Displaying 20 results from an estimated 10000 matches similar to: "CentOS-5.3 saslauth configuration issue"
2009 Aug 26
3
saslauthd
Hello,
I'm having trouble to get saslauthd running on a centos-5.3. I can't
autheticate via testsaslauthd. Here's what I do using a fresh /etc/sasldb2:
1) start saslauthd in debug mode: saslauthd -d -a shadow -O
/usr/lib64/sasl2/smtpd.conf -r -l
2) saslpasswd2 -c -a mail -u mail testuser
3) testsaslauthd -u testomat -p <mypassword> -s smtp -r mail
shell output of
2017 Apr 26
4
saslauth logging
Hi
Not sure whether this is the correct list to ask ... if it's not please direct me to the correct one.
Is it possible on to log a bit more detail when auth failure occurs when using saslauthd?
saslauthd[2119]: do_auth : auth failure: [user=DELETED] [service=smtp] [realm=DELETED] [mech=pam] [reason=PAM auth error]
What I want is the IP address and if possible the incorrect password
2012 May 11
2
Cyrus-imapd update from 2.2.12 to 2.3.16
We are trying to move our mail store from a host running cyrus-imapd
2.2.12 under CentOS-4 to one running 2.3.16 under CentOS-6. The
current host is a 32 bit architecture. The new host is 64 bit. We have
followed the update guide found at:
http://www.cyrusimap.org/docs/cyrus-imapd/2.3.16/install-upgrade.php
The steps we followed were:
1. Install cyrus-imapd et al on the new host.
2. Modify
2017 Apr 26
0
saslauth logging
On 4/25/2017 7:00 PM, Jobst Schmalenbach wrote:
> Is it possible on to log a bit more detail when auth failure occurs when using saslauthd?
>
> saslauthd[2119]: do_auth : auth failure: [user=DELETED] [service=smtp] [realm=DELETED] [mech=pam] [reason=PAM auth error]
>
> What I want is the IP address and if possible the incorrect password (just to see how far they are off).
> Is
2010 Feb 10
3
saslauthd attack
I'm seeing a lot of activity over the last two days with what looks to
be a kiddie script. Mostly trying to access several of our servers with
the username anna. All failed... in fact I don't think we have a user
anna on any of our servers. Meanwhile...
I'm running Sendmail. This pertains to Centos 4 and 5 servers. I'm also
running fail2ban on some and Ossec on others. So far,
2005 Sep 19
1
pam and sasl2-sample-server failure
I'm setting up a postfix server using "The Book of Postfix". In ch 15
there is a section on testing saslauthd which I can't get to work. I
can get it to work using shadow password authentication, but it fails
on pam. I don't kow squat about troubleshooting pam. Any PAM wizzes
out there that can help? I saw a unrelated post talking about
something needing to be in the pam
2020 Jul 07
2
How to delete an unwanted NS record
I have this on the DC smb4-1.brockley.harte-lyne.ca:
samba-tool dns query localhost brockley.harte-lyne.ca brockley.harte-lyne.ca
ALL -U administrator
Password for [BROCKLEY\administrator]:
Name=, Records=6, Children=0
SOA: serial=7, refresh=900, retry=600, expire=86400, minttl=3600,
ns=SMB4-1.brockley.harte-lyne.ca., email=support.harte-lyne.ca.
(flags=600000f0, serial=110, ttl=3600)
2020 Jul 07
3
Can someone explain why host reports no SOA record for domain on DC?
[root at smb4-1 ~ (master)]# samba-tool dns query localhost brockley.harte-lyne.ca
brockley.harte-lyne.ca ALL -U administrator
Password for [BROCKLEY\administrator]:
Name=, Records=4, Children=0
SOA: serial=3, refresh=900, retry=600, expire=86400, minttl=3600,
ns=SMB4-1.brockley.harte-lyne.ca., email=hostmaster.brockley.harte-lyne.ca.
(flags=600000f0, serial=110, ttl=3600)
NS:
2020 Jun 30
3
samab-4.10 nsupdate
I have a dc configured to use the samba internal dns service. The version of
samba I am using is 4.10.15 packaged for FreeBSD. Its build options state
this:
BIND911 : off
BIND916 : off
, , ,
GSSAPI_BUILTIN : on
GSSAPI_MIT : off
LDAP : on
. . .
