Sure can. Warning message on the server alerting of unsigned bind:
> Service 534667 Tue Jul 30 01:02:26 2013 2887 > Microsoft-Windows-ActiveDirectory_DomainService S-1-5-7 N/A Warning > milkdud.DOMAIN.local 16 > During the previous 24 hour period, some clients attempted to perform LDAP > binds that were either: > (1) A SASL (Negotiate, Kerberos, NTLM, or Digest) LDAP bind that did not > request signing (integrity validation), or > (2) A LDAP simple bind that was performed on a cleartext > (non-SSL/TLS-encrypted) connection > > This directory server is not currently configured to reject such binds. > The security of this directory server can be significantly enhanced by > configuring the server to reject such binds. For more details and > information on how to make this configuration change to the server, please > see http://go.microsoft.com/fwlink/?LinkID=87923. > > Summary information on the number of these binds received within the past > 24 hours is below. > > You can enable additional logging to log an event each time a client makes > such a bind, including information on which client made the bind. To do so, > please raise the setting for the "LDAP Interface Events" event logging > category to level 2 or higher. > > Number of simple binds performed without SSL/TLS: 0 > Number of Negotiate/Kerberos/NTLM/Digest binds performed without signing: > 691 Log of an actual unsigned bind by an SSSD client: > Service 25145 Tue Jul 30 11:56:31 2013 2889 > Microsoft-Windows-ActiveDirectory_DomainService S-1-5-7 N/A Information > milkdud.DOMAIN.local 16 The following client performed a SASL > (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing > (integrity verification), or performed a simple bind over a cleartext > (non-SSL/TLS-encrypted) LDAP connection. > > Client IP address: > 10.X.X.47:40288 > Identity the client attempted to authenticate as: > DOMAIN\KITKAT$ Debug output from SSSD on client that failed to authenticate: > root@kitkat:~# sssd -i -d 4 (Tue Jul 30 13:39:11 2013) [sssd] [start_service] (0x0100): Queueing > service pam for startup > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [id_callback] (0x0100): Got > id ack and version (1) from Monitor > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [set_srv_data_status] > (0x0100): Marking SRV lookup of service 'AD' as 'resolved' > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] > [resolv_gethostbyname_files_send] (0x0100): Trying to resolve A record of > 'milkdud.DOMAIN.local' in files > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [set_server_common_status] > (0x0100): Marking server 'milkdud.DOMAIN.local' as 'resolving name' > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] > [resolv_gethostbyname_files_send] (0x0100): Trying to resolve AAAA record > of 'milkdud.DOMAIN.local' in files > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] > [resolv_gethostbyname_dns_query] (0x0100): Trying to resolve A record of > 'milkdud.DOMAIN.local' in DNS > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [set_server_common_status] > (0x0100): Marking server 'milkdud.DOMAIN.local' as 'name resolved' > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [ad_resolve_callback] > (0x0100): Constructed uri 'ldap://milkdud.DOMAIN.local' > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [sdap_set_search_base] > (0x0100): Setting option [ldap_search_base] to [DC=DOMAIN,DC=local]. > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [common_parse_search_base] > (0x0100): Search base added: [DEFAULT][DC=DOMAIN,DC=local][SUBTREE][] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [sdap_set_search_base] > (0x0100): Setting option [ldap_user_search_base] to [DC=DOMAIN,DC=local]. > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [common_parse_search_base] > (0x0100): Search base added: [USER][DC=DOMAIN,DC=local][SUBTREE][] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [sdap_set_search_base] > (0x0100): Setting option [ldap_group_search_base] to [DC=DOMAIN,DC=local]. > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [common_parse_search_base] > (0x0100): Search base added: [GROUP][DC=DOMAIN,DC=local][SUBTREE][] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [sdap_set_search_base] > (0x0100): Setting option [ldap_netgroup_search_base] to > [DC=DOMAIN,DC=local]. > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [common_parse_search_base] > (0x0100): Search base added: [NETGROUP][DC=DOMAIN,DC=local][SUBTREE][] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [sdap_set_search_base] > (0x0100): Setting option [ldap_sudo_search_base] to [DC=DOMAIN,DC=local]. > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [common_parse_search_base] > (0x0100): Search base added: [SUDO][DC=DOMAIN,DC=local][SUBTREE][] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [sdap_set_search_base] > (0x0100): Setting option [ldap_service_search_base] to [DC=DOMAIN,DC=local]. > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [common_parse_search_base] > (0x0100): Search base added: [SERVICE][DC=DOMAIN,DC=local][SUBTREE][] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [sdap_set_search_base] > (0x0100): Setting option [ldap_autofs_search_base] to [DC=DOMAIN,DC=local]. > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [common_parse_search_base] > (0x0100): Search base added: [AUTOFS][DC=DOMAIN,DC=local][SUBTREE][] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] > [sdap_get_server_opts_from_rootdse] (0x0100): Setting AD compatibility > level to [3] > (Tue Jul 30 13:39:11 2013) [sssd[be[DOMAIN]]] [fo_resolve_service_send] > (0x0100): Trying to resolve service 'AD' > (Tue Jul 30 13:39:11 2013) [[sssd[ldap_child[13102]]]] > [ldap_child_get_tgt_sync] (0x0100): Principal name is: > [KITKAT$@DOMAIN.LOCAL] > (Tue Jul 30 13:39:11 2013) [[sssd[ldap_child[13102]]]] > [ldap_child_get_tgt_sync] (0x0100): Using keytab [default] > (Tue Jul 30 13:39:12 2013) [sssd[pam]] [monitor_common_send_id] (0x0100): > Sending ID: (pam,1) > (Tue Jul 30 13:39:12 2013) [sssd[pam]] [sss_names_init] (0x0100): Using re > [(((?P<domain>[^\\]+)\\(?P<name>.+$))|((?P<name>[^@]+)@(?P<domain>.+$))|(^(?P<name>[^@\\]+)$))]. > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [be_client_init] (0x0100): > Set-up Backend ID timeout [0x9ac0160] > (Tue Jul 30 13:39:12 2013) [sssd[nss]] [monitor_common_send_id] (0x0100): > (Tue Jul 30 13:39:12 2013) [sssd[pam]] [dp_common_send_id] (0x0100): > Sending ID to DP: (1,PAM) > Sending ID: (nss,1) > (Tue Jul 30 13:39:12 2013) [sssd[pam]] [responder_set_fd_limit] (0x0100): > (Tue Jul 30 13:39:12 2013) [sssd[nss]] [sss_names_init] (0x0100): Using re > [(((?P<domain>[^\\]+)\\(?P<name>.+$))|((?P<name>[^@]+)@(?P<domain>.+$))|(^(?P<name>[^@\\]+)$))]. > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [be_client_init] (0x0100): > Set-up Backend ID timeout [0x9ac5600] > (Tue Jul 30 13:39:12 2013) [sssd[nss]] [dp_common_send_id] (0x0100): > Sending ID to DP: (1,NSS) > Maximum file descriptors set to [4096] > (Tue Jul 30 13:39:12 2013) [sssd] [client_registration] (0x0100): Received > ID registration: (pam,1) > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [client_registration] > (0x0100): Cancel DP ID timeout [0x9ac0160] > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [client_registration] > (0x0100): Added Frontend client [PAM] > (Tue Jul 30 13:39:12 2013) [sssd[pam]] [id_callback] (0x0100): Got id ack > and version (1) from Monitor > (Tue Jul 30 13:39:12 2013) [sssd[pam]] [dp_id_callback] (0x0100): Got id > ack and version (1) from DP > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [child_sig_handler] > (0x0100): child [13102] finished successfully. > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sdap_cli_auth_step] > (0x0100): expire timeout is 900 > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sasl_bind_send] (0x0100): > Executing sasl bind mech: gssapi, user: KITKAT$ > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sasl_bind_send] (0x0020): > ldap_sasl_bind failed (8)[Strong(er) authentication required] > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sasl_bind_send] (0x0080): > Extended failure message: [00002028: LdapErr: DSID-0C0901FC, comment: The > server requires binds to turn on integrity checking if SSL\TLS are not > already active on the connection, data 0, v1772] > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [fo_set_port_status] > (0x0100): Marking port 389 of server 'milkdud.DOMAIN.local' as 'not working' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [fo_resolve_service_send] > (0x0100): Trying to resolve service 