On 04/06/2013 01:19 AM, Chris Gray wrote:
> Sorry in advance for the most likely repeated question. After
> searching for a week, and still being stuck, it was time to ask the
> mailing list.
>
> I have a CentOS 6.4 machine that I'm trying to use SSSD/LDAP/KRB5
> to authenticate with active directory.
>
> I can do ldapsearch commands with ldap, or ldaps (the ldap only works
> due to the machine account, using GSSAPI, otherwise, my domain doesn't
> support anonymous binding).
>
> I can kinit my username, and klist shows the host/hostname entries.
>
> OpenSSL doesn't complain about my certs.
>
> My only problem seems to be SSSD saying my ports are down. I get the
> same message for 389 and 636. Once it's marked as not working,
> the authentication clearly fails (first login, no cache to fall back on).
>
> I can telnet to the ports from the centos machine. I can telnet (well,
> kitty in telnet mode) to them from my windows workstation.
>
> Any ideas?
>
> Installed versions:
> sssd-1.9.2-82.4.el6_4.x86_64
> sssd-client-1.9.2-82.4.el6_4.x86_64
> openldap-2.4.23-32.el6_4.x86_64
> openldap-clients-2.4.23-32.el6_4.x86_64
> nss-3.14.0.0-12.el6.x86_64
> krb5-workstation-1.10.3-10.el6_4.1.x86_64
> pam-1.1.1-13.el6.x86_64
> kstart-4.1-2.el6.x86_64
> msktutil-0.4.2-1.el6.x86_64
>
> My ldapsearch commands, 
> ldapsearch -H ldaps://server.fqdn:636/ -Y GSSAPI -N -b
> "dc=example,dc=corp" "(&(objectClass=user)(sAMAccountName=username))"
> ldapsearch -H ldaps://server.fqdn:636/ -x -b '' -s base
> supportedSASLMechanisms
>
> Both of those work, and can work over non-tls ldap.
>
> openssl s_client -connect server.fqdn:636 -CAfile
> /etc/openldap/certs/adpubkeycerts.pem
> That command works fine.
>
> (Fri Apr  5 20:43:49 2013) [[sssd[ldap_child[1532]]]]
> [sss_child_krb5_trace_cb] (0x4000): [1532] 1365219829.627008: Received
> error from KDC: -1765328378/Client not found in Kerberos database

It seems that the host name is not resolved properly.
I would start with making sure the DNS has the right entries for the
client and can resolve it.

>
> (Fri Apr  5 20:43:49 2013) [sssd[be[domain.corp]]] [sdap_get_tgt_recv]
> (0x0400): Child responded: 14 [Client not found in Kerberos database],
> expired on [0]
> (Fri Apr  5 20:43:49 2013) [sssd[be[domain.corp]]] [sdap_kinit_done]
> (0x0100): Could not get TGT: 14 [Bad address]
> (Fri Apr  5 20:43:49 2013) [sssd[be[domain.corp]]]
> [sdap_cli_kinit_done] (0x0400): Cannot get a TGT: ret [5] result [4]
>
> I'm assuming those log entries are my problem.
> Or not, I fixed those by adding this to sssd.conf, which doesn't seem
> like it should be needed, as I would think it'd pick it up from
> /etc/krb5.keytab:
> ldap_sasl_authid = server$@fqdn
>
> Well, at least that's progress, still can't login though with an AD
> account.
>
> Hopefully that's just a matter of fixing these:
> (Fri Apr  5 22:11:34 2013) [sssd[be[domain.corp]]] [krb5_auth_send]
> (0x0100): No ccache file for user [ADUser] found.
> (Fri Apr  5 22:11:34 2013) [sssd[be[domain.corp]]] [krb5_auth_send]
> (0x4000): Ccache_file is [not set] and is not active and TGT is not valid.
>
>
> Any help would be appreciated,
> Thanks,
> Chris
>
>
> _______________________________________________
> sssd-users mailing list
> sssd-users@lists.fedorahosted.org
> https://lists.fedorahosted.org/mailman/listinfo/sssd-users


-- 
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/



_______________________________________________
sssd-users mailing list
sssd-users@lists.fedorahosted.org
https://lists.fedorahosted.org/mailman/listinfo/sssd-users

Reply via email to