanisms: PLAIN supportedSASLMechanisms: LOGIN -- Again, thank you all for the help, several tips got me to the point. Stefan Am 17.12.21 um 16:34 schrieb Stefan Kania: > Hello to all, > > I'm trying to get GSSAPI aut

Re: symas openldap-packages and kerberos

2021-12-21 Thread Stefan Kania
Am 21.12.21 um 14:14 schrieb Dieter Klünter: > Am Sat, 18 Dec 2021 07:28:16 +0100 > schrieb Dieter Klünter : > >> Am Fri, 17 Dec 2021 16:34:41 +0100 >> schrieb Stefan Kania : >> >>> Hello to all, >>> >>> I'm trying to get GSSAPI authentic

dynamic groups seach for memberUID openldap 2.6

2021-12-30 Thread Stefan Kania
Hi to all, two years ago I tried to use dynamic groups as Posix-groups see post: https://www.openldap.net/lists/openldap-technical/201911/msg00028.html Now I tried it again with OpenLDAP 2.6 and the attribute memberUID is still not showing up. Is it still not possible to search for memberUid?

remove overlay from cn=config 2.6

2021-12-30 Thread Stefan Kania
hi to all, with 2.4.x the only way to remove an overlay from cn=config was exort cn=config edit the export and reimport it. I found a thread where it said: - This will probably be supported in OpenLDAP 2.5. - So is it possible somehow or do I still have to go the way with slapcat

Re: dynamic groups seach for memberUID openldap 2.6

2022-01-03 Thread Stefan Kania
Am 03.01.22 um 18:19 schrieb Quanah Gibson-Mount: > > > --On Monday, January 3, 2022 6:14 PM +0100 Michael Ströder > wrote: > >> On 1/3/22 18:03, Quanah Gibson-Mount wrote: >>> In general, "memberUID" is for use with posix groups (NOT LDAP groups). >>> But again, it's generally deficient

Re: symas openldap-packages and kerberos

2021-12-22 Thread Stefan Kania
Am 21.12.21 um 22:19 schrieb Michael Ströder: > > # ldd /opt/symas/lib/slapd > [..] > libgssapi.so.3 => /opt/symas/lib/libgssapi.so.3 (0x7f6d63716000) > libkrb5.so.26 => /opt/symas/lib/libkrb5.so.26 (0x7f6d6347e000) I don't know which packages you are using, but can't confirm

Re: symas openldap-packages and kerberos

2021-12-22 Thread Stefan Kania
Am 22.12.21 um 10:31 schrieb Stefan Kania: > either it's still a configuration problem, or it's missing. If it's a > configuration problem, how can I fix it? I now built OpenLDAP from source with this options: -- ./configure --enable-argon2 --with-argon2=libargon2 --with-cyru

symas gpg-key

2021-11-30 Thread Stefan Kania
I installed the symas OpenLDAP 2.6. The first step was getting the gpg-key but the command on your web-page is : root@ldap:~# apt-key adv --keyserver keyserver.ubuntu.com --recv-keys DA26A148887DCBEB Warning: apt-key is deprecated. Manage keyring files in trusted.gpg.d instead

Re: symas gpg-key

2021-11-30 Thread Stefan Kania
Am 30.11.21 um 15:31 schrieb Ondřej Kuzník: > Hi Stefan, > if you don't want to get it from the keyservers, it's also kept here: > https://repo.symas.com/repo/gpg/RPM-GPG-KEY-symas-com-signing-key That's was i was looking for. Thank you smime.p7s Description: S/MIME Cryptographic Signature

Re: mmr of cn=config with OpenLDAP 2.6

2021-12-09 Thread Stefan Kania
Am 07.12.21 um 20:47 schrieb Quanah Gibson-Mount: > > > --On Tuesday, December 7, 2021 7:15 PM +0100 Stefan Kania > wrote: > >> >> >> >>> >>> The documentation clearly states that for cn=config replication, the >>> serverID mus

Re: Antw: [EXT] mmr of cn=config with OpenLDAP 2.6

2021-12-09 Thread Stefan Kania
Am 09.12.21 um 08:12 schrieb Ulrich Windl: >>>> Stefan Kania schrieb am 07.12.2021 um 16:52 in > Nachricht <37d8d0c0-fd4a-885d-7a8c-3874412ea...@kania-online.de>: > > ... >> What I don't understand: Do I realy have to put all Servers in the >> replic

deltasync replication with 2.6 not working

2021-12-09 Thread Stefan Kania
Hi to all, I still experimenting with openldap 2.6 and the deltasyncrepl with four hosts. I use debian 11 and the symas packages. I set up all four hosts with the following ldif-files. Starting with the basic settings: --- dn: cn=config objectClass: olcGlobal

mmr of cn=config with OpenLDAP 2.6

2021-12-07 Thread Stefan Kania
Hi to all, is it now save to use mmr of cn=config with OpenLDAP 2.6? I got it running with 4 server. I'm installing all 4 server with Ansible so I created a basic configuration: -- dn: cn=config objectClass: olcGlobal cn: config olcLogLevel: sync olcLogLevel: stats olcPidFile:

Re: mmr of cn=config with OpenLDAP 2.6

2021-12-07 Thread Stefan Kania
> > The documentation clearly states that for cn=config replication, the > serverID must be in # URI format. > olcServerID: 1 ldap://ldap01.example.net olcServerID: 2 ldap://ldap02.example.net olcServerID: 3 ldap://ldap03.example.net olcServerID: 4 ldap://ldap04.example.net It's URI format

Re: right order mmr-main-DB combined with mmr cn=config

2021-12-15 Thread Stefan Kania
Am 15.12.21 um 10:11 schrieb Stefan Kania: > I don't know > where to look anymore. I restarted from scratch and only did the basic configuration and the replication of cn=config. When I do a change with the following ldif: -- dn: olcDatabase={-1}frontend,cn=config changetype:

Re: right order mmr-main-DB combined with mmr cn=config

2021-12-15 Thread Stefan Kania
Am 15.12.21 um 19:44 schrieb Quanah Gibson-Mount: > > Please file a bug. How can I? Is there someting like bugzilla I know from the Samba project. -- Stefan Kania Landweg 13 25693 St. Michaelisdonn Signieren jeder E-Mail hilft Spam zu reduzieren und schützt Ihre Privatsphär

Re: right order mmr-main-DB combined with mmr cn=config

2021-12-15 Thread Stefan Kania
Am 15.12.21 um 20:34 schrieb Quanah Gibson-Mount: > > > --On Wednesday, December 15, 2021 8:23 PM +0100 Stefan Kania > wrote: > >> >> >> Am 15.12.21 um 19:44 schrieb Quanah Gibson-Mount: >>> >>> Please file a bug. >> How can I? Is t

Re: deltasync replication with 2.6 not working

2021-12-10 Thread Stefan Kania
Now it's working. It was a syntax-problem in one of my Ansible templates Am 09.12.21 um 15:42 schrieb Stefan Kania: > by dn.exact="uid=repl-user,ou=users,dc={first_dc}},dc=net" read This shoud be: by dn.exact="uid=repl-user,ou=users,dc=example,dc=net" read I forgot o

right order mmr-main-DB combined with mmr cn=config

2021-12-15 Thread Stefan Kania
Hello, I'm still working on replication of cn=config. The replication of the main DB is working with delta-syncrepl but I still have problems getting mmr running for cn=config. As I use Ansible to configure it here my question: Is the order of setting up the replication relevant? What I do at the

Re: mmr of cn=config with OpenLDAP 2.6

2022-01-10 Thread Stefan Kania
err=53" "server unwilling to perform" @Quanah: In your blog about mmr it's also with a small "m", maybe you can change it. Am 07.12.21 um 16:52 schrieb Stefan Kania: > Hi to all, > > is it now save to use mmr of cn=config with OpenLDAP 2.6? I got it > runnin

Re: mmr of cn=config with OpenLDAP 2.6

2022-01-10 Thread Stefan Kania
Am 10.01.22 um 17:54 schrieb Quanah Gibson-Mount: > > > --On Monday, January 10, 2022 5:46 PM +0100 Stefan Kania > wrote: > >> >> >> Am 10.01.22 um 17:13 schrieb Quanah Gibson-Mount: >>> And why the issue you filed has not been closed out. >&

Re: mmr of cn=config with OpenLDAP 2.6

2022-01-10 Thread Stefan Kania
Am 10.01.22 um 17:13 schrieb Quanah Gibson-Mount: > And why the issue you filed has not been closed out. As RESOLVED and ??? FIXED is not right so which status should I choose? -- smime.p7s Description: S/MIME Cryptographic Signature

Re: STARTTLS vs LDAPS

2022-03-30 Thread Stefan Kania
That's what can be found in the FAQ on openldap.org: https://www.openldap.org/faq/data/cache/605.html I would trust this more then any rumors on any stack page ;) Am 30.03.22 um 18:45 schrieb thomaswilliampritch...@gmail.com: > At risk of beating a dead horse, I'd like to hear

Re: changing certificate and key for autoca

2023-09-21 Thread Stefan Kania
Am 21.09.23 um 19:13 schrieb Stefan Kania: Thank you, now it's working. Would be nice if it documented somewhere, maybe the manpage :-) ^.^ found it in the Manpage, it's late :-) Am 21.09.23 um 18:08 schrieb Howard Chu: Stefan Kania wrote: Hi all, I like to change the certificate

Re: changing certificate and key for autoca

2023-09-21 Thread Stefan Kania
Thank you, now it's working. Would be nice if it documented somewhere, maybe the manpage :-) Am 21.09.23 um 18:08 schrieb Howard Chu: Stefan Kania wrote: Hi all, I like to change the certificate and the key for autoca, but I can't find any description how to do it. I tried the following

changing certificate and key for autoca

2023-09-21 Thread Stefan Kania
Hi all, I like to change the certificate and the key for autoca, but I can't find any description how to do it. I tried the following LDIF: --- dn: dc=example,dc=net changetype: modify replace: cACertificate;binary cACertificate;binary:< file:///root/mycert/cacert.pem - replace:

export certificate and key

2023-10-04 Thread Stefan Kania
Hi to all, I have autoca running with my own CA. And I can create certificates and keys for users and hosts. But now I would like to use the certificate and key for radius 802.1x authentication so I need to export the certificate and the key. I know how to convert a DER certificate to a pem

