Hi all, I'd like to perform some ldapsearch against my AD domain. And I'd like to be able to perform these ldapsearch using GSSAPI to avoid usage of password in scripts. DC are using default configuration file: ---------------------------------------- # Global parameters [global] workgroup = SAMBA.DOMAIN realm = SAMBA.DOMAIN.TLD netbios name = M707 server role = active directory domain controller dns forwarder = 10.156.248.245 idmap_ldb:use rfc2307 = yes [netlogon] path = /var/lib/samba/sysvol/samba.domain.tld/scripts read only = No write ok = Yes [sysvol] path = /var/lib/samba/sysvol read only = No write ok = Yes ---------------------------------------- Here the content of /etc/ldap/ldap.conf on client side: ---------------------------------------- TLS_REQCERT demand BASE DC=SAMBA,DC=DOMAIN,DC=TLD ---------------------------------------- ldapsearch on 389 is working: ---------------------------------------- ldapsearch -LLL -p389 -h 10.156.248.238 cn=administrator -D cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -W Enter LDAP Password: dn: CN=Administrator,CN=Users,DC=samba,DC=domain,DC=tld objectClass: top objectClass: person objectClass: organizationalPerson objectClass: user cn: Administrator description: Built-in account for administering the computer/domain instanceType: 4 .... ---------------------------------------- ldapsearch on 636 is not working: ---------------------------------------- ldapsearch -LLL -p636 -h 10.156.248.238 cn=administrator -D cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -W -d9 ldap_create ldap_url_parse_ext(ldap://10.156.248.238:636) Enter LDAP Password: ldap_sasl_bind ldap_send_initial_request ldap_new_connection 1 1 0 ldap_int_open_connection ldap_connect_to_host: TCP 10.156.248.238:636 ldap_new_socket: 4 ldap_prepare_socket: 4 ldap_connect_to_host: Trying 10.156.248.238:636 ldap_pvt_connect: fd: 4 tm: -1 async: 0 attempting to connect: connect success ldap_open_defconn: successful ldap_send_server_request ber_scanf fmt ({it) ber: ber_scanf fmt ({i) ber: ber_flush2: 90 bytes to sd 4 ldap_result ld 0x7efef3b29b00 msgid 1 wait4msg ld 0x7efef3b29b00 msgid 1 (infinite timeout) wait4msg continue ld 0x7efef3b29b00 msgid 1 all 1 ** ld 0x7efef3b29b00 Connections: * host: 10.156.248.238 port: 636 (default) refcnt: 2 status: Connected last used: Thu Oct 15 12:46:14 2015 ** ld 0x7efef3b29b00 Outstanding Requests: * msgid 1, origid 1, status InProgress outstanding referrals 0, parent count 0 ld 0x7efef3b29b00 request count 1 (abandoned 0) ** ld 0x7efef3b29b00 Response Queue: Empty ld 0x7efef3b29b00 response count 0 ldap_chkResponseList ld 0x7efef3b29b00 msgid 1 all 1 ldap_chkResponseList returns ld 0x7efef3b29b00 NULL ldap_int_select read1msg: ld 0x7efef3b29b00 msgid 1 all 1 ber_get_next ber_get_next failed. ldap_err2string ldap_result: Can't contact LDAP server (-1) ldap_free_request (origid 1, msgid 1) ldap_free_connection 1 1 ldap_free_connection: actually freed ---------------------------------------- This leads me to the first question: any idea what I'm missing to be able to use ldaps? Then what I'm really trying is to use GSSAPI and keytab to authenticate during ldapsearch. First point I had to install "libsasl2-modules-gssapi-mit" or "libsasl2-modules-gssapi-heimdal", both are Debian packages. Without these packages ldapsearch was asking me for a password: ---------------------------------------- ldapsearch -LLL -H ldap://m707:389 objectclass=user SASL/NTLM authentication started Please enter your password: ---------------------------------------- Once one of these packages was installed and after performing a kinit: ---------------------------------------- kinit -k -t /path/to/keytab.file administrator klist Credentials cache: FILE:/tmp/krb5cc_1000 Principal: administrator at SAMBA.DOMAIN.TLD