NSUPDATE : off
My smb4.conf file contains this:
[global]
bind interfaces only = Yes
dns forwarder =
2020 Jul 07
2
How to delete an unwanted NS record
On 07.07.2020 21:14, Rowland penny via samba wrote:
> On 07/07/2020 20:00, James B. Byrne via samba wrote:
>> I have this on the DC smb4-1.brockley.harte-lyne.ca:
>>
>> samba-tool dns query localhost brockley.harte-lyne.ca
>> brockley.harte-lyne.ca
>> ALL -U administrator
>> Password for [BROCKLEY\administrator]:
>> ?? Name=, Records=6, Children=0
2020 Jul 08
2
How to delete an unwanted NS record
Wed Jul 8 16:09:19 UTC 2020, Rowland penny wrote:
> No, it is '@' for the name, not 'brockley.harte-lyne.ca'
Previously I had tried that as well with similar results as shown below:
[root at smb4-1 ~ (master)]# samba-tool dns help delete
Usage: samba-tool dns delete <server> <zone> <name>
<A|AAAA|PTR|CNAME|NS|MX|SRV|TXT> <data>
[root at smb4-1
2020 Jun 03
1
samba-tool dns query
On Tue, June 2, 2020 11:13, Rowland penny wrote:
> On 02/06/2020 16:03, James B. Byrne via samba wrote:
>> Samba-4.11.8 on FreeBSd-12.1p5
>>
>> How does one list all of the actual DNS records for Samba administered zones,
>> forward and reverse?
>>
> Try:
>
> samba-tool dns query localhost brockley.harte-lyne.ca
> brockley.harte-lyne.ca ALL -U
2020 Jul 08
1
How to delete an unwanted NS record
On Wed Jul 8 13:46:41 UTC 2020, Rowland penny wrote:
>
> This is because it is an 'A' record and not an 'NS' record.
samba-tool dns delete localhost brockley.harte-lyne.ca brockley.harte-lyne.ca.
A 192.168.216.162 -U administrator
Password for [BROCKLEY\administrator]:
ERROR(runtime): uncaught exception - (9701,
'WERR_DNS_ERROR_RECORD_DOES_NOT_EXIST')
File
2015 Mar 03
6
TLS, SRTP, Asterisk11 and Snom870s
CentOS-6.5 (FreePBX-2.6)
Asterisk-11.14.2 (FreePBX)
snom870-SIP 8.7.3.25.5
I am having a very difficult time attempting to get TLS and SRTP
working with Asterisk and anything else. At the moment I am trying to
get TLS functioning with our Snom870 desk-sets. And I am not having
much luck.
Since this is an extraordinarily (to me) Byzantine environemnt I am
going to ask if any of you have gotten
2020 Jun 05
1
(no subject)
Previously, when I did this:
>> samba-tool dns query localhost brockley.harte-lyne.ca brockley.harte-lyne.ca
>> ALL -U administrator
Then I saw this:
>> Password for [BROCKLEY\administrator]:
Now I see this:
>> samba-tool dns query localhost brockley.harte-lyne.ca brockley.harte-lyne.ca
>> ALL -U administrator
>> Cannot do GSSAPI to an IP address
>>
2020 Jun 02
2
samba-tool dns query
Samba-4.11.8 on FreeBSd-12.1p5
How does one list all of the actual DNS records for Samba administered zones,
forward and reverse?
When I use the dns query option of samba-tool I get a summary but no detail:
samba-tool dns query localhost brockley.harte-lyne.ca @ ALL -U administrator
Password for [BROCKLEY\administrator]:
Name=, Records=3, Children=0
SOA: serial=1, refresh=900, retry=600,
2016 Jul 06
2
Samba43 on FreeBDS10.3 ldap db contents
I am working through the book _Implementing Samba 4_ and revalidating
my existing install. I am at the point where I need to check the
contents of the ldap database. The instructions in the book say to do
this:
ldapsearch -x -h localhost -s base - \
Dcn=Administrator,cn=Users,dc=server-02,dc=domain-02,dc=harte-lyne,dc=ca
-W
Which produces this output:
# extended LDIF
#
# LDAPv3
# base
2019 Mar 24
2
dovecot sasl support
Am 24.03.2019 um 10:01 schrieb Wojciech Puchar via dovecot:
> solved by setting saslauthd to authenticate over imap - through dovecot
> server.
> testsaslauthd shows it works fine.
>
> but it seems sendmail strips domain name from entered login.
No, it is saslauthd. Check the documention and see the "-r" parameter of
saslauthd.
Alexander
2009 Oct 23
3
Need some help with logwatch.
I am trying to get a logwatch summary emailed to a central address
from a cron job. The tasd was copied verbatim from a system which
does this already. Both are shown below.
host1 crontab -l as root
45 7 * * * /usr/sbin/logwatch --service http --service imapd
--service pop3 --service sshd --service vsftpd --service
zz-disk_space --service zz-network --service zz-sys --mailto
support at
2020 Jul 03
1
samab-4.10 nsupdate
I am also seeing this in smbd.log:
[2020/07/03 09:20:18.211558, 1]
../../auth/kerberos/gssapi_helper.c:391(gssapi_check_packet)
GSS VerifyMic failed: A token had an invalid MIC: unknown mech-code
2529638943 for mech 1 2 840 113554 1 2 2
[2020/07/03 09:20:18.211625, 0]
../../source4/auth/gensec/gensec_gssapi.c:1347(gensec_gssapi_check_packet)