Failed to login using a serial connection.
[
Date Prev][
Date Next]
[
Thread Prev][
Thread Next]
Failed to login using a serial connection.
- From: "eRIC" <fremeneric [at] gmail.com>
- To: <nss-pam-ldapd-users [at] lists.arthurdejong.org>
- Subject: Failed to login using a serial connection.
- Date: Wed, 11 Nov 2015 10:27:10 -0500
Hi guys,
Still have an issue with login.
I can login using a telnet session but I can not using a serial connection.
When I look at the trace from the debug everything seem ok but the serial
part just don't do the next step.
If I look at Wireshark trace, it is the same.
Here is my config files:
# /etc/nsswitch.conf
#
# Example configuration of GNU Name Service Switch functionality.
# If you have the `glibc-doc' and `info' packages installed, try:
# `info libc "Name Service Switch"' for information about this file.
passwd: files ldap
group: files ldap
shadow: files ldap
hosts: files dns
networks: files
protocols: db files
services: db files
ethers: db files
netgroup: nis
# This is the configuration file for the LDAP nameservice
# switch library's nslcd daemon. It configures the mapping
# between NSS names (see /etc/nsswitch.conf) and LDAP
# information in the directory.
# See the manual page nslcd.conf(5) for more information.
# The user and group nslcd should run as.
uid root
gid root
# The uri pointing to the LDAP server to use for name lookups.
# Multiple entries may be specified. The address that is used
# here should be resolvable without using LDAP (obviously).
uri ldap://192.168.119.134/
# The LDAP version to use (defaults to 3
# if supported by client library)
ldap_version 3
# The distinguished name of the search base.
base ou=users,ou=ion,dc=ionharris,dc=com
# The distinguished name to bind to the server with.
# Optional: default is to bind anonymously.
binddn CN=AD LDAP Service Account,CN=Managed Service
Accounts,DC=ionharris,DC=com
# The credentials to bind with.
# Optional: default is no credentials.
# Note that if you set a bindpw you should check the permissions of this
file.
bindpw Nvslab!123456
# The distinguished name to perform password modifications by root by.
#rootpwmoddn cn=admin,dc=example,dc=com
# The default search scope.
scope sub
#scope one
#scope base
# Customize certain database lookups.
#base group ou=Groups,dc=example,dc=com
#base passwd ou=People,dc=example,dc=com
#base shadow ou=People,dc=example,dc=com
#scope group onelevel
#scope hosts sub
# Bind/connect timelimit.
bind_timelimit 5
# Search timelimit.
timelimit 5
# Idle timelimit. nslcd will close connections if the
# server has not been contacted for the number of seconds.
#idle_timelimit 3600
# Use StartTLS without verifying the server certificate.
#ssl on
#ssl start_tls
#tls_reqcert never
# CA certificates for server certificate verification
#tls_cacertdir /etc/ssl/certs
#tls_cacertfile /etc/ssl/ca.cert
# Seed the PRNG if /dev/urandom is not provided
#tls_randfile /var/run/egd-pool
# SSL cipher suite
# See man ciphers for syntax
#tls_ciphers TLSv1
# Client certificate and key
# Use these, if your server requires client authentication.
#tls_cert
#tls_key
pagesize 1000
referrals off
idle_timelimit 3600
filter passwd (objectClass=user)
map passwd uid cn
map passwd gidNumber primaryGroupID
map passwd gecos name
map passwd homeDirectory "home"
map passwd loginShell "/bin/bash"
/etc/pam.d cat login
#%PAM-1.0
auth required /lib/security/pam_nologin.so
auth sufficient /lib/security/pam_unix.so
auth sufficient /lib/security/pam_ldap.so use_first_pass
auth required /lib/security/pam_deny.so
account required /lib/security/pam_unix.so
account required /lib/security/pam_ldap.so ignore_authinfo_unavail
ignore_unknown_user
password required /lib/security/pam_unix.so shadow sha512
session required /lib/security/pam_unix.so
/etc/pam.d cat sshd
#%PAM-1.0
auth required /lib/security/pam_nologin.so
auth sufficient /lib/security/pam_unix.so
auth sufficient /lib/security/pam_ldap.so use_first_pass
auth required /lib/security/pam_deny.so
account required /lib/security/pam_unix.so
account required /lib/security/pam_ldap.so ignore_authinfo_unavail
ignore_unknown_user
password required /lib/security/pam_unix.so shadow sha512
session required /lib/security/pam_unix.so
Here is my trace, from what I can see is the telnet uses "sshd" file for the
authentication and the "login" for the serial.
