Thank's for your reply Dennis,
But our ldap server is populatted with this groups manual, with
ldif files, but users are added with smbldap-useradd. So our users
are not related to users, they are linked just with memberUID data
from LDAP group information.
I tried your solution now anyway, but it seems not work too,
because each user has its own samba group. I wiil map some
information at nslcd to see if access.so may do this filter job.
Thank's again Dennis.
On 15/12/2014 12:01, Dennis Leeuw
wrote:
Just a side track:
Isn't it easier to use PAM for that as in:
/etc/security/access.conf ?
Add:
+ : (logonDRAGUNOV) : ALL
- : ALL : ALL
Maybe add some other acceptions, like logging in to localhost,
but you get the point, I hope.
Greetings,
Dennis
On 15-12-14 14:17, Otavio Campos Velho Gloria wrote:
Hi guys,
I'm needing some help.
I've configured a server to authenticate throuh a LDAP
server, an it's working; users are able to access the server via
ssh. Although we need to restric access by groups; were we
create one group to each server and put on this group all user
that have permission to access this server.
I believe that my configuration is write, because it's
consulting correctily, but when try to filter by group it's not
working. On nslcd debug I saw that group filter is doing it's
job, but even when it returns no result (user not on this group)
the system permits the access.
User og is on group logonDRAGUNOV, but not on group
logonVISAO.
How can I get this working? I'm using CentOS 7
----------------------------------------------------------
Packages:
nss-pam-ldapd-0.8.13-8.el7.x86_64
openldap-2.4.39-3.el7.x86_64
penldap-clients-2.4.39-3.el7.x86_64
pam-1.1.8-9.el7.x86_64
pam_pkcs11-0.6.2-17.el7.x86_64
----------------------------------------------------------
/etc/openldap/ldap.conf:
URI ldaps://ldap.intranet.e-trust.com.br
BASE dc=e-trust,dc=com,dc=br
TLS_CACERTDIR /etc/openldap/cacerts
----------------------------------------------------------
/etc/openldap/cacerts:
-rw-r--r--. 1 nslcd ldap 4446 Dec 9 14:37 1
lrwxrwxrwx 1 root root 10 Dec 11 12:46 5a272d0c.0 ->
d540ba5e.0
lrwxrwxrwx 1 root root 7 Dec 11 12:46 5a272d0c.1 ->
nss.crt
lrwxrwxrwx 1 root root 10 Dec 11 12:46 65fda68d.0 ->
6fbb64e7.0
lrwxrwxrwx 1 root root 6 Dec 11 12:46 65fda68d.1 ->
ca.pem
lrwxrwxrwx 1 root root 10 Dec 11 12:46 6ae8e84b.0 ->
cacert.pem
-rw-r--r--. 1 nslcd ldap 2534 Mar 23 2010 6fbb64e7.0
drwxr-xr-x. 2 nslcd ldap 4096 Dec 10 10:01 backup
-rw-r--r--. 1 nslcd ldap 2455 Mar 17 2014 cacert.pem
-rw-r--r--. 1 nslcd ldap 2534 Mar 23 2010 ca.pem
-rw-r--r--. 1 nslcd ldap 2387 Mar 23 2010 d540ba5e.0
-rw-r--r--. 1 nslcd ldap 2387 Mar 23 2010 nss.crt
-rw-r--r--. 1 nslcd ldap 1676 Mar 23 2010 nss.key
----------------------------------------------------------
nscld.conf:
#===============================================================================
# RUN OPTIONS
#===============================================================================
uid nslcd
gid ldap
#===============================================================================
# TIMING/RECONNECT OPTIONS
#===============================================================================
# Tempo de conexao com o ldap
# Default: bind_timelimit 10
bind_timelimit 3
# Tempo de espera pela resposta
# Default: timelimit 0 (espera o resto da vida)
timelimit 60
# Tempo de inatividade da conexao com o ldap para cortar
# Default: Nao cortar
idle_timelimit 600
