1,We use windows2012 servers as domain controller 
2,We have centos5 and centos6 in our environment,last week after I 
configured ldap, all servers were working fine, I can login with ldap 
account or root. 
3,Today we found all centos5 server are not able to login with ad account 
nor root account,while centos6 is still working well。We tried to restart 
domain controllers, restart centos5 server. And now we run getent passwd we 
can get the output from AD sometimes, but when id ldapuser(or getent passwd 
ldapuser) the session just hangs there。Centos6 servers are still working 
well。 
  
4,Belows are some of my config files, is there any body can help me to have 
a look and give suggestion? Thanks in advance...
 
$ cat system-auth 
#%PAM-1.0 
# This file is auto-generated. 
# User changes will be destroyed the next time authconfig is run. 
auth      required    pam_listfile.so item=group sense=allow 
file=/etc/security/group.allowed onerr=fail 
auth        required      pam_env.so 
auth        sufficient    pam_unix.so nullok try_first_pass 
auth        requisite     pam_succeed_if.so uid >= 500 quiet 
auth        sufficient    pam_krb5.so use_first_pass 
auth        required      pam_deny.so 
  
account     required      pam_unix.so broken_shadow 
account     sufficient    pam_localuser.so 
account     sufficient    pam_succeed_if.so uid < 500 quiet 
account     [default=bad success=ok user_unknown=ignore] pam_krb5.so 
account     required      pam_permit.so 
  
password    requisite     pam_cracklib.so try_first_pass retry=3 
password    sufficient    pam_unix.so md5 shadow nullok try_first_pass 
use_authtok 
password    sufficient    pam_krb5.so use_authtok 
password    required      pam_deny.so 
  
session     optional      pam_keyinit.so revoke 
session     required      pam_limits.so 
  
session     [success=1 default=ignore] pam_succeed_if.so service in crond 
quiet use_uid 
session     required      pam_unix.so 
session     optional      pam_krb5.so 
session     required      pam_mkhomedir.so skel=/etc/skel/ umask=0022 
  
$ cat /etc/krb5.conf  
  
[logging] 
  default = FILE:/var/log/krb5libs.log 
  kdc = FILE:/var/log/krb5kdc.log 
  admin_server = FILE:/var/log/kadmind.log 
  
[libdefaults] 
  default_realm = MYDOMAIN.LOCAL 
  dns_lookup_realm = false 
  dns_lookup_kdc = false 
  ticket_lifetime = 24h 
  forwardable = yes 
  
[realms] 
  EXAMPLE.COM = { 
   kdc = kerberos.example.com:88 
   admin_server = kerberos.example.com:749 
   default_domain = example.com 
  } 
  
  MYDOMAIN.LOCAL = { 
   kdc = MYDOMAIN.local:88 
   admin_server = MYDOMAIN.local:749 
  } 
  
[domain_realm] 
  .example.com = EXAMPLE.COM 
  example.com = EXAMPLE.COM 
  
MYDOMAIN.local = MYDOMAIN.LOCAL 
.MYDOMAIN.local = MYDOMAIN.LOCAL 
[appdefaults] 
  pam = { 
    debug = false 
    ticket_lifetime = 36000 
    renew_lifetime = 36000 
    forwardable = true 
    krb4_convert = false 
  } 
  
  
$ cat /etc/ldap.conf |grep -v ^# 
timelimit 120 
bind_timelimit 120 
idle_timelimit 3600 
  
base dc=mydomain,dc=local 
  
uri ldap://dc-01.mydomain.local/ ldap://dc-02.mydomain.local/  
ssl no 
tls_cacertdir /etc/openldap/cacerts 
pam_password md5
binddn [email protected] 
bindpw ******** 
scope sub 
pam_filter objectClass=User 
nss_base_passwd dc=mydomain,dc=local 
nss_base_shadow dc=mydomain,dc=local 
nss_base_group dc=mydomain,dc=local 
nss_map_objectclass posixAccount user 
nss_map_objectclass shadowAccount user 
nss_map_objectclass posixGroup group 
nss_map_attribute uid sAMAccountName 
nss_map_attribute uidNumber UidNumber 
nss_map_attribute gidNumber GidNumber 
nss_map_attribute loginShell LoginShell 
nss_map_attribute gecos displayName 
nss_map_attribute uniqueMember PosixMember 
nss_map_attribute homeDirectory unixHomeDirectory 
nss_map_attribute cn cn 
  
bind_policy hard 
nss_reconnect_tries 3 
nss_reconnect_sleeptime 1 
nss_reconnect_maxsleeptime 8 
nss_reconnect_maxconntries 2 
  
$ cat /etc/sysconfig/authconfig 
USEWINBINDAUTH=no 
USEMKHOMEDIR=yes 
USESYSNETAUTH=no 
USEPAMACCESS=no 
USESSSDAUTH=no 
USESHADOW=yes 
USESMBAUTH=no 
USESMARTCARD=no 
USELDAPAUTH=no 
USEPASSWDQC=no 
USEDB=no 
USEWINBIND=no 
USESSSD=no 
FORCESMARTCARD=no 
PASSWDALGORITHM=md5 
USEHESIOD=no 
USEKERBEROS=yes 
USELDAP=yes 
USELOCAUTHORIZE=yes 
USECRACKLIB=yes 
USENIS=no 
  
# cat /etc/nsswitch.conf |grep -v ^# 
passwd:     files ldap 
shadow:     files ldap 
group:      files ldap 
hosts:      files dns 
bootparams: nisplus [NOTFOUND=return] files 
ethers:     files 
netmasks:   files 
networks:   files 
protocols:  files 
rpc:        files 
services:   files 
netgroup:   files ldap 
publickey:  nisplus 
automount:  files ldap 
aliases:    files nisplus 
  
$ cat /etc/security/group.allowed 
  
wheel 
admin 
unixadmins 
unixscan 
opsunixusers 

-- 
-- 
You received this message because you are subscribed to the Linux Users Group.
To post a message, send email to [email protected]
To unsubscribe, send email to [email protected]
For more options, visit our group at 
http://groups.google.com/group/linuxusersgroup
References can be found at: http://goo.gl/anqri
Please remember to abide by our list rules (http://tinyurl.com/LUG-Rules or 
http://cdn.fsdev.net/List-Rules.pdf)

--- 
You received this message because you are subscribed to the Google Groups 
"Linux Users Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to