[CentOS] LDAP users/groups not showing up with nis, pam, & ldap

2013-02-20 Thread Wes Modes
I am trying to configure NIS, PAM, & LDAP on a CentOS 6.2 host.  I've
previously installed a similar configuration on RHEL4, but CentOS now
uses nss-pam-ldapd and nslcd instead of nss_ldap, so the configurations
are a little different.

Currently, local users and groups are showing up but not LDAP users. 
When I do a /getent passwd/ and/getent group/ I don't get LDAP users.

When I do a listing of a share directory that should have user and group
ownership determined by LDAP, I get the uidNumbers and gidNumbers rather
than the UIDs and GIDs.

[root@edgar2 openldap]# ls -l /data/home | tail
drwx--.  2  30634 30080 4096 Mar 18  2009 userdir1
drwx--. 33  30548 30075 4096 Jan 29 15:20 userdir2
drwx--.  3  30554 30075 4096 Jan 26  2009 userdir3
drwx--. 12  30467 30075 4096 Jun 21  2012 userdir4
drwx--.  4  30543 30075 4096 Oct 21  2008 userdir5
drwx--.  8  30555 30075 4096 Oct 31 10:36 userdir5

Other details:  centos 6.2, smbldap-tools 0.9.6, openldap 2.4.23

I've fussed with /etc/nsswitch.conf, /etc/pam_ldap.conf,
/etc/nslcd.conf, /etc/pam.d/system-auth, and /etc/sysconfig/authconfig. 
And selinux is off.

I know the machine is successfully connecting to LDAP.  An ldapsearch
works from this machine, and I can even connect to a samba share with an
ldap login through smbclient.

Relevant parts of /etc/nsswitch:

passwd: files ldap
shadow: files ldap
group:  files ldap
   
#hosts: db files nisplus nis dns
hosts:  files dns
   
bootparams: nisplus [NOTFOUND=return] files
   
ethers: files
netmasks:   files
networks:   files
protocols:  files ldap
rpc:files
services:   files ldap
   
netgroup:   nisplus ldap
#netgroup:   ldap
   
publickey:  nisplus
   
automount:  files nisplus ldap
#automount:  files ldap
aliases:files nisplus

Relevant parts of /etc/pam_ldap.conf (everything else is commented out):

host dir1.ourdomain.com
base dc=.ourdomain,dc=com
#uri ldaps://dir1.ourdomain.com
uri ldap://dir1.ourdomain.com
   
# basic auth config
binddn cn=admin,dc=ourdomain,dc=com
rootbinddn cn=admin,dc=ourdomain,dc=com
   
# random stuff
#timelimit 120
#bind_timelimit 120
#bind_policy hard
# brought these times down wmodes Aug 11, 2008
timelimit 30
bind_timelimit 30
bind_policy soft
idle_timelimit 3600
nss_initgroups_ignoreusers root,ldap
   
# pam config
#pam_password md5
pam_password md5
   
# config for nss
nss_base_passwd ou=people,dc=ourdomain,dc=com?one
nss_base_shadow ou=people,dc=ourdomain,dc=com?one
nss_base_group  ou=group,dc=ourdomain,dc=com?one
   
# OpenLDAP SSL mechanism
# start_tls mechanism uses the normal LDAP port, LDAPS typically 636
ssl no
   
# OpenLDAP SSL options
# Require and verify server certificate (yes/no)
#tls_checkpeer yes
   
# CA certificates for server certificate verification
tls_cacertfile /etc/openldap/cacerts/cacert.pem
tls_cacertdir /etc/openldap/cacerts
   
# Client certificate and key
tls_cert /etc/openldap/cacerts/servercert.pem
tls_key /etc/openldap/cacerts/serverkey.pem

Relevant parts of /etc/pam.d/system-auth:

authrequired  pam_env.so
authsufficientpam_fprintd.so
authsufficientpam_unix.so nullok try_first_pass
authrequisite pam_succeed_if.so uid >= 500 quiet
authsufficientpam_ldap.so use_first_pass
authrequired  pam_deny.so
   
account required  pam_unix.so
account sufficientpam_localuser.so
account sufficientpam_succeed_if.so uid < 500 quiet
account [default=bad success=ok user_unknown=ignore] pam_ldap.so
account required  pam_permit.so
   
passwordrequisite pam_cracklib.so try_first_pass retry=3 type=
passwordsufficientpam_unix.so sha512 shadow nullok
try_first_pass use_authtok
passwordsufficientpam_ldap.so use_authtok
passwordrequired  pam_deny.so
   
session optional  pam_keyinit.so revoke
session required  pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in
crond quiet use_uid
session required  pam_unix.so
session optional  pam_ldap.so
session optional  pam_mkhomedir.so skel=/etc/skel umask=077

And the only line in /etc/sysconfig/authconfig I changed was:

USELDAP=yes

Any thoughts?  For those who are experienced with nis and pam, I'm sure
this is a no brainer, but I could sure use the little bit of your brain
that knows how to fix this.