# Tempo de espera para tentar reconectar
reconnect_sleeptime 1
# Tempo que tenta reconectar, depois da por indisponivel
reconnect_retrytime 10
#===============================================================================
# SSL/TLS OPTIONS
#===============================================================================
ssl on
tls_reqcert allow
tls_cacertdir /etc/openldap/cacerts
#===============================================================================
# GENERAL CONNECTION OPTIONS
#===============================================================================
uri ldaps://ldap.intranet.e-trust.com.br/
#===============================================================================
# SEARCH/MAPPING OPTIONS
#===============================================================================
base dc=e-trust,dc=com,dc=br
scope group sub
scope passwd sub
scope hosts sub
scope shadow sub
base group ou=Groups,dc=e-trust,dc=com,dc=br
base passwd ou=People,dc=e-trust,dc=com,dc=br
base hosts ou=People,dc=e-trust,dc=com,dc=br
base shadow ou=People,dc=e-trust,dc=com,dc=br
filter passwd (objectClass=posixAccount)
filter group (&(objectClass=posixGroup)(cn=logonVISAO))
#filter group (&(objectClass=posixGroup)(cn=logonDRAGUNOV))
map group member memberUID
#===============================================================================
# OTHER OPTIONS
#===============================================================================
nss_initgroups_ignoreusers
root,ldap,named,avahi,haldaemon,dbus,radvd,tomcat,radiusd,news,mailman,nscd,gdmi,nslcd
----------------------------------------------------------
/etc/pam.d/sshd:
#%PAM-1.0
auth required pam_sepermit.so
auth substack password-auth
auth include postlogin
account required pam_nologin.so
account include password-auth
password include password-auth
# pam_selinux.so close should be the first session rule
session required pam_selinux.so close
session required pam_loginuid.so
# pam_selinux.so open should only be followed by sessions to be
executed in the user context
session required pam_selinux.so open env_params
session optional pam_keyinit.so force revoke
session include password-auth
session include postlogin
----------------------------------------------------------
/etc/pam.d/password-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is
run.
auth required pam_env.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 1000
quiet_success
auth sufficient pam_ldap.so use_first_pass debug
auth required pam_deny.so
account required pam_unix.so broken_shadow
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 1000 quiet
account [default=bad success=ok user_unknown=ignore
authinfo_unavail=ignore] pam_ldap.so
account required pam_permit.so
password requisite pam_pwquality.so try_first_pass
local_users_only retry=3 authtok_type=
password sufficient pam_unix.so sha512 shadow nullok
try_first_pass use_authtok
password sufficient pam_ldap.so use_authtok debug
password required pam_deny.so
session optional pam_mkhomedir.so skel=/etc/skel/
umask=0022
session optional pam_keyinit.so revoke
session required pam_limits.so
-session optional pam_systemd.so
session [success=1 default=ignore] pam_succeed_if.so service
in crond quiet use_uid
session required pam_unix.so
session optional pam_ldap.so
----------------------------------------------------------
/etc/pam.d/system-auth:
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is
run.
