Ehlo,

[EMAIL PROTECTED] writes:

> Hello Adam,
> 
> I really know this isnt what you asked for...but...i followed all the 
> steps from
> IdealX samba howto (samba with a ldap backend).
> 
> I had the exact same problem when i was trying to auth sshd onto ldap.

theres a patch for sshd with ldap... im using it... feel free to check
it at tsl.chung.li.....

> 
> The solution i managed (which was no problem at all for me since i was 
> allready
> using samba for our centralized auth service) was to use pam_smb.
> 
> I have a pam_smb module which auths against a samba 3.x server (which 
> keeps its
> database on a ldap server).
> 
> Allthough the passwords are case unsensitive (because of the 
> implemenation used
> by pam_smb [which auths against NT or LM hashes (err..dont quite know 
> right now
> but ONE of them is case unsensitive)], i now have a centralized service 
> to auth
> against.
> 
> If you think about it, it is quite better then to let your local linux server
> auth DIRECTLY onto the LDAP service.
> 
> Whith my configuration a hacked machine can only sniff auths / or 
> backdoor a pam
> module to get passwords. With the configuration you are trying to achive, you
> have to configure a file on your system with full read access to your LDAP
> server (which means that if you get hacked, people will be able to get ALL the
> {crypt}ed passwords from your system.
> 
> I hope this is some usefull information for you :o)
> 
> Best regards,
> Luís Miguel Silva
> Security Advisor
> Faculty of Engineering
> Oporto's University
> 
> Quoting Adam Zaleski <[EMAIL PROTECTED]>:
> 
>> Hello list,
>>
>> I'm trying to setup openldap system account's authenticantion.
>> I have installed
>>
>> openssh-server-4.2p1-1tr
>> nss_ldap-220-2tr
>> pam_ldap-175-2tr
>>
>> I've used migrate_all_online script to migrate system accounts to
>> ldap. My configuration files:
>>
>> /etc/ldap.conf
>>
>> host localhost
>> base dc=bryndzel,dc=org
>> port 389
>> scope one
>> nss_base_passwd         ou=People,dc=bryndzel,dc=org?one
>> nss_base_shadow         ou=People,dc=bryndzel,dc=org?one
>> nss_base_group          ou=Group,dc=bryndzel,dc=org?one
>> ssl no
>> pam_password md5
>>
>> /etc/nsswitch.conf
>>
>> passwd:     files ldap
>> shadow:     files ldap
>> group:      files ldap
>>
>>
>> /etc/pam.d/system-auth
>>
>> #%PAM-1.0
>> # This file is auto-generated.
>> # User changes will be destroyed the next time authconfig is run.
>> auth        required      /lib/security/pam_env.so
>> auth        sufficient    /lib/security/pam_unix.so likeauth nullok
>> auth        sufficient    /lib/security/pam_ldap.so debug use_first_pass
>> auth        required      /lib/security/pam_deny.so
>>
>> account     required      /lib/security/pam_unix.so
>> account     [default=bad success=ok user_unknown=ignore 
>> service_err=ignore system_err=ignore] /lib/security/pam_ldap.so debug
>>
>> password    required      /lib/security/pam_cracklib.so retry=3 type=
>> password    sufficient    /lib/security/pam_unix.so nullok 
>> use_authtok md5 shadow
>> password    sufficient    /lib/security/pam_ldap.so debug use_authtok
>> password    required      /lib/security/pam_deny.so
>>
>> session     required      /lib/security/pam_limits.so
>> session     required      /lib/security/pam_unix.so
>> session     optional      /lib/security/pam_ldap.so debug
>>
>>
>> These files was created using `authconfig`.
>>
>> I have a test user stoded on ldap. Everything seems to woks  fine:
>>
>> ((root::bryndzel))(~)# cat /etc/passwd |grep testuser
>> ((root::bryndzel))(~)# id testuser
>> uid=520(testuser) gid=100(users) groups=100(users)
>> ((root::bryndzel))(~)# getent passwd |grep testuser
>> testuser:x:520:100:testuser:/home/users/testuser:/bin/bash
>> ((root::bryndzel))(~)#
>>
>>
>> And the main problem is that i can't connect to host using sshd.
>> I have use pam enabled on sshd_config. ssh tell me that the
>> password is wrong for testuser.
>>
>> thanks for any help
>>
>>

_______________________________________________
tsl-discuss mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-discuss

Reply via email to