Re: Configuring custom port 10389 for openldap-servers

2023-10-04 Thread Stefan Kania
Am 04.10.23 um 18:56 schrieb Kaushal Shriyan: Hi, I am running the openldap server on Red Hat Enterprise Linux release 8.8 (Ootpa) # rpm -qa | grep -i ldap sssd-ldap-2.8.2-3.el8_8.x86_64 symas-openldap-servers-2.4.59-1.el8.x86_64 openldap-2.4.46-18.el8.x86_64

Re: export certificate and key

2023-10-05 Thread Stefan Kania
Am 05.10.23 um 18:59 schrieb Ulf Volmer: On 05.10.23 18:39, Stefan Kania wrote: Am 05.10.23 um 07:02 schrieb Howard Chu: Read tests/scripts/test066-autoca for examples of how to do that. Does anyone has an answer for an non developer WITHOUT compiling the software. I'm not a developer

Re: export certificate and key

2023-10-05 Thread Stefan Kania
Am 05.10.23 um 07:02 schrieb Howard Chu: Stefan Kania wrote: Hi to all, I have autoca running with my own CA. And I can create certificates and keys for users and hosts. But now I would like to use the certificate and key for radius 802.1x authentication so I need to export the certificate

changes in own schema in multi provider setup

2022-05-17 Thread Stefan Kania
Good morning, we having a own schema with a lot of own attributes. We have a multi provider replication of cn=config. What is the right way to add a new attribute to our schema and get it into the configuration? Stefan smime.p7s Description: S/MIME Cryptographic Signature

result not in cache

2022-05-29 Thread Stefan Kania
I'm testing the openldap cache module pcache with OpenLDAP 2.6 on Debian11 (symas-packages). The proxy has the following config: (I'm testing caching so no security is set) -- include /opt/symas/etc/openldap/schema/core.schema include

Re: lloadd standalone daemon

2022-12-14 Thread Stefan Kania
Am 14.12.22 um 18:17 schrieb Quanah Gibson-Mount: --On Wednesday, December 14, 2022 5:58 PM +0100 Stefan Kania wrote: Hi to all, I want to test the "lloadd" as a standalone daemon. I'm using the symas OpenLDAP 2.6 packages on a debian 11 system. I can only find the module

lloadd standalone daemon

2022-12-14 Thread Stefan Kania
Hi to all, I want to test the "lloadd" as a standalone daemon. I'm using the symas OpenLDAP 2.6 packages on a debian 11 system. I can only find the module "lloadd.la" but not the standalone daemon. If I want to us it, do I have to compile it myself? What would be the better way using the

Re: lloadd Proxied Authorization Denied (123)

2022-12-15 Thread Stefan Kania
Am 15.12.22 um 16:38 schrieb Ondřej Kuzník: Should be authzTo if you're adding it to the lloadd's identity, are you sure uid=lloadd,ou=users,dc=example,dc=net has 'auth' (+x) access to dc=example,dc=net and the uid attribute on the subtree? Thank you for the push in right direction I added

lloadd Proxied Authorization Denied (123)

2022-12-14 Thread Stefan Kania
I now took the example configuration and changed it to my settings: - TLSCertificateFile /opt/symas/etc/openldap/example-net-cert.pem TLSCertificateKeyFile /opt/symas/etc/openldap/example-net-key.pem TLSCACertificateFile /opt/symas/etc/openldap/cacert.pem pidfile

Re: lloadd standalone daemon

2022-12-15 Thread Stefan Kania
Hi Ondřej, thank you for your answer, that's what I wanted to know. Stefan Am 15.12.22 um 12:48 schrieb Ondřej Kuzník: On Wed, Dec 14, 2022 at 06:57:05PM +0100, Stefan Kania wrote: Am 14.12.22 um 18:17 schrieb Quanah Gibson-Mount: --On Wednesday, December 14, 2022 5:58 PM +0100 Stefan Kania

Re: lloadd Proxied Authorization Denied (123)

2022-12-15 Thread Stefan Kania
Am 15.12.22 um 14:24 schrieb Ondřej Kuzník: It's not possible inside lloadd but when lloadd uses an identity A and a client binds with identity B, then sends an operation to it, what the backend receives is an operation with proxyauthz carrying B over a connection bound to A. If authz-policy

Re: lloadd Proxied Authorization Denied (123)

2022-12-15 Thread Stefan Kania
Am 15.12.22 um 13:10 schrieb Ondřej Kuzník: On Wed, Dec 14, 2022 at 09:20:14PM +0100, Stefan Kania wrote: I now took the example configuration and changed it to my settings: - feature proxyauthz bindconf bindmethod=simple binddn=uid=lloadd,ou=users,dc=example,dc

  1   2   >