Issued Expires Principal Oct 15 11:00:48 2015 Oct 15 21:00:48 2015 krbtgt/SAMBA.DOMAIN.TLD at SAMBA.DOMAIN.TLD Oct 15 11:37:51 2015 Oct 15 21:00:48 2015 ldap/m707@ Oct 15 11:37:51 2015 Oct 15 21:00:48 2015 ldap/m707 at SAMBA.DOMAIN.TLD Oct 15 11:42:11 2015 Oct 15 21:00:48 2015 ldap/m708@ Oct 15 11:42:11 2015 Oct 15 21:00:48 2015 ldap/m708 at SAMBA.DOMAIN.TLD Oct 15 11:49:16 2015 Oct 15 21:00:48 2015 ldap/m709@ Oct 15 11:49:16 2015 Oct 15 21:00:48 2015 ldap/m709 at SAMBA.DOMAIN.TLD ---------------------------------------- GSSAPI starts to work, a little bit: ---------------------------------------- ldapsearch -LLL -H ldap://m707:389 objectclass=user SASL/GSS-SPNEGO authentication started SASL username: administrator at SAMBA.DOMAIN.TLD SASL SSF: 0 ldap_result: Can't contact LDAP server (-1) ---------------------------------------- Here I'm wondering which one of these packages I should have, heimdal or mit. Idem for Kerberos client, we can chose between heimdal-clients (Heimdal) and krb5-user (MIT). Anyway client seems to react identically with any of these Kerberos implementation. And the question: what do I missed to have that ldapsearch working with GSSAPI? Kindly regards, mathias
Things goes further. To use GSSAPI and so the Kerberos ticket obtained with kinit I was missing "-Y GSSAPI". It seems GSSAPI and TLS are meant to be used together: ---------------------------------------- ldapsearch -Y GSSAPI -LLL -H ldaps://SAMBA.DOMAIN.TLD SASL/GSSAPI authentication started ldap_sasl_interactive_bind_s: Server is unwilling to perform (53) additional info: SASL:[GSSAPI]: Sign or Seal are not allowed if TLS is used ---------------------------------------- So, the same using ldap:// rather than ldaps:// ---------------------------------------- ldapsearch -Y GSSAPI -LLL -H ldap://SAMBA.DOMAIN.TLD SASL/GSSAPI authentication started SASL username: administrator at SAMBA.DOMAIN.TLD SASL SSF: 56 SASL data security layer installed. dn: CN=6bcd5682-8314-11d6-977b-00c04f613221,CN=Operations,CN=DomainUpdates,CN... ---------------------------------------- Now to use ldapsearch without GSSAPI but password: ---------------------------------------- ldapsearch -LLL -H ldaps://ad.dgfip.finances.gouv.fr -D cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -w Passw0rd dn: CN=6bcd5682-8314-11d6-977b-00c04f613221,CN=Operations,CN=DomainUpdates,CN.... ---------------------------------------- This links gave me information about -Y GSSAPI: https://lists.samba.org/archive/samba-technical/2012-January/081241.html As I said in my previous mail I was looking for a way to test different services which compose AD, this ldapsearch using GSSAPI and previously generated ticket give us possibility to test LDAP behaviour. To test each DC we just have to replace ldap://SAMBA.DOMAIN.TLD by ldap://DC1.SAMBA.DOMAIN.TLD, then ldap://DC2.SAMBA.DOMAIN.TLD... To test Kerberos we need to use a dedicated Kerberos configuration file (by default it's /eetc/krb5.conf). To do that we have to set environment variable KRB5_CONFIG: export KRB5_CONFIG=/path/to/krb5.DC1.conf And in /path/to/krb5.DC1.conf: ---------------------------------------- [libdefaults] default_realm = SAMBA.DOMAIN.TLD rdns_lookup_realm = false rdns_lookup_kdc = false dns_lookup_realm = false dns_lookup_kdc = false [realms] SAMBA.DOMAIN.TLD = { admin_server = dc1.samba.domain.tld kdc = dc1.samba.domain.tld kpasswd_server = dc1.samba.domain.tld master_kdc = dc1.samba.domain.tld } ---------------------------------------- Then using kinit will be forced to use server declared in that file. Creating one file per domain controller we can test Kerberos behaviour on specific DC. To test DNS a simple "dig @<IP DC1> somehost.samba.domain.tld". To test CIFS access to SysVol: ---------------------------------------- smbclient //DC1.SAMBA.DOMAIN.TLD/sysvol -Uadministrator -k << EOF ls samba.domain.tld/* exit EOF ---------------------------------------- Which should answer: ---------------------------------------- Domain=[SAMBA.DOMAIN] OS=[Windows 6.1] Server=[Samba 4.3.0-RedHat-02.el7] . D 0 Wed Oct 14 17:01:50 2015 .. D 0 Wed Oct 14 17:01:50 2015 scripts D 0 Wed Oct 14 17:01:46 2015 Policies D 0 Wed Oct 14 17:01:50 2015 40880 blocks of size 131072. 