Serial login:
nslcd: [b0dc51] DEBUG: connection from pid=742 uid=0 gid=0
nslcd: [b0dc51] <passwd="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [b0dc51] <passwd="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [b0dc51] <passwd="sleduc"> DEBUG: ldap_result(): end of results (1
total)
nslcd: [495cff] DEBUG: connection from pid=742 uid=0 gid=0
nslcd: [495cff] <authc="sleduc"> DEBUG:
nslcd_pam_authc("sleduc","login","***")
nslcd: [495cff] <authc="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [495cff] <authc="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [495cff] <authc="sleduc"> DEBUG:
myldap_search(base="CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com",
filter="(objectClass=*)")
nslcd: [495cff] <authc="sleduc"> DEBUG:
ldap_initialize(ldap://192.168.119.134/)
nslcd: [495cff] <authc="sleduc"> DEBUG: ldap_set_rebind_proc()
nslcd: [495cff] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [495cff] <authc="sleduc"> DEBUG: ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [495cff] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,5)
nslcd: [495cff] <authc="sleduc"> DEBUG: ldap_set_option(LDAP_OPT_TIMEOUT,5)
nslcd: [495cff] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,5)
nslcd: [495cff] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_OFF)
nslcd: [495cff] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [495cff] <authc="sleduc"> DEBUG:
ldap_sasl_bind("CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com","***")
(uri="ldap://192.168.119.134/")
nslcd: [495cff] <authc="sleduc"> DEBUG: set_socket_timeout(5,500000)
nslcd: [495cff] <authc="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [495cff] <authc="sleduc"> DEBUG: set_socket_timeout(2,0)
nslcd: [495cff] <authc="sleduc"> DEBUG: ldap_unbind()
nslcd: [495cff] <authc="sleduc"> DEBUG: bind successful
nslcd: [495cff] <authc="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=shadowAccount)(uid=sleduc))")
nslcd: [495cff] <authc="sleduc"> DEBUG: ldap_result(): end of results (0
total)
nslcd: [e8944a] DEBUG: connection from pid=742 uid=0 gid=0
nslcd: [e8944a] <passwd="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [e8944a] <passwd="sleduc"> DEBUG:
ldap_initialize(ldap://192.168.119.134/)
nslcd: [e8944a] <passwd="sleduc"> DEBUG: ldap_set_rebind_proc()
nslcd: [e8944a] <passwd="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [e8944a] <passwd="sleduc"> DEBUG: ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [e8944a] <passwd="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,5)
nslcd: [e8944a] <passwd="sleduc"> DEBUG: ldap_set_option(LDAP_OPT_TIMEOUT,5)
nslcd: [e8944a] <passwd="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,5)
nslcd: [e8944a] <passwd="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_OFF)
nslcd: [e8944a] <passwd="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [e8944a] <passwd="sleduc"> DEBUG: ldap_simple_bind_s("CN=AD LDAP
Service Account,CN=Managed Service Accounts,DC=ionharris,DC=com","***")
(uri="ldap://192.168.119.134/")
nslcd: [e8944a] <passwd="sleduc"> DEBUG: set_socket_timeout(5,500000)
nslcd: [e8944a] <passwd="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [e8944a] <passwd="sleduc"> DEBUG: ldap_result(): end of results (1
total)
nslcd: [5558ec] DEBUG: connection from pid=742 uid=0 gid=0
nslcd: [5558ec] <authz="sleduc"> DEBUG:
nslcd_pam_authz("sleduc","login","","","ttyO1")
nslcd: [5558ec] <authz="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [5558ec] <authz="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [5558ec] <authz="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=shadowAccount)(uid=sleduc))")
nslcd: [5558ec] <authz="sleduc"> DEBUG: ldap_result(): end of results (0
total)
Telnet login:
nslcd: [8e1f29] DEBUG: connection from pid=847 uid=0 gid=0
nslcd: [8e1f29] <passwd="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [8e1f29] <passwd="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [8e1f29] <passwd="sleduc"> DEBUG: ldap_result(): end of results (1
total)
nslcd: [e87ccd] DEBUG: connection from pid=853 uid=0 gid=0
nslcd: [e87ccd] <passwd="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [e87ccd] <passwd="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [e87ccd] <passwd="sleduc"> DEBUG: ldap_result(): end of results (1