Wes

-- 
Wes Modes
Systems Designer, Developer, and Administrator
University Library ITS
University of California, Santa Cruz

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/li

Re: [CentOS] LDAP users/groups not showing up with nis, pam, & ldap

2013-02-20 Thread Cliff Pratt
Do you have nscd running? If so, try stopping and starting that.

Cheers,

Cliff

On Thu, Feb 21, 2013 at 12:50 PM, Wes Modes  wrote:
> I am trying to configure NIS, PAM, & LDAP on a CentOS 6.2 host.  I've
> previously installed a similar configuration on RHEL4, but CentOS now
> uses nss-pam-ldapd and nslcd instead of nss_ldap, so the configurations
> are a little different.
>
> Currently, local users and groups are showing up but not LDAP users.
> When I do a /getent passwd/ and/getent group/ I don't get LDAP users.
>
> When I do a listing of a share directory that should have user and group
> ownership determined by LDAP, I get the uidNumbers and gidNumbers rather
> than the UIDs and GIDs.
>
> [root@edgar2 openldap]# ls -l /data/home | tail
> drwx--.  2  30634 30080 4096 Mar 18  2009 userdir1
> drwx--. 33  30548 30075 4096 Jan 29 15:20 userdir2
> drwx--.  3  30554 30075 4096 Jan 26  2009 userdir3
> drwx--. 12  30467 30075 4096 Jun 21  2012 userdir4
> drwx--.  4  30543 30075 4096 Oct 21  2008 userdir5
> drwx--.  8  30555 30075 4096 Oct 31 10:36 userdir5
>
> Other details:  centos 6.2, smbldap-tools 0.9.6, openldap 2.4.23
>
> I've fussed with /etc/nsswitch.conf, /etc/pam_ldap.conf,
> /etc/nslcd.conf, /etc/pam.d/system-auth, and /etc/sysconfig/authconfig.
> And selinux is off.
>
> I know the machine is successfully connecting to LDAP.  An ldapsearch
> works from this machine, and I can even connect to a samba share with an
> ldap login through smbclient.
>
> Relevant parts of /etc/nsswitch:
>
> passwd: files ldap
> shadow: files ldap
> group:  files ldap
>
> #hosts: db files nisplus nis dns
> hosts:  files dns
>
> bootparams: nisplus [NOTFOUND=return] files
>
> ethers: files
> netmasks:   files
> networks:   files
> protocols:  files ldap
> rpc:files
> services:   files ldap
>
> netgroup:   nisplus ldap
> #netgroup:   ldap
>
> publickey:  nisplus
>
> automount:  files nisplus ldap
> #automount:  files ldap
> aliases:files nisplus
>
> Relevant parts of /etc/pam_ldap.conf (everything else is commented out):
>
> host dir1.ourdomain.com
> base dc=.ourdomain,dc=com
> #uri ldaps://dir1.ourdomain.com
> uri ldap://dir1.ourdomain.com
>
> # basic auth config
> binddn cn=admin,dc=ourdomain,dc=com
> rootbinddn cn=admin,dc=ourdomain,dc=com
>
> # random stuff
> #timelimit 120
> #bind_timelimit 120
> #bind_policy hard
> # brought these times down wmodes Aug 11, 2008
> timelimit 30
> bind_timelimit 30
> bind_policy soft
> idle_timelimit 3600
> nss_initgroups_ignoreusers root,ldap
>
> # pam config
> #pam_password md5
> pam_password md5
>
> # config for nss
> nss_base_passwd ou=people,dc=ourdomain,dc=com?one
> nss_base_shadow ou=people,dc=ourdomain,dc=com?one
> nss_base_group  ou=group,dc=ourdomain,dc=com?one
>
> # OpenLDAP SSL mechanism
> # start_tls mechanism uses the normal LDAP port, LDAPS typically 636
> ssl no
>
> # OpenLDAP SSL options
> # Require and verify server certificate (yes/no)
> #tls_checkpeer yes
>
> # CA certificates for server certificate verification
> tls_cacertfile /etc/openldap/cacerts/cacert.pem
> tls_cacertdir /etc/openldap/cacerts
>
> # Client certificate and key
> tls_cert /etc/openldap/cacerts/servercert.pem
> tls_key /etc/openldap/cacerts/serverkey.pem
>
> Relevant parts of /etc/pam.d/system-auth:
>
> authrequired  pam_env.so
> authsufficientpam_fprintd.so
> authsufficientpam_unix.so nullok try_first_pass
> authrequisite pam_succeed_if.so uid >= 500 quiet
> authsufficientpam_ldap.so use_first_pass
> authrequired  pam_deny.so
>
> account required  pam_unix.so
> account sufficientpam_localuser.so
> account sufficientpam_succeed_if.so uid < 500 quiet
> account [default=bad success=ok user_unknown=ignore] pam_ldap.so
> account required  pam_permit.so
>
> passwordrequisite pam_cracklib.so try_first_pass retry=3 type=
> passwordsufficientpam_unix.so sha512 shadow nullok
> try_first_pass use_authtok
> passwordsufficientpam_ldap.so use_authtok
> passwordrequired  pam_deny.so
>
> session optional  pam_keyinit.so revoke
> session required  pam_limits.so
> session [success=1 default=ignore] pam_succeed_if.so service in
> crond quiet use_uid
> session required  pam_unix.so
> session optional  pam_ldap.so
> session optional  pam_mkhomedir.so skel=/etc/skel umask=077
>
> And the only line in /etc/sysconfig/authconfig I changed was:
>
> USELDAP=yes
>
> Any thoughts?  For those who are experienced with nis and pam, I'm sure
> this is a no brainer,