'AD' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] > [resolv_gethostbyname_files_send] (0x0100): Trying to resolve A record of > 'fudge.DOMAIN.local' in files > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [set_server_common_status] > (0x0100): Marking server 'fudge.DOMAIN.local' as 'resolving name' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] > [resolv_gethostbyname_files_send] (0x0100): Trying to resolve AAAA record > of 'fudge.DOMAIN.local' in files > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] > [resolv_gethostbyname_dns_query] (0x0100): Trying to resolve A record of > 'fudge.DOMAIN.local' in DNS > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [set_server_common_status] > (0x0100): Marking server 'fudge.DOMAIN.local' as 'name resolved' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [ad_resolve_callback] > (0x0100): Constructed uri 'ldap://fudge.DOMAIN.local' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] > [sdap_get_server_opts_from_rootdse] (0x0100): Setting AD compatibility > level to [3] > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [fo_resolve_service_send] > (0x0100): Trying to resolve service 'AD' > (Tue Jul 30 13:39:12 2013) [[sssd[ldap_child[13103]]]] > [ldap_child_get_tgt_sync] (0x0100): Principal name is: > [KITKAT$@DOMAIN.LOCAL] > (Tue Jul 30 13:39:12 2013) [[sssd[ldap_child[13103]]]] > [ldap_child_get_tgt_sync] (0x0100): Using keytab [default] > (Tue Jul 30 13:39:12 2013) [sssd[nss]] [responder_set_fd_limit] (0x0100): > Maximum file descriptors set to [4096] > (Tue Jul 30 13:39:12 2013) [sssd] [client_registration] (0x0100): Received > ID registration: (nss,1) > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [client_registration] > (0x0100): Cancel DP ID timeout [0x9ac5600] > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [client_registration] > (0x0100): Added Frontend client [NSS] > (Tue Jul 30 13:39:12 2013) [sssd[nss]] [id_callback] (0x0100): Got id ack > and version (1) from Monitor > (Tue Jul 30 13:39:12 2013) [sssd[nss]] [dp_id_callback] (0x0100): Got id > ack and version (1) from DP > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [child_sig_handler] > (0x0100): child [13103] finished successfully. > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sdap_cli_auth_step] > (0x0100): expire timeout is 900 > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sasl_bind_send] (0x0100): > Executing sasl bind mech: gssapi, user: KITKAT$ > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sasl_bind_send] (0x0020): > ldap_sasl_bind failed (8)[Strong(er) authentication required] > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sasl_bind_send] (0x0080): > Extended failure message: [00002028: LdapErr: DSID-0C0901FC, comment: The > server requires binds to turn on integrity checking if SSL\TLS are not > already active on the connection, data 0, v1772] > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [fo_set_port_status] > (0x0100): Marking port 389 of server 'fudge.DOMAIN.local' as 'not working' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [fo_resolve_service_send] > (0x0100): Trying to resolve service 'AD' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [fo_resolve_service_send] > (0x0020): No available servers for service 'AD' > (Tue Jul 30 13:39:12 2013) [sssd[be[DOMAIN]]] [sdap_id_op_connect_done] > (0x0020): Failed to connect, going offline (5 [Input/output error]) -Chris On Tue, Jul 30, 2013 at 1:16 PM, Jakub Hrozek <jhro...@redhat.com> wrote: > On Tue, Jul 30, 2013 at 11:53:34AM -0400, Chris Hartman wrote: > > Ah. It appears I now have a reason to perform SASL binds over LDAPS. My > > Active Directory guys are complaining; they say the AD server is throwing > > errors that some clients are performing unsigned SASL binds. When signing > > is required on the server, bind attempts from SSSD clients fail. > > > > So, I ask again, is there a way I can force my SSSD clients to use LDAPS? > > Can you paste the error you saw on the client? (Or even the server side > event log?) > _______________________________________________ > sssd-users mailing list > sssd-users@lists.fedorahosted.org > https://lists.fedorahosted.org/mailman/listinfo/sssd-users >
_______________________________________________ sssd-users mailing list sssd-users@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/sssd-users