[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
How to now if smbk5pwd is working?
Hi all, im trying to get password sync with smbk5pwd, but is not working
there is my config:
[root@ldapsrv ~]# cat /etc/openldap/slapd.conf
#
# See slapd.conf(5) for details on configuration options.
# This file should NOT be world readable.
#
include /etc/openldap/schema/core.schema
include /etc/openldap/schema/cosine.schema
include /etc/openldap/schema/inetorgperson.schema
include /etc/openldap/schema/nis.schema
include /etc/openldap/schema/lmc.schema
include /etc/openldap/schema/samba.schema
include /etc/openldap/schema/mail.schema
# acl's
include /etc/openldap/AclsLdap.acl
# Allow LDAPv2 client connections. This is NOT the default.
allow bind_v2
# Do not enable referrals until AFTER you have a working directory
# service AND an understanding of referrals.
#referral ldap://root.openldap.org
pidfile /var/run/openldap/slapd.pid
argsfile /var/run/openldap/slapd.args
# Load dynamic backend modules:
# modulepath /usr/lib/openldap
# moduleload back_bdb.la
# moduleload back_ldap.la
# moduleload back_ldbm.la
# moduleload back_passwd.la
# moduleload back_shell.la
moduleload /usr/lib/openldap/smbk5pwd.la
# The next three lines allow use of TLS for encrypting connections using a
# dummy test certificate which you can generate by changing to
# /etc/pki/tls/certs, running "make slapd.pem", and fixing permissions on
# slapd.pem so that the ldap user or group can read it. Your client software
# may balk at self-signed certificates, however.
# TLSCACertificateFile /etc/pki/tls/certs/ca-bundle.crt
# TLSCertificateFile /etc/pki/tls/certs/slapd.pem
# TLSCertificateKeyFile /etc/pki/tls/certs/slapd.pem
# Sample security restrictions
# Require integrity protection (prevent hijacking)
# Require 112-bit (3DES or better) encryption for updates
# Require 63-bit encryption for simple bind
# security ssf=1 update_ssf=112 simple_bind=64
# Sample access control policy:
# Root DSE: allow anyone to read it
# Subschema (sub)entry DSE: allow anyone to read it
# Other DSEs:
# Allow self write access
# Allow authenticated users read access
# Allow anonymous users to authenticate
# Directives needed to implement policy:
# access to dn.base="" by * read
# access to dn.base="cn=Subschema" by * read
# access to *
# by self write
# by users read
# by anonymous auth
#
# if no access controls are present, the default policy
# allows anyone and everyone to read anything but restricts
# updates to rootdn. (
e.g., "access to * by * read")
#
# rootdn can always read and write EVERYTHING!
#######################################################################
# ldbm and/or bdb database definitions
#######################################################################
database bdb
suffix "dc=venap,dc=com"
rootdn "cn=admin,dc=XXXX,dc=com"
# Cleartext passwords, especially for the rootdn, should
# be avoided. See slappasswd(8) and
slapd.conf(5) for details.
# Use of strong authentication encouraged.
# rootpw secret
# rootpw {crypt}ijFYNcSNctBYg
rootpw {SSHA}+u59b3iW+lYALN9x6IKmm7OnqU6y709G
# The database directory MUST exist prior to running slapd AND
# should only be accessible by the slapd and slap tools.
# Mode 700 recommended.
directory /var/lib/ldap
overlay smbk5pwd
smbk5pwd-enable samba
# Indices to maintain for this database
index objectClass eq,pres
index ou,cn,mail,surname,givenname eq,pres,sub
index uidNumber,gidNumber,loginShell eq,pres
index uid,memberUid eq,pres,sub
index nisMapName,nisMapEntry eq,pres,sub
# Replicas of this database
#replogfile /var/lib/ldap/openldap-master-replog
#replica host=ldap-1.example.com:389 starttls=critical
# bindmethod=sasl saslmech=GSSAPI
# authcId=host/ldap-master.example.com@EXAMPLE.COM
loglevel 4
[root@ldapsrv ~]# passwd emma
Changing password for user emma.
Enter login(LDAP) password:
New UNIX password:
BAD PASSWORD: it is based on a dictionary word
Retype new UNIX password:
LDAP password information changed for emma
passwd: all authentication tokens updated successfully.