auth required pam_env.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 1000
quiet_success
auth sufficient pam_ldap.so
auth required pam_deny.so
account required pam_unix.so
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 1000 quiet
account [default=bad success=ok user_unknown=ignore]
pam_ldap.so
account required pam_permit.so
password requisite pam_pwquality.so try_first_pass
local_users_only retry=3 authtok_type=
password sufficient pam_unix.so sha512 shadow nullok
try_first_pass use_authtok
password sufficient pam_ldap.so use_authtok
password required pam_deny.so
session optional pam_mkhomedir.so skel=/etc/skel/
umask=0022
session optional pam_keyinit.so revoke
session required pam_limits.so
-session optional pam_systemd.so
session [success=1 default=ignore] pam_succeed_if.so service
in crond quiet use_uid
session required pam_unix.so
session optional pam_ldap.so
----------------------------------------------------------
ldapsearch -x -H 'ldaps://ldap.intranet.e-trust.com.br'
-b 'ou=People,dc=e-trust,dc=com,dc=br' "(uid=og)"
# extended LDIF
#
# LDAPv3
# base <ou=People,dc=e-trust,dc=com,dc=br> with scope
subtree
# filter: (uid=og)
# requesting: ALL
#
# og, People, e-trust.com.br
dn: uid=og,ou=People,dc=e-trust,dc=com,dc=br
objectClass: top
objectClass: inetOrgPerson
objectClass: posixAccount
objectClass: shadowAccount
objectClass: sambaSamAccount
cn: Otavio Campos Velho Gloria
sn: og
uid: og
uidNumber: 61676
gidNumber: 513
homeDirectory: /home/og
gecos: Otavio Campos Velho Gloria
description: Otavio Campos Velho Gloria
loginShell: /bin/bash
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
-----------------------------------------------------------
ldapsearch -x -H 'ldaps://ldap.intranet.e-trust.com.br'
-b 'ou=Groups,dc=e-trust,dc=com,dc=br' "(cn=logonDRAGUNOV)"
# extended LDIF
#
# LDAPv3
# base <ou=Groups,dc=e-trust,dc=com,dc=br> with scope
subtree
# filter: (cn=logonDRAGUNOV)
# requesting: ALL
#
# logonDRAGUNOV, Groups, e-trust.com.br
dn: cn=logonDRAGUNOV,ou=Groups,dc=e-trust,dc=com,dc=br
objectClass: posixGroup
objectClass: sambaGroupMapping
cn: logonDRAGUNOV
gidNumber: 61208
memberUid: uid=ds,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ds
memberUid: uid=vbs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: vbs
memberUid: uid=cp,ou=People,dc=e-trust,dc=com,dc=br
memberUid: cp
memberUid: uid=dtr,ou=People,dc=e-trust,dc=com,dc=br
memberUid: dtr
memberUid: uid=ap,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ap
memberUid: uid=azo,ou=People,dc=e-trust,dc=com,dc=br
memberUid: azo
memberUid: uid=mrb,ou=People,dc=e-trust,dc=com,dc=br
memberUid: mrb
memberUid: uid=rb,ou=People,dc=e-trust,dc=com,dc=br
memberUid: rb
memberUid: uid=ws,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ws
memberUid: uid=rlp,ou=People,dc=e-trust,dc=com,dc=br
memberUid: rlp
memberUid: uid=mf,ou=People,dc=e-trust,dc=com,dc=br
memberUid: mf
memberUid: uid=jps,ou=People,dc=e-trust,dc=com,dc=br
memberUid: dk
memberUid: uid=dk,ou=People,dc=e-trust,dc=com,dc=br
memberUid: hrs
memberUid: uid=hrs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=cs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: cs
memberUid: uid=sl,ou=People,dc=e-trust,dc=com,dc=br
memberUid: sl
memberUid: lcd
memberUid: rls
memberUid: wrs
memberUid: uid=wrs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=rls,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=lcd,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=og,ou=People,dc=e-trust,dc=com,dc=br
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
----------------------------------------------------------
ldapsearch -x -H 'ldaps://ldap.intranet.e-trust.com.br'
-b 'ou=Groups,dc=e-trust,dc=com,dc=br' "(cn=logonVISAO)"
# extended LDIF
#
# LDAPv3
# base <ou=Groups,dc=e-trust,dc=com,dc=br> with scope
subtree
# filter: (cn=logonVISAO)
# requesting: ALL
#
# logonVISAO, Groups, e-trust.com.br
dn: cn=logonVISAO,ou=Groups,dc=e-trust,dc=com,dc=br
objectClass: posixGroup
objectClass: sambaGroupMapping
cn: logonVISAO
gidNumber: 61054
memberUid: uid=ds,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ds
memberUid: uid=vbs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: vbs
memberUid: uid=cp,ou=People,dc=e-trust,dc=com,dc=br
memberUid: cp
memberUid: uid=mc,ou=People,dc=e-trust,dc=com,dc=br
memberUid: mc
memberUid: uid=em,ou=People,dc=e-trust,dc=com,dc=br