17631 blocks available ---------------------------------------- I posted all that for those interested. If anyone sees anything else to test, please tell me for I can improve my tests ;) Best regards, mathias 2015-10-15 13:17 GMT+02:00 mathias dufresne <infractory at gmail.com>:> Hi all, > > I'd like to perform some ldapsearch against my AD domain. > And I'd like to be able to perform these ldapsearch using GSSAPI to avoid > usage of password in scripts. > > DC are using default configuration file: > ---------------------------------------- > # Global parameters > [global] > workgroup = SAMBA.DOMAIN > realm = SAMBA.DOMAIN.TLD > netbios name = M707 > server role = active directory domain controller > dns forwarder = 10.156.248.245 > idmap_ldb:use rfc2307 = yes > > [netlogon] > path = /var/lib/samba/sysvol/samba.domain.tld/scripts > read only = No > write ok = Yes > > [sysvol] > path = /var/lib/samba/sysvol > read only = No > write ok = Yes > ---------------------------------------- > > Here the content of /etc/ldap/ldap.conf on client side: > ---------------------------------------- > TLS_REQCERT demand > BASE DC=SAMBA,DC=DOMAIN,DC=TLD > ---------------------------------------- > > > ldapsearch on 389 is working: > ---------------------------------------- > ldapsearch -LLL -p389 -h 10.156.248.238 cn=administrator -D > cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -W > Enter LDAP Password: > dn: CN=Administrator,CN=Users,DC=samba,DC=domain,DC=tld > objectClass: top > objectClass: person > objectClass: organizationalPerson > objectClass: user > cn: Administrator > description: Built-in account for administering the computer/domain > instanceType: 4 > .... > ---------------------------------------- > > ldapsearch on 636 is not working: > ---------------------------------------- > ldapsearch -LLL -p636 -h 10.156.248.238 cn=administrator -D > cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -W -d9 > ldap_create > ldap_url_parse_ext(ldap://10.156.248.238:636) > Enter LDAP Password: > ldap_sasl_bind > ldap_send_initial_request > ldap_new_connection 1 1 0 > ldap_int_open_connection > ldap_connect_to_host: TCP 10.156.248.238:636 > ldap_new_socket: 4 > ldap_prepare_socket: 4 > ldap_connect_to_host: Trying 10.156.248.238:636 > ldap_pvt_connect: fd: 4 tm: -1 async: 0 > attempting to connect: > connect success > ldap_open_defconn: successful > ldap_send_server_request > ber_scanf fmt ({it) ber: > ber_scanf fmt ({i) ber: > ber_flush2: 90 bytes to sd 4 > ldap_result ld 0x7efef3b29b00 msgid 1 > wait4msg ld 0x7efef3b29b00 msgid 1 (infinite timeout) > wait4msg continue ld 0x7efef3b29b00 msgid 1 all 1 > ** ld 0x7efef3b29b00 Connections: > * host: 10.156.248.238 port: 636 (default) > refcnt: 2 status: Connected > last used: Thu Oct 15 12:46:14 2015 > > > ** ld 0x7efef3b29b00 Outstanding Requests: > * msgid 1, origid 1, status InProgress > outstanding referrals 0, parent count 0 > ld 0x7efef3b29b00 request count 1 (abandoned 0) > ** ld 0x7efef3b29b00 Response Queue: > Empty > ld 0x7efef3b29b00 response count 0 > ldap_chkResponseList ld 0x7efef3b29b00 msgid 1 all 1 > ldap_chkResponseList returns ld 0x7efef3b29b00 NULL > ldap_int_select > read1msg: ld 0x7efef3b29b00 msgid 1 all 1 > ber_get_next > ber_get_next failed. > ldap_err2string > ldap_result: Can't contact LDAP server (-1) > ldap_free_request (origid 