Ldap sasl gssapi


 
Thread Tools Search this Thread
Operating Systems HP-UX Ldap sasl gssapi
# 1  
Old 01-30-2014
Ldap sasl gssapi

I have installed all packages required(openldap,kerberos,cyrus-sasl)
configured ldap.conf
but when i did ldapsearch -Y gssapi return
Code:
ldapsearch -Y gssapi -H ldap://ldapserver-d -1  cn=prova

it did
Code:
ldap_msgfree
ldap_err2string
ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
        additional info: SASL(-4): no mechanism available: No worthy mechs found

What i miss?
Thanks

Last edited by Franklin52; 01-30-2014 at 10:35 AM.. Reason: Please use code tags
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. HP-UX

Disable GSSAPI when using an FTP client?

We have two HP-UX machines, both are B.11.31. When I FTP from the HP-UX boxes to a remote IBM server,- HP-UX 1: Connected to xxxx. 220-FTPD1 IBM FTP CS V1R12 at R2, 12:24:39 on 2013-08-30. 220 Connection will close if idle for more than 15 minutes. Name (xxxx:user): HP-UX 2:... (2 Replies)
Discussion started by: CaptNemo
2 Replies

2. Slackware

Dovecot on Slackware14: gssapi auth

I have a postfix/dovecot mail server. On centos6 works great,sso with gssapi on linux and windows clients. On Slackware i have problems,Linux clients(thunderbird and mutt) connect ok,but not windows clients. on logfile only this Apr 19 19:01:41 cluster1 dovecot: auth: Debug: auth client... (0 Replies)
Discussion started by: Linusolaradm1
0 Replies

3. Shell Programming and Scripting

Configure Cyrus SASL NTLM Plugin with Postfix

Hello I hope somebody can help with this. I have a shell, that in case of failure, sends an email (relaying through an Exchange Server). This Exchange server only offers NTLM authentication. 250-AUTH NTLM This is the configuration I have: Postfix 2.1.1 as client. Cyrus-SASL... (1 Reply)
Discussion started by: viktor1985
1 Replies

4. UNIX for Dummies Questions & Answers

Configure Cyrus SASL NTLM Plugin with Postfix

Hello I hope somebody can help with this. I have a shell, that in case of failure, sends an email (relaying through an Exchange Server). This Exchange server only offers NTLM authentication. 250-AUTH NTLM This is the configuration I have: Postfix 2.1.1 as client. Cyrus-SASL... (1 Reply)
Discussion started by: viktor1985
1 Replies

5. Red Hat

GSSAPI Error FTP

Hi Experts, While trying ftp from newly setup Linux box it is giving following error. GSSAPI error major:Unspecified GSS failure.Minor code may provide more information GSSAPI error minor:Unknown code krb5 195 GSSAPI error:initializing context GSSAPI authntication failed 504 AUTH... (1 Reply)
Discussion started by: sai_2507
1 Replies

6. Red Hat

Please help: Rhel5.6 and ldap+sasl

On Debian i set my ldap server,using tls and all works ok. On Redhat i have set my ldap server,using tls ok...but when i try to use ldapsearch without -x and with rootpw(created with slappasswd) it ask for sasl password! The question is: is possible to disable sasl? Thanks (2 Replies)
Discussion started by: Linusolaradm1
2 Replies

7. Solaris

LDAP client config GSSAPI

Configure ldap client: I have configured my ldapclient with the AuthenticationMethod=simple and with the credentialLevel=proxy. However, as soon as i want to set the AuthenticationMethod=sasl/GSSAPI, and credentiallevel=self, then it fails to configure. Kerberos is already setup successfully. The... (0 Replies)
Discussion started by: Henk Trumpie
0 Replies
Login or Register to Ask a Question
Authen::SASL::Perl::GSSAPI(3pm) 			User Contributed Perl Documentation			   Authen::SASL::Perl::GSSAPI(3pm)

NAME
Authen::SASL::Perl::GSSAPI - GSSAPI (Kerberosv5) Authentication class SYNOPSIS
use Authen::SASL qw(Perl); $sasl = Authen::SASL->new( mechanism => 'GSSAPI' ); $sasl = Authen::SASL->new( mechanism => 'GSSAPI', callback => { pass => $mycred }); $sasl->client_start( $service, $host ); DESCRIPTION
This method implements the client part of the GSSAPI SASL algorithm, as described in RFC 2222 section 7.2.1 resp. draft-ietf-sasl-gssapi-XX.txt. With a valid Kerberos 5 credentials cache (aka TGT) it allows to connect to service@host given as the first two parameters to Authen::SASL's client_start() method. Alternatively, a GSSAPI::Cred object can be passed in via the Authen::SASL callback hash using the `pass' key. Please note that this module does not currently implement a SASL security layer following authentication. Unless the connection is protected by other means, such as TLS, it will be vulnerable to man-in-the-middle attacks. If security layers are required, then the Authen::SASL::XS GSSAPI module should be used instead. CALLBACK The callbacks used are: authname The authorization identity to be used in SASL exchange gssmech The GSS mechanism to be used in the connection pass The GSS credentials to be used in the connection (optional) EXAMPLE
#! /usr/bin/perl -w use strict; use Net::LDAP 0.33; use Authen::SASL 2.10; # -------- Adjust to your environment -------- my $adhost = 'theserver.bla.net'; my $ldap_base = 'dc=bla,dc=net'; my $ldap_filter = '(&(sAMAccountName=BLAAGROL))'; my $sasl = Authen::SASL->new(mechanism => 'GSSAPI'); my $ldap; eval { $ldap = Net::LDAP->new($adhost, onerror => 'die') or die "Cannot connect to LDAP host '$adhost': '$@'"; $ldap->bind(sasl => $sasl); }; if ($@) { chomp $@; die " Bind error : $@", " Detailed SASL error: ", $sasl->error, " Terminated"; } print " LDAP bind() succeeded, working in authenticated state"; my $mesg = $ldap->search(base => $ldap_base, filter => $ldap_filter); # -------- evaluate $mesg PROPERTIES The properties used are: maxbuf The maximum buffer size for receiving cipher text minssf The minimum SSF value that should be provided by the SASL security layer. The default is 0 maxssf The maximum SSF value that should be provided by the SASL security layer. The default is 2**31 externalssf The SSF value provided by an underlying external security layer. The default is 0 ssf The actual SSF value provided by the SASL security layer after the SASL authentication phase has been completed. This value is read- only and set by the implementation after the SASL authentication phase has been completed. maxout The maximum plaintext buffer size for sending data to the peer. This value is set by the implementation after the SASL authentication phase has been completed and a SASL security layer is in effect. SEE ALSO
Authen::SASL, Authen::SASL::Perl AUTHORS
Written by Simon Wilkinson, with patches and extensions by Achim Grolms and Peter Marschall. Please report any bugs, or post any suggestions, to the perl-ldap mailing list <perl-ldap@perl.org> COPYRIGHT
Copyright (c) 2006 Simon Wilkinson, Achim Grolms and Peter Marschall. All rights reserved. This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. perl v5.10.1 2010-03-11 Authen::SASL::Perl::GSSAPI(3pm)