memberUid: em
memberUid: uid=dtr,ou=People,dc=e-trust,dc=com,dc=br
memberUid: dtr
memberUid: uid=ap,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ap
memberUid: uid=mm,ou=People,dc=e-trust,dc=com,dc=br
memberUid: mm
memberUid: uid=er,ou=People,dc=e-trust,dc=com,dc=br
memberUid: er
memberUid: uid=rw,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=azo,ou=People,dc=e-trust,dc=com,dc=br
memberUid: azo
memberUid: uid=mrb,ou=People,dc=e-trust,dc=com,dc=br
memberUid: mrb
memberUid: uid=cr,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=rb,ou=People,dc=e-trust,dc=com,dc=br
memberUid: rb
memberUid: uid=ieo,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=dso,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=dk,ou=People,dc=e-trust,dc=com,dc=br
memberUid: dk
memberUid: uid=pes,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=ws,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ws
memberUid: uid=rlp,ou=People,dc=e-trust,dc=com,dc=br
memberUid: rlp
memberUid: uid=esa,ou=People,dc=e-trust,dc=com,dc=br
memberUid: esa
memberUid: uid=vc,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=jlm,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=mf,ou=People,dc=e-trust,dc=com,dc=br
memberUid: mf
memberUid: uid=lr,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=it,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=jr,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=dar,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=ccb,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=mcv,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=jps,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=wm,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=lg,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=cs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: cs
memberUid: hrs
memberUid: uid=hrs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=cfs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=vls,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=ess,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=mt,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=agm,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ssl
memberUid: uid=ssl,ou=People,dc=e-trust,dc=com,dc=br
memberUid: lda
memberUid: uid=lda,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=rbv,ou=People,dc=e-trust,dc=com,dc=br
memberUid: sl
memberUid: uid=sl,ou=People,dc=e-trust,dc=com,dc=br
memberUid: lcd
memberUid: rls
memberUid: wrs
memberUid: uid=wrs,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=rls,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=lcd,ou=People,dc=e-trust,dc=com,dc=br
memberUid: ja
memberUid: uid=ja,ou=People,dc=e-trust,dc=com,dc=br
memberUid: uid=dap,ou=People,dc=e-trust,dc=com,dc=br
memberUid: yg
memberUid: uid=yg,ou=People,dc=e-trust,dc=com,dc=br
memberUid: dap
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
----------------------------------------------------------
nslcd -d:
nslcd: DEBUG: ldap_set_option(LDAP_OPT_X_TLS_REQUIRE_CERT,3)
nslcd: DEBUG:
ldap_set_option(LDAP_OPT_X_TLS_CACERTDIR,"/etc/openldap/cacerts")
nslcd: DEBUG: add_uri(ldaps://ldap.intranet.e-trust.com.br/)
nslcd: /etc/nslcd.conf:77: user 'ldap' does not exist
nslcd: /etc/nslcd.conf:77: user 'named' does not exist
nslcd: /etc/nslcd.conf:77: user 'haldaemon' does not exist
nslcd: /etc/nslcd.conf:77: user 'radvd' does not exist
nslcd: /etc/nslcd.conf:77: user 'tomcat' does not exist
nslcd: /etc/nslcd.conf:77: user 'radiusd' does not exist
nslcd: /etc/nslcd.conf:77: user 'news' does not exist
nslcd: /etc/nslcd.conf:77: user 'mailman' does not exist
nslcd: /etc/nslcd.conf:77: user 'gdmi' does not exist
nslcd: version 0.8.13 starting
nslcd: DEBUG: unlink() of /var/run/nslcd/socket failed
(ignored): No such file or directory
nslcd: DEBUG: initgroups("nslcd",55) done
nslcd: DEBUG: setgid(55) done
nslcd: DEBUG: setuid(65) done
nslcd: accepting connections
nslcd: [8b4567] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [8b4567] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [8b4567] <passwd="og"> DEBUG: ldap_initialize(ldaps://ldap.intranet.e-trust.com.br/)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_rebind_proc()
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,60)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,60)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,60)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_X_TLS,LDAP_OPT_X_TLS_HARD)
nslcd: [8b4567] <passwd="og"> DEBUG:
ldap_simple_bind_s(NULL,NULL) (uri="ldaps://ldap.intranet.e-trust.com.br/")
nslcd: [8b4567] <passwd="og"> DEBUG:
set_socket_timeout(60,500000)
nslcd: [8b4567] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [8b4567] <passwd="og"> (re)loading
/etc/nsswitch.conf
nslcd: [8b4567] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [7b23c6] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [7b23c6] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [7b23c6] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [7b23c6] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [3c9869] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [3c9869] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [3c9869] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [3c9869] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [334873] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [334873] <shadow="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=shadowAccount)(uid=og))")
nslcd: [334873] <shadow="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [334873] <shadow="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [b0dc51] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [b0dc51] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [b0dc51] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [b0dc51] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [495cff] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [495cff] <authc="og"> DEBUG:
nslcd_pam_authc("og","sshd","***")
nslcd: [495cff] <authc="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [495cff] <authc="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [495cff] <authc="og"> DEBUG:
myldap_search(base="uid=og,ou=People,dc=e-trust,dc=com,dc=br",
filter="(objectClass=*)")
nslcd: [495cff] <authc="og"> DEBUG: ldap_initialize(ldaps://ldap.intranet.e-trust.com.br/)
nslcd: [495cff] <authc="og"> DEBUG: ldap_set_rebind_proc()
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,60)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,60)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,60)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_set_option(LDAP_OPT_X_TLS,LDAP_OPT_X_TLS_HARD)
nslcd: [495cff] <authc="og"> DEBUG:
ldap_simple_bind_s("uid=og,ou=People,dc=e-trust,dc=com,dc=br","***")
(uri="ldaps://ldap.intranet.e-trust.com.br/")
nslcd: [495cff] <authc="og"> DEBUG:
set_socket_timeout(60,500000)
nslcd: [495cff] <authc="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [495cff] <authc="og"> DEBUG:
set_socket_timeout(30,0)
nslcd: [495cff] <authc="og"> DEBUG: ldap_unbind()
nslcd: [495cff] <authc="og"> DEBUG: bind successful
nslcd: [495cff] <authc="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=shadowAccount)(uid=og))")
nslcd: [495cff] <authc="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [e8944a] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [e8944a] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [e8944a] <passwd="og"> DEBUG: ldap_initialize(ldaps://ldap.intranet.e-trust.com.br/)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_rebind_proc()
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,60)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,60)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,60)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_set_option(LDAP_OPT_X_TLS,LDAP_OPT_X_TLS_HARD)
nslcd: [e8944a] <passwd="og"> DEBUG:
ldap_simple_bind_s(NULL,NULL) (uri="ldaps://ldap.intranet.e-trust.com.br/")
nslcd: [e8944a] <passwd="og"> DEBUG:
set_socket_timeout(60,500000)
nslcd: [e8944a] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [e8944a] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [5558ec] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [5558ec] <shadow="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=shadowAccount)(uid=og))")
nslcd: [5558ec] <shadow="og"> DEBUG: ldap_initialize(ldaps://ldap.intranet.e-trust.com.br/)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_rebind_proc()
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,60)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,60)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,60)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_set_option(LDAP_OPT_X_TLS,LDAP_OPT_X_TLS_HARD)
nslcd: [5558ec] <shadow="og"> DEBUG:
ldap_simple_bind_s(NULL,NULL) (uri="ldaps://ldap.intranet.e-trust.com.br/")
nslcd: [5558ec] <shadow="og"> DEBUG:
set_socket_timeout(60,500000)
nslcd: [5558ec] <shadow="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [5558ec] <shadow="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [8e1f29] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [8e1f29] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [8e1f29] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [8e1f29] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [e87ccd] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [e87ccd] <authz="og"> DEBUG:
nslcd_pam_authz("og","sshd","","austin.intranet.e-trust.com.br","ssh")
nslcd: [e87ccd] <authz="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [e87ccd] <authz="og"> DEBUG: ldap_initialize(ldaps://ldap.intranet.e-trust.com.br/)
nslcd: [e87ccd] <authz="og"> DEBUG: ldap_set_rebind_proc()
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,60)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,60)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,60)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_set_option(LDAP_OPT_X_TLS,LDAP_OPT_X_TLS_HARD)
nslcd: [e87ccd] <authz="og"> DEBUG:
ldap_simple_bind_s(NULL,NULL) (uri="ldaps://ldap.intranet.e-trust.com.br/")
nslcd: [e87ccd] <authz="og"> DEBUG:
set_socket_timeout(60,500000)
nslcd: [e87ccd] <authz="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [e87ccd] <authz="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=shadowAccount)(uid=og))")
nslcd: [e87ccd] <authz="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [1b58ba] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [1b58ba] <group/member="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [1b58ba] <group/member="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [1b58ba] <group/member="og"> DEBUG:
myldap_search(base="ou=Groups,dc=e-trust,dc=com,dc=br",
filter="(&(&(objectClass=posixGroup)(cn=logonVISAO))(|(memberUid=og)(memberUID=uid=og,ou=People,dc=e-trust,dc=com,dc=br)))")
nslcd: [1b58ba] <group/member="og"> DEBUG: ldap_result():
end of results (0 total)
nslcd: [7ed7ab] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [7ed7ab] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [7ed7ab] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [7ed7ab] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [b141f2] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [b141f2] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [b141f2] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [b141f2] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [b71efb] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [b71efb] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [b71efb] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [b71efb] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [e2a9e3] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [e2a9e3] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [e2a9e3] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [e2a9e3] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [45e146] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [45e146] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [45e146] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [45e146] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [5f007c] DEBUG: connection from pid=426 uid=0 gid=0
nslcd: [5f007c] <passwd=61676> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uidNumber=61676))")
nslcd: [5f007c] <passwd=61676> DEBUG: ldap_initialize(ldaps://ldap.intranet.e-trust.com.br/)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_rebind_proc()
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,60)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,60)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,60)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_set_option(LDAP_OPT_X_TLS,LDAP_OPT_X_TLS_HARD)
nslcd: [5f007c] <passwd=61676> DEBUG:
ldap_simple_bind_s(NULL,NULL) (uri="ldaps://ldap.intranet.e-trust.com.br/")
nslcd: [5f007c] <passwd=61676> DEBUG:
set_socket_timeout(60,500000)
nslcd: [5f007c] <passwd=61676> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [5f007c] <passwd=61676> DEBUG: ldap_result(): end