1, msgid 1) > ldap_free_connection 1 1 > ldap_free_connection: actually freed > ---------------------------------------- > > This leads me to the first question: any idea what I'm missing to be able > to use ldaps? > > Then what I'm really trying is to use GSSAPI and keytab to authenticate > during ldapsearch. > > First point I had to install "libsasl2-modules-gssapi-mit" or > "libsasl2-modules-gssapi-heimdal", both are Debian packages. Without these > packages ldapsearch was asking me for a password: > ---------------------------------------- > ldapsearch -LLL -H ldap://m707:389 objectclass=user > SASL/NTLM authentication started > Please enter your password: > ---------------------------------------- > > Once one of these packages was installed and after performing a kinit: > ---------------------------------------- > kinit -k -t /path/to/keytab.file administrator > klist > Credentials cache: FILE:/tmp/krb5cc_1000 > Principal: administrator at SAMBA.DOMAIN.TLD > > Issued Expires Principal > Oct 15 11:00:48 2015 Oct 15 21:00:48 2015 > krbtgt/SAMBA.DOMAIN.TLD at SAMBA.DOMAIN.TLD > Oct 15 11:37:51 2015 Oct 15 21:00:48 2015 ldap/m707@ > Oct 15 11:37:51 2015 Oct 15 21:00:48 2015 ldap/m707 at SAMBA.DOMAIN.TLD > Oct 15 11:42:11 2015 Oct 15 21:00:48 2015 ldap/m708@ > Oct 15 11:42:11 2015 Oct 15 21:00:48 2015 ldap/m708 at SAMBA.DOMAIN.TLD > Oct 15 11:49:16 2015 Oct 15 21:00:48 2015 ldap/m709@ > Oct 15 11:49:16 2015 Oct 15 21:00:48 2015 ldap/m709 at SAMBA.DOMAIN.TLD > ---------------------------------------- > > GSSAPI starts to work, a little bit: > ---------------------------------------- > ldapsearch -LLL -H ldap://m707:389 objectclass=user > SASL/GSS-SPNEGO authentication started > SASL username: administrator at SAMBA.DOMAIN.TLD > SASL SSF: 0 > ldap_result: Can't contact LDAP server (-1) > ---------------------------------------- > > Here I'm wondering which one of these packages I should have, heimdal or > mit. Idem for Kerberos client, we can chose between heimdal-clients > (Heimdal) and krb5-user (MIT). > > Anyway client seems to react identically with any of these Kerberos > implementation. > > And the question: what do I missed to have that ldapsearch working with > GSSAPI? > > Kindly regards, > > mathias >
ERRATUM: It seems GSSAPI and TLS are *NOT* meant to be used together: 2015-10-15 16:20 GMT+02:00 mathias dufresne <infractory at gmail.com>:> Things goes further. To use GSSAPI and so the Kerberos ticket obtained > with kinit I was missing "-Y GSSAPI". > > It seems GSSAPI and TLS are meant to be used together: > ---------------------------------------- > ldapsearch -Y GSSAPI -LLL -H ldaps://SAMBA.DOMAIN.TLD > SASL/GSSAPI authentication started > ldap_sasl_interactive_bind_s: Server is unwilling to perform (53) > additional info: SASL:[GSSAPI]: Sign or Seal are not allowed if > TLS is used > ---------------------------------------- > > So, the same using ldap:// rather than ldaps:// > ---------------------------------------- > ldapsearch -Y GSSAPI -LLL -H ldap://SAMBA.DOMAIN.TLD > SASL/GSSAPI authentication started > SASL username: administrator at SAMBA.DOMAIN.TLD > SASL SSF: 56 > SASL data security layer installed. > dn: > CN=6bcd5682-8314-11d6-977b-00c04f613221,CN=Operations,CN=DomainUpdates,CN> ... > ---------------------------------------- > > Now to use ldapsearch without GSSAPI but password: > ---------------------------------------- > ldapsearch -LLL -H ldaps://ad.dgfip.finances.gouv.fr -D > cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -w Passw0rd > dn: > CN=6bcd5682-8314-11d6-977b-00c04f613221,CN=Operations,CN=DomainUpdates,CN> .... > ---------------------------------------- > > This links gave me information about -Y GSSAPI: > https://lists.samba.org/archive/samba-technical/2012-January/081241.html > > As