Re: [CentOS] LDAP users/groups not showing up with nis, pam, & ldap

2013-02-20 Thread Cliff Pratt
Or just stopping it.

On Thu, Feb 21, 2013 at 2:56 PM, Cliff Pratt  wrote:
> Do you have nscd running? If so, try stopping and starting that.
>
> Cheers,
>
> Cliff
>
> On Thu, Feb 21, 2013 at 12:50 PM, Wes Modes  wrote:
>> I am trying to configure NIS, PAM, & LDAP on a CentOS 6.2 host.  I've
>> previously installed a similar configuration on RHEL4, but CentOS now
>> uses nss-pam-ldapd and nslcd instead of nss_ldap, so the configurations
>> are a little different.
>>
>> Currently, local users and groups are showing up but not LDAP users.
>> When I do a /getent passwd/ and/getent group/ I don't get LDAP users.
>>
>> When I do a listing of a share directory that should have user and group
>> ownership determined by LDAP, I get the uidNumbers and gidNumbers rather
>> than the UIDs and GIDs.
>>
>> [root@edgar2 openldap]# ls -l /data/home | tail
>> drwx--.  2  30634 30080 4096 Mar 18  2009 userdir1
>> drwx--. 33  30548 30075 4096 Jan 29 15:20 userdir2
>> drwx--.  3  30554 30075 4096 Jan 26  2009 userdir3
>> drwx--. 12  30467 30075 4096 Jun 21  2012 userdir4
>> drwx--.  4  30543 30075 4096 Oct 21  2008 userdir5
>> drwx--.  8  30555 30075 4096 Oct 31 10:36 userdir5
>>
>> Other details:  centos 6.2, smbldap-tools 0.9.6, openldap 2.4.23
>>
>> I've fussed with /etc/nsswitch.conf, /etc/pam_ldap.conf,
>> /etc/nslcd.conf, /etc/pam.d/system-auth, and /etc/sysconfig/authconfig.
>> And selinux is off.
>>
>> I know the machine is successfully connecting to LDAP.  An ldapsearch
>> works from this machine, and I can even connect to a samba share with an
>> ldap login through smbclient.
>>
>> Relevant parts of /etc/nsswitch:
>>
>> passwd: files ldap
>> shadow: files ldap
>> group:  files ldap
>>
>> #hosts: db files nisplus nis dns
>> hosts:  files dns
>>
>> bootparams: nisplus [NOTFOUND=return] files
>>
>> ethers: files
>> netmasks:   files
>> networks:   files
>> protocols:  files ldap
>> rpc:files
>> services:   files ldap
>>
>> netgroup:   nisplus ldap
>> #netgroup:   ldap
>>
>> publickey:  nisplus
>>
>> automount:  files nisplus ldap
>> #automount:  files ldap
>> aliases:files nisplus
>>
>> Relevant parts of /etc/pam_ldap.conf (everything else is commented out):
>>
>> host dir1.ourdomain.com
>> base dc=.ourdomain,dc=com
>> #uri ldaps://dir1.ourdomain.com
>> uri ldap://dir1.ourdomain.com
>>
>> # basic auth config
>> binddn cn=admin,dc=ourdomain,dc=com
>> rootbinddn cn=admin,dc=ourdomain,dc=com
>>
>> # random stuff
>> #timelimit 120
>> #bind_timelimit 120
>> #bind_policy hard
>> # brought these times down wmodes Aug 11, 2008
>> timelimit 30
>> bind_timelimit 30
>> bind_policy soft
>> idle_timelimit 3600
>> nss_initgroups_ignoreusers root,ldap
>>
>> # pam config
>> #pam_password md5
>> pam_password md5
>>
>> # config for nss
>> nss_base_passwd ou=people,dc=ourdomain,dc=com?one
>> nss_base_shadow ou=people,dc=ourdomain,dc=com?one
>> nss_base_group  ou=group,dc=ourdomain,dc=com?one
>>
>> # OpenLDAP SSL mechanism
>> # start_tls mechanism uses the normal LDAP port, LDAPS typically 636
>> ssl no
>>
>> # OpenLDAP SSL options
>> # Require and verify server certificate (yes/no)
>> #tls_checkpeer yes
>>
>> # CA certificates for server certificate verification
>> tls_cacertfile /etc/openldap/cacerts/cacert.pem
>> tls_cacertdir /etc/openldap/cacerts
>>
>> # Client certificate and key
>> tls_cert /etc/openldap/cacerts/servercert.pem
>> tls_key /etc/openldap/cacerts/serverkey.pem
>>
>> Relevant parts of /etc/pam.d/system-auth:
>>
>> authrequired  pam_env.so
>> authsufficientpam_fprintd.so
>> authsufficientpam_unix.so nullok try_first_pass
>> authrequisite pam_succeed_if.so uid >= 500 quiet
>> authsufficientpam_ldap.so use_first_pass
>> authrequired  pam_deny.so
>>
>> account required  pam_unix.so
>> account sufficientpam_localuser.so
>> account sufficientpam_succeed_if.so uid < 500 quiet
>> account [default=bad success=ok user_unknown=ignore] pam_ldap.so
>> account required  pam_permit.so
>>
>> passwordrequisite pam_cracklib.so try_first_pass retry=3 type=
>> passwordsufficientpam_unix.so sha512 shadow nullok
>> try_first_pass use_authtok
>> passwordsufficientpam_ldap.so use_authtok
>> passwordrequired  pam_deny.so
>>
>> session optional  pam_keyinit.so revoke
>> session required  pam_limits.so
>> session [success=1 default=ignore] pam_succeed_if.so service in
>> crond quiet use_uid
>> session required  pam_unix.so
>> session optional  pam_ldap.so
>> session optional  pam_m

Re: [CentOS] LDAP users/groups not showing up with nis, pam, & ldap

2013-02-21 Thread Craig White

On Feb 20, 2013, at 4:50 PM, Wes Modes wrote:

> I am trying to configure NIS, PAM, & LDAP on a CentOS 6.2 host.  I've
> previously installed a similar configuration on RHEL4, but CentOS now
> uses nss-pam-ldapd and nslcd instead of nss_ldap, so the configurations
> are a little different.
> 
> Currently, local users and groups are showing up but not LDAP users. 
> When I do a /getent passwd/ and/getent group/ I don't get LDAP users.
> 
> When I do a listing of a share directory that should have user and group
> ownership determined by LDAP, I get the uidNumbers and gidNumbers rather
> than the UIDs and GIDs.
> 
>[root@edgar2 openldap]# ls -l /data/home | tail
>drwx--.  2  30634 30080 4096 Mar 18  2009 userdir1
>drwx--. 33  30548 30075 4096 Jan 29 15:20 userdir2
>drwx--.  3  30554 30075 4096 Jan 26  2009 userdir3
>drwx--. 12  30467 30075 4096 Jun 21  2012 userdir4
>drwx--.  4  30543 30075 4096 Oct 21  2008 userdir5
>drwx--.  8  30555 30075 4096 Oct 31 10:36 userdir5
> 
> Other details:  centos 6.2, smbldap-tools 0.9.6, openldap 2.4.23
> 
> I've fussed with /etc/nsswitch.conf, /etc/pam_ldap.conf,
> /etc/nslcd.conf, /etc/pam.d/system-auth, and /etc/sysconfig/authconfig. 
> And selinux is off.
> 
> I know the machine is successfully connecting to LDAP.  An ldapsearch
> works from this machine, and I can even connect to a samba share with an
> ldap login through smbclient.
> 
> Relevant parts of /etc/nsswitch:
> 
>passwd: files ldap
>shadow: files ldap
>group:  files ldap
> 
>#hosts: db files nisplus nis dns
>hosts:  files dns
> 
>bootparams: nisplus [NOTFOUND=return] files
> 
>ethers: files
>netmasks:   files
>networks:   files
>protocols:  files ldap
>rpc:files
>services:   files ldap
> 
>netgroup:   nisplus ldap
>#netgroup:   ldap
> 
>publickey:  nisplus
> 
>automount:  files nisplus ldap
>#automount:  files ldap
>aliases:files nisplus
> 
> Relevant parts of /etc/pam_ldap.conf (everything else is commented out):
> 
>host dir1.ourdomain.com
>base dc=.ourdomain,dc=com
>#uri ldaps://dir1.ourdomain.com
>uri ldap://dir1.ourdomain.com
> 
># basic auth config
>binddn cn=admin,dc=ourdomain,dc=com
>rootbinddn cn=admin,dc=ourdomain,dc=com
> 
># random stuff
>#timelimit 120
>#bind_timelimit 120
>#bind_policy hard
># brought these times down wmodes Aug 11, 2008
>timelimit 30
>bind_timelimit 30
>bind_policy soft
>idle_timelimit 3600
>nss_initgroups_ignoreusers root,ldap
> 
># pam config
>#pam_password md5
>pam_password md5
> 
># config for nss
>nss_base_passwd ou=people,dc=ourdomain,dc=com?one