of results (1 total)
nslcd: [d062c2] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [d062c2] <sess_o="og"> DEBUG:
nslcd_pam_sess_o("og","sshd","ssh","austin.intranet.e-trust.com.br","")
nslcd: [200854] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [200854] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [200854] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [200854] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [b127f8] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [b127f8] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [b127f8] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [b127f8] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [16231b] DEBUG: connection from pid=4701 uid=0 gid=513
nslcd: [16231b] <group/member="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [16231b] <group/member="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [16231b] <group/member="og"> DEBUG:
myldap_search(base="ou=Groups,dc=e-trust,dc=com,dc=br",
filter="(&(&(objectClass=posixGroup)(cn=logonVISAO))(|(memberUid=og)(memberUID=uid=og,ou=People,dc=e-trust,dc=com,dc=br)))")
nslcd: [16231b] <group/member="og"> DEBUG: ldap_result():
end of results (0 total)
nslcd: [16e9e8] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [16e9e8] <passwd=61676> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uidNumber=61676))")
nslcd: [16e9e8] <passwd=61676> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [16e9e8] <passwd=61676> DEBUG: ldap_result(): end
of results (1 total)
nslcd: [90cde7] DEBUG: connection from pid=4699 uid=0 gid=0
nslcd: [90cde7] <passwd="og"> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uid=og))")
nslcd: [90cde7] <passwd="og"> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [90cde7] <passwd="og"> DEBUG: ldap_result(): end of
results (1 total)
nslcd: [ef438d] DEBUG: connection from pid=4702 uid=61676
gid=513
nslcd: [ef438d] <passwd=61676> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uidNumber=61676))")
nslcd: [ef438d] <passwd=61676> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [ef438d] <passwd=61676> DEBUG: ldap_result(): end
of results (1 total)
nslcd: [0e0f76] DEBUG: connection from pid=4704 uid=61676
gid=513
nslcd: [0e0f76] <passwd=61676> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uidNumber=61676))")
nslcd: [0e0f76] <passwd=61676> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [0e0f76] <passwd=61676> DEBUG: ldap_result(): end
of results (1 total)
nslcd: [52255a] DEBUG: connection from pid=4708 uid=61676
gid=513
nslcd: [52255a] <group=513> DEBUG:
myldap_search(base="ou=Groups,dc=e-trust,dc=com,dc=br",
filter="(&(&(objectClass=posixGroup)(cn=logonVISAO))(gidNumber=513))")
nslcd: [52255a] <group=513> DEBUG: ldap_result(): end of
results (0 total)
nslcd: [9cf92e] DEBUG: connection from pid=4710 uid=61676
gid=513
nslcd: [9cf92e] <passwd=61676> DEBUG:
myldap_search(base="ou=People,dc=e-trust,dc=com,dc=br",
filter="(&(objectClass=posixAccount)(uidNumber=61676))")
nslcd: [9cf92e] <passwd=61676> DEBUG: ldap_result():
uid=og,ou=People,dc=e-trust,dc=com,dc=br
nslcd: [9cf92e] <passwd=61676> DEBUG: ldap_result(): end
of results (1 total)
----------------------------------------------------------
/var/log/secure:
Dec 14 08:40:10 lab2-ldapauth sshd[4699]: pam_unix(sshd:auth):
authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
rhost=austin.intranet.e-trust.com.br user=og
Dec 14 08:40:10 lab2-ldapauth sshd[4699]: pam_ldap(sshd:auth):
nslcd authentication; user=og
Dec 14 08:40:10 lab2-ldapauth sshd[4699]: pam_ldap(sshd:auth):
authentication succeeded
Dec 14 08:40:10 lab2-ldapauth sshd[4699]: Accepted password for
og from 192.168.2.183 port 50134 ssh2
----------------------------------------------------------
/var/log/pam_debug.log:
Dec 14 08:40:10 lab2-ldapauth sshd[4699]: pam_ldap(sshd:auth):
nslcd authentication; user=og
Dec 14 08:40:10 lab2-ldapauth sshd[4699]: pam_ldap(sshd:auth):
authentication succeeded
Dec 14 08:40:10 lab2-ldapauth sshd[4699]: Accepted password for
og from 192.168.2.183 port 50134 ssh2
Dec 14 08:40:10 lab2-ldapauth systemd: Created slice
user-61676.slice.
Dec 14 08:40:10 lab2-ldapauth systemd: Starting Session 77 of
user og.
Dec 14 08:40:10 lab2-ldapauth systemd-logind: New session 77 of
user og.
Dec 14 08:40:10 lab2-ldapauth systemd: Started Session 77 of
user og.
