Hi all, im trying to get password sync with smbk5pwd, but is not working
there is my config:
[root@ldapsrv ~]# cat /etc/openldap/slapd.conf # # See slapd.conf(5) for details on configuration options. # This file should NOT be world readable. # include /etc/openldap/schema/core.schema include /etc/openldap/schema/cosine.schema include /etc/openldap/schema/inetorgperson.schema include /etc/openldap/schema/nis.schema
include /etc/openldap/schema/lmc.schema include /etc/openldap/schema/samba.schema include /etc/openldap/schema/mail.schema
# acl's
include /etc/openldap/AclsLdap.acl
# Allow LDAPv2 client connections. This is NOT the default. allow bind_v2
# Do not enable referrals until AFTER you have a working directory # service AND an understanding of referrals. #referral ldap://root.openldap.org
pidfile /var/run/openldap/slapd.pid argsfile /var/run/openldap/slapd.args
# Load dynamic backend modules: # modulepath /usr/lib/openldap # moduleload back_bdb.la # moduleload back_ldap.la # moduleload back_ldbm.la # moduleload back_passwd.la # moduleload back_shell.la moduleload /usr/lib/openldap/smbk5pwd.la
# The next three lines allow use of TLS for encrypting connections using a # dummy test certificate which you can generate by changing to # /etc/pki/tls/certs, running "make slapd.pem", and fixing permissions on # slapd.pem so that the ldap user or group can read it. Your client software # may balk at self-signed certificates, however. # TLSCACertificateFile /etc/pki/tls/certs/ca-bundle.crt # TLSCertificateFile /etc/pki/tls/certs/slapd.pem # TLSCertificateKeyFile /etc/pki/tls/certs/slapd.pem
# Sample security restrictions # Require integrity protection (prevent hijacking) # Require 112-bit (3DES or better) encryption for updates # Require 63-bit encryption for simple bind # security ssf=1 update_ssf=112 simple_bind=64
# Sample access control policy: # Root DSE: allow anyone to read it # Subschema (sub)entry DSE: allow anyone to read it # Other DSEs: # Allow self write access # Allow authenticated users read access # Allow anonymous users to authenticate # Directives needed to implement policy: # access to dn.base="" by * read # access to dn.base="cn=Subschema" by * read # access to * # by self write # by users read # by anonymous auth # # if no access controls are present, the default policy # allows anyone and everyone to read anything but restricts # updates to rootdn. (e.g., "access to * by * read") # # rootdn can always read and write EVERYTHING!
####################################################################### # ldbm and/or bdb database definitions #######################################################################
database bdb suffix "dc=venap,dc=com" rootdn "cn=admin,dc=XXXX,dc=com" # Cleartext passwords, especially for the rootdn, should # be avoided. See slappasswd(8) and slapd.conf(5) for details. # Use of strong authentication encouraged. # rootpw secret # rootpw {crypt}ijFYNcSNctBYg rootpw {SSHA}+u59b3iW+lYALN9x6IKmm7OnqU6y709G # The database directory MUST exist prior to running slapd AND # should only be accessible by the slapd and slap tools. # Mode 700 recommended. directory /var/lib/ldap
overlay smbk5pwd smbk5pwd-enable samba
# Indices to maintain for this database index objectClass eq,pres index ou,cn,mail,surname,givenname eq,pres,sub index uidNumber,gidNumber,loginShell eq,pres index uid,memberUid eq,pres,sub index nisMapName,nisMapEntry eq,pres,sub
# Replicas of this database #replogfile /var/lib/ldap/openldap-master-replog #replica host=ldap-1.example.com:389 starttls=critical # bindmethod=sasl saslmech=GSSAPI # authcId=host/ldap-master.example.com@EXAMPLE.COM
loglevel 4
[root@ldapsrv ~]# passwd emma Changing password for user emma. Enter login(LDAP) password: New UNIX password: BAD PASSWORD: it is based on a dictionary word Retype new UNIX password: LDAP password information changed for emma passwd: all authentication tokens updated successfully.