[root@ldapsrv
~]# cat /var/log/openldap
Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(12)
Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(12)
Jul 15 17:24:46 ldapsrv slapd[14318]: SRCH "dc=venap,dc=com" 2 0
Jul 15 17:24:46 ldapsrv slapd[14318]: 1 120 0
Jul 15 17:24:46 ldapsrv slapd[14318]: filter: (&(objectClass=posixAccount)(uid=emma))
Jul 15 17:24:46 ldapsrv slapd[14318]: attrs:
Jul 15 17:24:46 ldapsrv slapd[14318]: uid
Jul 15 17:24:46 ldapsrv slapd[14318]: userPassword
Jul 15 17:24:46 ldapsrv slapd[14318]: uidNumber
Jul 15 17:24:46 ldapsrv slapd[14318]: gidNumber
Jul 15 17:24:46 ldapsrv slapd[14318]: cn
Jul 15 17:24:46 ldapsrv slapd[14318]: homeDirectory
Jul 15 17:24:46 ldapsrv slapd[14318]: loginShell
Jul 15 17:24:46 ldapsrv slapd[14318]: gecos
Jul 15 17:24:46 ldapsrv slapd[14318]: description
Jul 15 17:24:46 ldapsrv slapd[14318]: objectClass
Jul 15 17:24:46 ldapsrv slapd[14318]:
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [b49d1940]
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [5941c014]
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [d1726a87]
Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(12)
Jul 15 17:24:46 ldapsrv slapd[14318]: SRCH "dc=venap,dc=com" 2 0
Jul 15 17:24:46 ldapsrv slapd[14318]: 1 120 0
Jul 15 17:24:46 ldapsrv slapd[14318]: filter: (&(objectClass=posixAccount)(uid=emma))
Jul 15 17:24:46 ldapsrv slapd[14318]: attrs:
Jul 15 17:24:46 ldapsrv slapd[14318]: uid
Jul 15 17:24:46 ldapsrv slapd[14318]: userPassword
Jul 15 17:24:46 ldapsrv slapd[14318]: uidNumber
Jul 15 17:24:46 ldapsrv slapd[14318]: gidNumber
Jul 15 17:24:46 ldapsrv slapd[14318]: cn
Jul 15 17:24:46 ldapsrv slapd[14318]: homeDirectory
Jul 15 17:24:46 ldapsrv slapd[14318]: loginShell
Jul 15 17:24:46 ldapsrv slapd[14318]: gecos
Jul 15 17:24:46 ldapsrv slapd[14318]: description
Jul 15 17:24:46 ldapsrv slapd[14318]: objectClass
Jul 15 17:24:46 ldapsrv slapd[14318]:
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [b49d1940]
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [5941c014]
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [d1726a87]
Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:46 ldapsrv slapd[14318]: SRCH "dc=venap,dc=com" 2 0
Jul 15 17:24:46 ldapsrv slapd[14318]: 1 120 0
Jul 15 17:24:46 ldapsrv slapd[14318]: filter: (uid=emma)
Jul 15 17:24:46 ldapsrv slapd[14318]: attrs:
Jul 15 17:24:46 ldapsrv slapd[14318]:
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [b49d1940]
Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [d1726a87]
Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:49 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:49 ldapsrv slapd[14318]: ==> bdb_bind: dn: uid=emma,ou=Users,dc=venap,dc=com
Jul 15 17:24:49 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:49 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:49 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:56 ldapsrv slapd[14318]: ==> bdb_bind: dn: uid=emma,ou=Users,dc=venap,dc=com
Jul 15 17:24:56 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:56 ldapsrv slapd[14318]: do_modify: dn (uid=emma,ou=Users,dc=venap,dc=com)
Jul 15 17:24:56 ldapsrv slapd[14318]: modifications:
Jul 15 17:24:56 ldapsrv slapd[14318]: replace: userPassword
Jul 15 17:24:56 ldapsrv slapd[14318]: one value, length 41
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify: uid=emma,ou=Users,dc=venap,dc=com
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace userPassword
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace entryCSN
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifiersName
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifyTimestamp
Jul 15 17:24:56 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:56 ldapsrv slapd[14318]: do_modify: dn (uid=emma,ou=Users,dc=venap,dc=com)
Jul 15 17:24:56 ldapsrv slapd[14318]: modifications:
Jul 15 17:24:56 ldapsrv slapd[14318]: replace: shadowLastChange
Jul 15 17:24:56 ldapsrv slapd[14318]: one value, length 5
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify: uid=emma,ou=Users,dc=venap,dc=com
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace shadowLastChange
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace entryCSN
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifiersName
Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifyTimestamp
Jul 15 17:24:56 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text=""
Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15)
Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(12)
[root@ldapsrv ~]# smbclient //192.168.0.234/partage -U emma
Password:
session setup failed: NT_STATUS_LOGON_FAILURE
with the new password
What could be missing or this overlay smbk5pwd dont have to do that work??
Im running in CentOS 5
[root@ldapsrv ~]# rpm -qa | grep ldap
python-ldap-2.2.0-2.1
smbldap-tools-0.9.2-1
openldap-debuginfo-2.3.34-6
php-ldap-5.1.6-12.el5
openldap-2.3.34-6
openldap-clients-2.3.34-6
openldap-devel-2.3.34-6
nss_ldap-253-3
openldap-servers-2.3.34-6
Thanks for your help, around this problem.
New Zen.