Dec 14 08:40:10 lab2-ldapauth sshd[4699]:
pam_unix(sshd:session): session opened for user og by (uid=0)
Dec 14 08:40:10 lab2-ldapauth sshd[4699]:
pam_unix(sshd:session): session opened for user og by (uid=0)
--
|
Otávio
Campos Velho
www.e-trust.com.br
Porto Alegre: +55 (51) 2117-1000
São Paulo: +55 (11) 5521-2021
|
|
Esta mensagem
pode conter informações confidenciais ou privilegiadas. Se
você recebeu esta mensagem por engano, você não deve usar,
copiar, divulgar ou tomar qualquer atitude com base nestas
informações. Solicitamos que você apague a mensagem
imediatamente e avise a E-TRUST, enviando um e-mail para suporte [at] e-trust.com.br.
Opiniões, conclusões ou informações contidas nesta
mensagem não necessariamente refletem a posição oficial da
E-TRUST. Caso assinada digitalmente, a autenticidade desta
mensagem pode ser confirmada pela Autoridade Certificadora
Privada E-TRUST, disponível em www.e-trust.com.br.
This message
may contain privileged and confidential information for
the use of the intended recipients only. If you are not an
intended recipient then you should not disseminate, copy,
or take any action based on its contents. If you have
received this message in error then please notify E-TRUST
by sending an e-mail message to suporte [at] e-trust.com.br
immediately. Views and opinions expressed in this message
do not necessarily reflect the position of E-TRUST. If
this message is digitally signed, its authenticity can be
confirmed by E-TRUST Private Certificate Authority,
available at www.e-trust.com.br.
--
ICT Medewerker
Divisie Biomedische Genetica
UMC Utrecht
Heidelberglaan 100 STR2.126
3584 CX Utrecht
The Netherlands
06 27744048
intern: 64048
De informatie opgenomen in dit bericht kan vertrouwelijk
zijn en is
uitsluitend bestemd voor de geadresseerde. Indien u dit
bericht onterecht
ontvangt, wordt u verzocht de inhoud niet te gebruiken en de
afzender direct
te informeren door het bericht te retourneren. Het
Universitair Medisch
Centrum Utrecht is een publiekrechtelijke rechtspersoon in
de zin van de W.H.W.
(Wet Hoger Onderwijs en Wetenschappelijk Onderzoek) en staat
geregistreerd bij
de Kamer van Koophandel voor Midden-Nederland onder nr.
30244197.
Denk s.v.p aan het milieu voor u deze e-mail afdrukt.
This message may contain confidential information and is
intended
exclusively for the addressee. If you receive this message
unintentionally, please do not use the contents but notify
the sender
immediately by return e-mail. University Medical Center
Utrecht is a legal
person by public law and is registered at the Chamber of
Commerce for
Midden-Nederland under no. 30244197.
Please consider the environment before printing this e-mail.
--
|
Otávio Campos Velho
www.e-trust.com.br
Porto Alegre: +55 (51) 2117-1000
São Paulo: +55 (11) 5521-2021
|
|
Esta mensagem pode
conter informações confidenciais ou privilegiadas. Se você
recebeu esta mensagem por engano, você não deve usar, copiar,
divulgar ou tomar qualquer atitude com base nestas
informações. Solicitamos que você apague a mensagem
imediatamente e avise a E-TRUST, enviando um e-mail para
suporte [at] e-trust.com.br. Opiniões, conclusões ou informações
contidas nesta mensagem não necessariamente refletem a posição
oficial da E-TRUST. Caso assinada digitalmente, a
autenticidade desta mensagem pode ser confirmada pela
Autoridade Certificadora Privada E-TRUST, disponível em
www.e-trust.com.br.
This message may
contain privileged and confidential information for the use of
the intended recipients only. If you are not an intended
recipient then you should not disseminate, copy, or take any
action based on its contents. If you have received this
message in error then please notify E-TRUST by sending an
e-mail message to suporte [at] e-trust.com.br immediately. Views
and opinions expressed in this message do not necessarily
reflect the position of E-TRUST. If this message is digitally
signed, its authenticity can be confirmed by E-TRUST Private
Certificate Authority, available
at www.e-trust.com.br.
|