I said in my previous mail I was looking for a way to test different > services which compose AD, this ldapsearch using GSSAPI and previously > generated ticket give us possibility to test LDAP behaviour. To test each > DC we just have to replace ldap://SAMBA.DOMAIN.TLD > by ldap://DC1.SAMBA.DOMAIN.TLD, then ldap://DC2.SAMBA.DOMAIN.TLD... > > To test Kerberos we need to use a dedicated Kerberos configuration file > (by default it's /eetc/krb5.conf). To do that we have to set environment > variable KRB5_CONFIG: > export KRB5_CONFIG=/path/to/krb5.DC1.conf > > And in /path/to/krb5.DC1.conf: > ---------------------------------------- > [libdefaults] > default_realm = SAMBA.DOMAIN.TLD > rdns_lookup_realm = false > rdns_lookup_kdc = false > dns_lookup_realm = false > dns_lookup_kdc = false > [realms] > SAMBA.DOMAIN.TLD = { > admin_server = dc1.samba.domain.tld > kdc = dc1.samba.domain.tld > kpasswd_server = dc1.samba.domain.tld > master_kdc = dc1.samba.domain.tld > } > ---------------------------------------- > > Then using kinit will be forced to use server declared in that file. > Creating one file per domain controller we can test Kerberos behaviour on > specific DC. > > To test DNS a simple "dig @<IP DC1> somehost.samba.domain.tld". > > To test CIFS access to SysVol: > ---------------------------------------- > smbclient //DC1.SAMBA.DOMAIN.TLD/sysvol -Uadministrator -k << EOF > ls samba.domain.tld/* > exit > EOF > ---------------------------------------- > > Which should answer: > ---------------------------------------- > Domain=[SAMBA.DOMAIN] OS=[Windows 6.1] Server=[Samba 4.3.0-RedHat-02.el7] > . D 0 Wed Oct 14 17:01:50 2015 > .. D 0 Wed Oct 14 17:01:50 2015 > scripts D 0 Wed Oct 14 17:01:46 2015 > Policies D 0 Wed Oct 14 17:01:50 2015 > > 40880 blocks of size 131072. 17631 blocks available > ---------------------------------------- > > I posted all that for those interested. > If anyone sees anything else to test, please tell me for I can improve my > tests ;) > > Best regards, > > mathias > > > > > 2015-10-15 13:17 GMT+02:00 mathias dufresne <infractory at gmail.com>: > >> Hi all, >> >> I'd like to perform some ldapsearch against my AD domain. >> And I'd like to be able to perform these ldapsearch using GSSAPI to avoid >> usage of password in scripts. >> >> DC are using default configuration file: >> ---------------------------------------- >> # Global parameters >> [global] >> workgroup = SAMBA.DOMAIN >> realm = SAMBA.DOMAIN.TLD >> netbios name = M707 >> server role = active directory domain controller >> dns forwarder = 10.156.248.245 >> idmap_ldb:use rfc2307 = yes >> >> [netlogon] >> path = /var/lib/samba/sysvol/samba.domain.tld/scripts >> read only = No >> write ok = Yes >> >> [sysvol] >> path = /var/lib/samba/sysvol >> read only = No >> write ok = Yes >> ---------------------------------------- >> >> Here the content of /etc/ldap/ldap.conf on client side: >> ---------------------------------------- >> TLS_REQCERT demand >> BASE DC=SAMBA,DC=DOMAIN,DC=TLD >> ---------------------------------------- >> >> >> ldapsearch on 389 is working: >> ---------------------------------------- >> ldapsearch -LLL -p389 -h 10.156.248.238 cn=administrator -D >> cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -W >> Enter LDAP Password: >> dn: CN=Administrator,CN=Users,DC=samba,DC=domain,DC=tld >> objectClass: top >> objectClass: person >> objectClass: organizationalPerson >> objectClass: user >> cn: Administrator >> description: Built-in account for administering the computer/domain >> instanceType: 4 >> .... >> ---------------------------------------- >> >> ldapsearch on 636 is not working: >> ---------------------------------------- >> ldapsearch -LLL -p636 -h 10.156.248.238 cn=administrator -D >> cn=administrator,cn=users,DC=samba,DC=domain,DC=tld -W -d9 >> ldap_create >> ldap_url_parse_ext(ldap://10.156.248.238:636) >> Enter LDAP Password: >> ldap_sasl_bind >> ldap_send_initial_request >> ldap_new_connection 1 1 0 >> ldap_int_open_connection >> ldap_connect_to_host: TCP 10.156.248.238:636 >> ldap_new_socket: 4 >> ldap_prepare_socket: 4 >> ldap_connect_to_host: Trying 10.156.248.238:636 >> ldap_pvt_connect: fd: 4 tm: -1 async: 0 >> attempting to connect: >> connect success >> ldap_open_defconn: successful >> ldap_send_server_request >> ber_scanf fmt ({it) ber: >> ber_scanf fmt ({i) ber: >> ber_flush2: 90 bytes to sd 4 >> ldap_result ld 0x7efef3b29b00 msgid 1 >> wait4msg ld 0x7efef3b29b00 msgid 1 (infinite timeout) >> wait4msg continue ld 0x7efef3b29b00 msgid 1 all 1 >> ** ld 0x7efef3b29b00 Connections: >> * host: 10.156.248.238 port: 636 (default) >> refcnt: 2 status: Connected >> last used: Thu Oct 15 12:46:14 2015 >> >> >> ** ld 0x7efef3b29b00 Outstanding Requests: >> * msgid 1, origid 1, status InProgress >> outstanding referrals 0, parent count 0 >> ld 0x7efef3b29b00 request count 1 (abandoned 0) >> ** ld 0x7efef3b29b00 Response Queue: >> Empty >> ld 0x7efef3b29b00 response count 0 >> ldap_chkResponseList ld 0x7efef3b29b00 msgid 1 all 1 >> ldap_chkResponseList returns ld 0x7efef3b29b00 NULL >> ldap_int_select >> read1msg: ld 0x7efef3b29b00 msgid 1 all 1 >> ber_get_next >> ber_get_next failed. >> ldap_err2string >> ldap_result: Can't contact LDAP server (-1) >> ldap_free_request (origid 1, msgid 1) >> ldap_free_connection 1 1 >> ldap_free_connection: actually freed >> ---------------------------------------- >> >> This leads me to the first question: any idea what I'm missing to be able >> to use ldaps? >> >> Then what I'm really trying is to use GSSAPI and keytab to authenticate >> during ldapsearch. >> >> First point I had to install "libsasl2-modules-gssapi-mit" or >> "libsasl2-modules-gssapi-heimdal", both are Debian packages. Without these >> packages ldapsearch was asking me for a password: >> ---------------------------------------- >> ldapsearch -LLL -H ldap://m707:389 objectclass=user >> SASL/NTLM authentication started >> Please enter your password: >> ---------------------------------------- >> >> Once one of these packages was installed and after performing a kinit: >> ---------------------------------------- >> kinit -k -t /path/to/keytab.file administrator >> klist >> Credentials cache: FILE:/tmp/krb5cc_1000 >> Principal: administrator at SAMBA.DOMAIN.TLD >> >> Issued Expires Principal >> Oct 15 11:00:48 2015 Oct 15 21:00:48 2015 >> krbtgt/SAMBA.DOMAIN.TLD at SAMBA.DOMAIN.TLD >> Oct 15 11:37:51 2015 Oct 15 21:00:48 2015 ldap/m707@ >> Oct 15 11:37:51 2015 Oct 15 21:00:48 2015 ldap/m707 at SAMBA.DOMAIN.TLD >> Oct 15 11:42:11 2015 Oct 15 21:00:48 2015 ldap/m708@ >> Oct 15 11:42:11 2015 Oct 15 21:00:48 2015 ldap/m708 at SAMBA.DOMAIN.TLD >> Oct 15 11:49:16 2015 Oct 15 21:00:48 2015 ldap/m709@ >> Oct 15 11:49:16 2015 Oct 15 21:00:48 2015 ldap/m709 at SAMBA.DOMAIN.TLD >> ---------------------------------------- >> >> GSSAPI starts to work, a little bit: >> ---------------------------------------- >> ldapsearch -LLL -H ldap://m707:389 objectclass=user >> SASL/GSS-SPNEGO authentication started >> SASL username: administrator at SAMBA.DOMAIN.TLD >> SASL SSF: 0 >> ldap_result: Can't contact LDAP server (-1) >> ---------------------------------------- >> >> Here I'm wondering which one of these packages I should have, heimdal or >> mit. Idem for Kerberos client, we can chose between heimdal-clients >> (Heimdal) and krb5-user (MIT). >> >> Anyway client seems to react identically with any of these Kerberos >> implementation. >> >> And the question: what do I missed to have that ldapsearch working with >> GSSAPI? >> >> Kindly regards, >> >> mathias >> > >