>nss_base_shadow ou=people,dc=ourdomain,dc=com?one
>nss_base_group  ou=group,dc=ourdomain,dc=com?one
> 
># OpenLDAP SSL mechanism
># start_tls mechanism uses the normal LDAP port, LDAPS typically 636
>ssl no
> 
># OpenLDAP SSL options
># Require and verify server certificate (yes/no)
>#tls_checkpeer yes
> 
># CA certificates for server certificate verification
>tls_cacertfile /etc/openldap/cacerts/cacert.pem
>tls_cacertdir /etc/openldap/cacerts
> 
># Client certificate and key
>tls_cert /etc/openldap/cacerts/servercert.pem
>tls_key /etc/openldap/cacerts/serverkey.pem
> 
> Relevant parts of /etc/pam.d/system-auth:
> 
>authrequired  pam_env.so
>authsufficientpam_fprintd.so
>authsufficientpam_unix.so nullok try_first_pass
>authrequisite pam_succeed_if.so uid >= 500 quiet
>authsufficientpam_ldap.so use_first_pass
>authrequired  pam_deny.so
> 
>account required  pam_unix.so
>account sufficientpam_localuser.so
>account sufficientpam_succeed_if.so uid < 500 quiet
>account [default=bad success=ok user_unknown=ignore] pam_ldap.so
>account required  pam_permit.so
> 
>passwordrequisite pam_cracklib.so try_first_pass retry=3 type=
>passwordsufficientpam_unix.so sha512 shadow nullok
> try_first_pass use_authtok
>passwordsufficientpam_ldap.so use_authtok
>passwordrequired  pam_deny.so
> 
>session optional  pam_keyinit.so revoke
>session required  pam_limits.so
>session [success=1 default=ignore] pam_succeed_if.so service in
> crond quiet use_uid
>session required  pam_unix.so
>session optional  pam_ldap.so
>session optional  pam_mkhomedir.so skel=/etc/skel umask=077
> 
> And the only line in /etc/sysconfig/authconfig I changed was:
> 
>USELDAP=yes
> 
> Any thoughts?  For those who are experienced with nis and pam, I'm sure
> this is a no brainer, but I could sure use the little bit of your brain
> that knows how to fix this.
> 
> Wes

   binddn cn=admin,dc=ourdomain,dc=com
 

Re: [CentOS] LDAP users/groups not showing up with nis, pam, & ldap

2013-03-02 Thread Gordon Messmer
On 02/20/2013 03:50 PM, Wes Modes wrote:
> I am trying to configure NIS, PAM, & LDAP on a CentOS 6.2 host.  I've
> previously installed a similar configuration on RHEL4, but CentOS now
> uses nss-pam-ldapd and nslcd instead of nss_ldap, so the configurations
> are a little different.

Actually, the recommended stack is sssd.  Remove nss_ldap and 
nss-pam-ldapd, install sssd, and use authconfig to set up the 
configuration files.
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos