[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
FW: pam_ldap OpenLDAP Insufficient access, multiple password prom pts, password encryption
> I'm not sure why, but this appeared to get bounced the first time. Maybe
> I was a little too quick after the confirmation.
>
>
> -----Original Message-----
> From: Greg Hodgins
> Sent: March 2, 2002 2:31 AM
> To: 'openldap-software@OpenLDAP.org'
> Subject: pam_ldap OpenLDAP Insufficient access, multiple password
> prompts, password encryption
>
> Hi all. I've given it my all, but I can't get my ldap authentication
> working properly on my RH 7.2 box. I'm almost there. If I leave my ACL
> wide open
>
> access to *
> by * write
>
> things work pretty well for the most part. I can log in, and change my
> passwords and everything stays in sync between ldap and Unix - although I
> do have to type in the password for both pam_unix and pam_ldap (I would
> guess that is what is occuring). I think this should be avoidable, but
> playing with the try/use_first_pass doesn't seem to work. It gets even
> worse, three prompts (two from unix on from pam) if I put the pam_ldap
> module after pam_unix_passwd. I have a feeling this is to do with the
> password encryption. I have md5 turned on in the /etc/shadow passwords,
> and the password would not appear to be stored in the same way in
> OpenLDAP.
>
> ** Just a note to some that might encounter the same problem as me. By
> making the pam_ldap and pam_unix auth required, if the passwords get out
> of sync, as they very well can, you will end up with Access denied
> (through SSH anyway) or something similar**
>
> Anyhow the real problem is the password changing does not work at all if I
> tighten up the ACL, as I must, but certainly still to where it should work
> - like below for example.
>
> access to *
> by self write
> by dn="uid=root,dc=domain,dc=com" write
> by * read
> by anonymous auth
>
> With the above access I get the following Insufficient access message when
> changing passwords (you can also see the number of prompts it is giving
> me)
>
> [greg@gateway greg]$ passwd
> Changing password for greg
> (current) UNIX password:
> Enter login(LDAP) password:
> New UNIX password:
> Retype new UNIX password:
> Enter new UNIX password:
> Retype new UNIX password:
> New password:
> Re-enter new password:
> LDAP password information update failed: Insufficient access
> passwd: Permission denied
> [greg@gateway greg]$
>
> What does the "self" in the ACL refer to? Who is bound in this scenario?
> The user id + the base DN in slapd.conf? Also, If I bind with my rootdn
> at the command prompt things work fine for adding entries using ldapadd,
> but if I try to change the password for the same user I get the following.
> Very very frustrating.
>
> [root@gateway openldap]# ldappasswd -WS -D 'cn=root,dc=domain,dc=com' -x
> greg
> New password:
> Re-enter new password:
> Enter bind password:
> Result: Invalid DN syntax (34)
> Additional info: Invalid DN
>
> or
>
> [root@gateway openldap]# ldappasswd -WS -D
> 'cn=root,ou=People,dc=domain,dc=com' -x greg
> New password:
> Re-enter new password:
> Enter bind password:
> ldap_bind: Invalid credentials
>
> but as stated I can bind and add with the same root dn no problems (see
> below)
>
> [root@gateway openldap]# ldapadd -x -D "cn=root,dc=domain,dc=com" -W -f
> testuser.ldif
> Enter LDAP Password:
> adding new entry "uid=testuser,ou=People,dc=domain,dc=com"
>
> [root@gateway openldap]#
>