total)
nslcd: [1b58ba] DEBUG: connection from pid=853 uid=0 gid=0
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
nslcd_pam_authc("sleduc","sshd","***")
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [1b58ba] <authc="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
myldap_search(base="CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com",
filter="(objectClass=*)")
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
ldap_initialize(ldap://192.168.119.134/)
nslcd: [1b58ba] <authc="sleduc"> DEBUG: ldap_set_rebind_proc()
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [1b58ba] <authc="sleduc"> DEBUG: ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,5)
nslcd: [1b58ba] <authc="sleduc"> DEBUG: ldap_set_option(LDAP_OPT_TIMEOUT,5)
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,5)
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_OFF)
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
ldap_sasl_bind("CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com","***")
(uri="ldap://192.168.119.134/")
nslcd: [1b58ba] <authc="sleduc"> DEBUG: set_socket_timeout(5,500000)
nslcd: [1b58ba] <authc="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [1b58ba] <authc="sleduc"> DEBUG: set_socket_timeout(2,0)
nslcd: [1b58ba] <authc="sleduc"> DEBUG: ldap_unbind()
nslcd: [1b58ba] <authc="sleduc"> DEBUG: bind successful
nslcd: [1b58ba] <authc="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=shadowAccount)(uid=sleduc))")
nslcd: [1b58ba] <authc="sleduc"> DEBUG: ldap_result(): end of results (0
total)
nslcd: [7ed7ab] DEBUG: connection from pid=853 uid=0 gid=0
nslcd: [7ed7ab] <passwd="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [7ed7ab] <passwd="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [7ed7ab] <passwd="sleduc"> DEBUG: ldap_result(): end of results (1
total)
nslcd: [b141f2] DEBUG: connection from pid=853 uid=0 gid=0
nslcd: [b141f2] <authz="sleduc"> DEBUG:
nslcd_pam_authz("sleduc","sshd","","198.105.24.253","ssh")
nslcd: [b141f2] <authz="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [b141f2] <authz="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [b141f2] <authz="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=shadowAccount)(uid=sleduc))")
nslcd: [b141f2] <authz="sleduc"> DEBUG: ldap_result(): end of results (0
total)
nslcd: [b71efb] DEBUG: connection from pid=861 uid=0 gid=513
nslcd: [b71efb] <group/member="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [b71efb] <group/member="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [b71efb] <group/member="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=posixGroup)(|(memberUid=sleduc)(member=CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com)))")
nslcd: [b71efb] <group/member="sleduc"> DEBUG: ldap_result(): end of results
(0 total)
nslcd: [e2a9e3] DEBUG: connection from pid=847 uid=0 gid=0
nslcd: [e2a9e3] <passwd=1000> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(uidNumber=1000))")
nslcd: [e2a9e3] <passwd=1000> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [e2a9e3] <passwd=1000> DEBUG: ldap_result(): end of results (1 total)
nslcd: [45e146] DEBUG: connection from pid=847 uid=0 gid=0
nslcd: [45e146] <passwd="sleduc"> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(cn=sleduc))")
nslcd: [45e146] <passwd="sleduc"> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [45e146] <passwd="sleduc"> DEBUG: ldap_result(): end of results (1
total)
nslcd: [5f007c] DEBUG: connection from pid=862 uid=1000 gid=513
nslcd: [5f007c] <passwd=1000> DEBUG:
myldap_search(base="ou=users,ou=ion,dc=ionharris,dc=com",
filter="(&(objectClass=user)(uidNumber=1000))")
nslcd: [5f007c] <passwd=1000> DEBUG: ldap_result():
CN=sleduc,OU=Users,OU=ION,DC=ionharris,DC=com
nslcd: [5f007c] <passwd=1000> DEBUG: ldap_result(): end of results (1 total)
One question I also have is about the filter, there is always that default
filter <filter="(&(objectClass=shadowAccount)(uid=sleduc))")>, is there a
way to remove it ?
Our LDAP server doesn't have those defined.
Thanks for your help, greatly appreciated.
Eric
--
To unsubscribe send an email to
nss-pam-ldapd-users-unsubscribe@lists.arthurdejong.org or see
http://lists.arthurdejong.org/nss-pam-ldapd-users/
- Failed to login using a serial connection.,
eRIC