7 More Discussions You Might Find Interesting
1. HP-UX
We have two HP-UX machines, both are B.11.31.
When I FTP from the HP-UX boxes to a remote IBM server,-
HP-UX 1:
Connected to xxxx.
220-FTPD1 IBM FTP CS V1R12 at R2, 12:24:39 on 2013-08-30.
220 Connection will close if idle for more than 15 minutes.
Name (xxxx:user):
HP-UX 2:... (2 Replies)
Discussion started by: CaptNemo
2 Replies
2. Slackware
I have a postfix/dovecot mail server.
On centos6 works great,sso with gssapi on linux and windows clients.
On Slackware i have problems,Linux clients(thunderbird and mutt) connect ok,but not windows clients.
on logfile only this
Apr 19 19:01:41 cluster1 dovecot: auth: Debug: auth client... (0 Replies)
Discussion started by: Linusolaradm1
0 Replies
3. Shell Programming and Scripting
Hello
I hope somebody can help with this.
I have a shell, that in case of failure, sends an email (relaying through an Exchange Server). This Exchange server only offers NTLM authentication.
250-AUTH NTLM
This is the configuration I have:
Postfix 2.1.1 as client.
Cyrus-SASL... (1 Reply)
Discussion started by: viktor1985
1 Replies
4. UNIX for Dummies Questions & Answers
Hello
I hope somebody can help with this.
I have a shell, that in case of failure, sends an email (relaying through an Exchange Server). This Exchange server only offers NTLM authentication.
250-AUTH NTLM
This is the configuration I have:
Postfix 2.1.1 as client.
Cyrus-SASL... (1 Reply)
Discussion started by: viktor1985
1 Replies
5. Red Hat
Hi Experts,
While trying ftp from newly setup Linux box it is giving following error.
GSSAPI error major:Unspecified GSS failure.Minor code may provide more information
GSSAPI error minor:Unknown code krb5 195
GSSAPI error:initializing context
GSSAPI authntication failed
504 AUTH... (1 Reply)
Discussion started by: sai_2507
1 Replies
6. Red Hat
On Debian i set my ldap server,using tls and all works ok.
On Redhat i have set my ldap server,using tls ok...but
when i try to use ldapsearch without -x and with rootpw(created with slappasswd) it ask for sasl password!
The question is: is possible to disable sasl?
Thanks (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
7. Solaris
Configure ldap client:
I have configured my ldapclient with the AuthenticationMethod=simple and with the credentialLevel=proxy. However, as soon as i want to set the AuthenticationMethod=sasl/GSSAPI, and credentiallevel=self, then it fails to configure. Kerberos is already setup successfully. The... (0 Replies)
Discussion started by: Henk Trumpie
0 Replies
LEARN ABOUT DEBIAN
authen::sasl::perl::gssapi
Authen::SASL::Perl::GSSAPI(3pm) User Contributed Perl Documentation Authen::SASL::Perl::GSSAPI(3pm)
NAME
Authen::SASL::Perl::GSSAPI - GSSAPI (Kerberosv5) Authentication class
SYNOPSIS
use Authen::SASL qw(Perl);
$sasl = Authen::SASL->new( mechanism => 'GSSAPI' );
$sasl = Authen::SASL->new( mechanism => 'GSSAPI',
callback => { pass => $mycred });
$sasl->client_start( $service, $host );
DESCRIPTION
This method implements the client part of the GSSAPI SASL algorithm, as described in RFC 2222 section 7.2.1 resp.
draft-ietf-sasl-gssapi-XX.txt.
With a valid Kerberos 5 credentials cache (aka TGT) it allows to connect to service@host given as the first two parameters to
Authen::SASL's client_start() method. Alternatively, a GSSAPI::Cred object can be passed in via the Authen::SASL callback hash using the
`pass' key.
Please note that this module does not currently implement a SASL security layer following authentication. Unless the connection is
protected by other means, such as TLS, it will be vulnerable to man-in-the-middle attacks. If security layers are required, then the
Authen::SASL::XS GSSAPI module should be used instead.
CALLBACK
The callbacks used are:
authname
The authorization identity to be used in SASL exchange
gssmech
The GSS mechanism to be used in the connection
pass
The GSS credentials to be used in the connection (optional)
EXAMPLE
#! /usr/bin/perl -w
use strict;
use Net::LDAP 0.33;
use Authen::SASL 2.10;
# -------- Adjust to your environment --------
my $adhost = 'theserver.bla.net';
my $ldap_base = 'dc=bla,dc=net';
my $ldap_filter = '(&(sAMAccountName=BLAAGROL))';
my $sasl = Authen::SASL->new(mechanism => 'GSSAPI');
my $ldap;
eval {
$ldap = Net::LDAP->new($adhost,
onerror => 'die')
or die "Cannot connect to LDAP host '$adhost': '$@'";
$ldap->bind(sasl => $sasl);
};
if ($@) {
chomp $@;
die "
Bind error : $@",
"
Detailed SASL error: ", $sasl->error,
"
Terminated";
}
print "
LDAP bind() succeeded, working in authenticated state";
my $mesg = $ldap->search(base => $ldap_base,
filter => $ldap_filter);
# -------- evaluate $mesg
PROPERTIES
The properties used are:
maxbuf
The maximum buffer size for receiving cipher text
minssf
The minimum SSF value that should be provided by the SASL security layer. The default is 0
maxssf
The maximum SSF value that should be provided by the SASL security layer. The default is 2**31
externalssf
The SSF value provided by an underlying external security layer. The default is 0
ssf The actual SSF value provided by the SASL security layer after the SASL authentication phase has been completed. This value is read-
only and set by the implementation after the SASL authentication phase has been completed.
maxout
The maximum plaintext buffer size for sending data to the peer. This value is set by the implementation after the SASL authentication
phase has been completed and a SASL security layer is in effect.
SEE ALSO
Authen::SASL, Authen::SASL::Perl
AUTHORS
Written by Simon Wilkinson, with patches and extensions by Achim Grolms and Peter Marschall.
Please report any bugs, or post any suggestions, to the perl-ldap mailing list <perl-ldap@perl.org>
COPYRIGHT
Copyright (c) 2006 Simon Wilkinson, Achim Grolms and Peter Marschall. All rights reserved. This program is free software; you can
redistribute it and/or modify it under the same terms as Perl itself.
perl v5.10.1 2010-03-11 Authen::SASL::Perl::GSSAPI(3pm)