[root@ldapsrv ~]# cat /var/log/openldap
Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(12) Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(12) Jul 15 17:24:46 ldapsrv slapd[14318]: SRCH "dc=venap,dc=com" 2 0 Jul 15 17:24:46 ldapsrv slapd[14318]: 1 120 0 Jul 15 17:24:46 ldapsrv slapd[14318]: filter: (&(objectClass=posixAccount)(uid=emma)) Jul 15 17:24:46 ldapsrv slapd[14318]: attrs: Jul 15 17:24:46 ldapsrv slapd[14318]: uid Jul 15 17:24:46 ldapsrv slapd[14318]: userPassword Jul 15 17:24:46 ldapsrv slapd[14318]: uidNumber Jul 15 17:24:46 ldapsrv slapd[14318]: gidNumber Jul 15 17:24:46 ldapsrv slapd[14318]: cn Jul 15 17:24:46 ldapsrv slapd[14318]: homeDirectory Jul 15 17:24:46 ldapsrv slapd[14318]: loginShell Jul 15 17:24:46 ldapsrv slapd[14318]: gecos Jul 15 17:24:46 ldapsrv slapd[14318]: description Jul 15 17:24:46 ldapsrv slapd[14318]: objectClass Jul 15 17:24:46 ldapsrv slapd[14318]: Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [b49d1940] Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [5941c014] Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [d1726a87] Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(12) Jul 15 17:24:46 ldapsrv slapd[14318]: SRCH "dc=venap,dc=com" 2 0 Jul 15 17:24:46 ldapsrv slapd[14318]: 1 120 0 Jul 15 17:24:46 ldapsrv slapd[14318]: filter: (&(objectClass=posixAccount)(uid=emma)) Jul 15 17:24:46 ldapsrv slapd[14318]: attrs: Jul 15 17:24:46 ldapsrv slapd[14318]: uid Jul 15 17:24:46 ldapsrv slapd[14318]: userPassword Jul 15 17:24:46 ldapsrv slapd[14318]: uidNumber Jul 15 17:24:46 ldapsrv slapd[14318]: gidNumber Jul 15 17:24:46 ldapsrv slapd[14318]: cn Jul 15 17:24:46 ldapsrv slapd[14318]: homeDirectory Jul 15 17:24:46 ldapsrv slapd[14318]: loginShell Jul 15 17:24:46 ldapsrv slapd[14318]: gecos Jul 15 17:24:46 ldapsrv slapd[14318]: description Jul 15 17:24:46 ldapsrv slapd[14318]: objectClass Jul 15 17:24:46 ldapsrv slapd[14318]: Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [b49d1940] Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [5941c014] Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [d1726a87] Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:46 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:46 ldapsrv slapd[14318]: SRCH "dc=venap,dc=com" 2 0 Jul 15 17:24:46 ldapsrv slapd[14318]: 1 120 0 Jul 15 17:24:46 ldapsrv slapd[14318]: filter: (uid=emma) Jul 15 17:24:46 ldapsrv slapd[14318]: attrs: Jul 15 17:24:46 ldapsrv slapd[14318]: Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [b49d1940] Jul 15 17:24:46 ldapsrv slapd[14318]: bdb_idl_fetch_key: [d1726a87] Jul 15 17:24:46 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:49 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:49 ldapsrv slapd[14318]: ==> bdb_bind: dn: uid=emma,ou=Users,dc=venap,dc=com Jul 15 17:24:49 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:49 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:49 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:56 ldapsrv slapd[14318]: ==> bdb_bind: dn: uid=emma,ou=Users,dc=venap,dc=com Jul 15 17:24:56 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:56 ldapsrv slapd[14318]: do_modify: dn (uid=emma,ou=Users,dc=venap,dc=com) Jul 15 17:24:56 ldapsrv slapd[14318]: modifications: Jul 15 17:24:56 ldapsrv slapd[14318]: replace: userPassword Jul 15 17:24:56 ldapsrv slapd[14318]: one value, length 41 Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify: uid=emma,ou=Users,dc=venap,dc=com Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace userPassword Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace entryCSN Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifiersName Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifyTimestamp Jul 15 17:24:56 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:56 ldapsrv slapd[14318]: do_modify: dn (uid=emma,ou=Users,dc=venap,dc=com) Jul 15 17:24:56 ldapsrv slapd[14318]: modifications: Jul 15 17:24:56 ldapsrv slapd[14318]: replace: shadowLastChange Jul 15 17:24:56 ldapsrv slapd[14318]: one value, length 5 Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify: uid=emma,ou=Users,dc=venap,dc=com Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace shadowLastChange Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace entryCSN Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifiersName Jul 15 17:24:56 ldapsrv slapd[14318]: bdb_modify_internal: replace modifyTimestamp Jul 15 17:24:56 ldapsrv slapd[14318]: send_ldap_result: err=0 matched="" text="" Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(15) Jul 15 17:24:56 ldapsrv slapd[14318]: connection_get(12)
[root@ldapsrv ~]# smbclient //192.168.0.234/partage -U emma Password: session setup failed: NT_STATUS_LOGON_FAILURE
with the new password
What could be missing or this overlay smbk5pwd dont have to do that work??
Im running in CentOS 5
[root@ldapsrv ~]# rpm -qa | grep ldap python-ldap-2.2.0-2.1 smbldap-tools-0.9.2-1 openldap-debuginfo-2.3.34-6 php-ldap-5.1.6-12.el5 openldap-2.3.34-6 openldap-clients-2.3.34-6 openldap-devel-2.3.34-6 nss_ldap-253-3 openldap-servers-2.3.34-6
Thanks for your help, around this problem.
New Zen.