[tac_plus] Tac_plus integration with LDAP (Suse issues)
Javier Sánchez Romero
javier.sanchezr at satec.es
Fri Sep 14 15:23:02 UTC 2012
Hi there!
I'm a newbie with PAM and I'm trying to integrate TACACS+ with a LDAP server. I've followed the great shrubbery tutorials for a Red Hat Installation but I need this integration in a Suse enviroment.
When I check the /var/log/messages I can see several issues about PAM, but this issues are related with a libraries installed in the system. I don't know why the libraries are not found.
/var/log/messages
Sep 14 17:00:01 /usr/sbin/cron[30615]: PAM unable to dlopen(/lib64/security/pam_ldap.so): /lib64/libc.so.6: version `GLIBC_2.14' not found (required by /lib64/libnsl.so.1)
Sep 14 17:00:01 /usr/sbin/cron[30615]: PAM adding faulty module: /lib64/security/pam_ldap.so
Sep 14 17:00:01 /usr/sbin/cron[30615]: PAM unable to dlopen(/lib64/security/pam_unix2.so): /lib64/libc.so.6: version `GLIBC_2.14' not found (required by /lib64/libnsl.so.1)
Sep 14 17:00:01 /usr/sbin/cron[30615]: PAM adding faulty module: /lib64/security/pam_unix2.so
Sep 14 17:00:01 /usr/sbin/cron[30615]: Module is unknown
This is my scenario:
Suse 11 64 bits
Modules installed: pam modules (devel, local, ldap, krb5 and 32 bits), nss_ldap, openldap, glibc and sasl. And the rest of the system packages
/etc/pam.d/tac_plus
----------------------------
auth required pam_env.so debug
auth sufficient pam_unix.so nullok try_first_pass debug
auth requisite pam_succeed_if.so uid >= 500 quiet debug
auth sufficient pam_ldap.so use_first_pass debug
auth required pam_deny.so debug
account required pam_unix.so broken_shadow
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 500 quiet
account [default=bad success=ok user_unknown=ignore] pam_ldap.so
account required pam_permit.so
password requisite pam_cracklib.so try_first_pass retry=3
password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
password sufficient pam_ldap.so use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
session optional pam_ldap.so
/etc/nsswitch.conf
--------------------------
passwd: files ldap
group: files ldap
shadow: files ldap
hosts: files dns
networks: files
services: db files
protocols: db files
rpc: db files
ethers: db files
netmasks: files
netgroup: nis
publickey: files
bootparams: files
automount: files nis
aliases: files
/etc/ldap.conf
--------------------
host x.x.x.x
base dc=x,dc=x,dc=x
ldap_version 3
binddn xxxx at x.x
bindpw xxx
port 389
nss_base_passwd OU=xx,?sub
nss_base_shadow OU=xx,?sub
nss_map_objectclass posixAccount User
nss_map_objectclass shadowAccount User
nss_map_attribute uid sAMAccountName
nss_map_attribute userPassword msSFUPassword
nss_map_attribute homeDirectory msSFUHomeDirectory
nss_map_objectclass posixGroup Group
nss_map_attribute uniqueMember member
nss_map_attribute cn sAMAccountName
pam_login_attribute sAMAccountName
pam_filter objectclass=user
pam_password ad
/lib/security
-----------------
pam_access.so pam_exec.so pam_krb5 pam_mail.so pam_permit.so pam_shells.so pam_tty_audit.so pam_userdb.so
pam_ck_connector.so pam_faildelay.so pam_krb5.so pam_make.so pam_pwcheck.so pam_smbpass.so pam_umask.so pam_warn.so
pam_cracklib.so pam_filter.so pam_krb5afs.so pam_mkhomedir.so pam_pwhistory.so pam_stress.so pam_unix.so pam_wheel.so
pam_cryptpass.so pam_ftp.so pam_lastlog.so pam_motd.so pam_rhosts.so pam_succeed_if.so pam_unix2.so pam_xauth.so
pam_debug.so pam_group.so pam_limits.so pam_mount.so pam_rootok.so pam_tally.so pam_unix_acct.so
pam_deny.so pam_homecheck.so pam_listfile.so pam_namespace.so pam_securetty.so pam_tally2.so pam_unix_auth.so
pam_echo.so pam_issue.so pam_localuser.so pam_nologin.so pam_selinux.so pam_time.so pam_unix_passwd.so
pam_env.so pam_keyinit.so pam_loginuid.so pam_opie.so pam_sepermit.so pam_timestamp.so pam_unix_session.so
/lib64/security
--------------------
pam_access.so pam_exec.so pam_keyinit.so pam_localuser.so pam_nologin.so pam_securetty.so pam_tally2.so pam_unix_auth.so
pam_ck_connector.so pam_faildelay.so pam_krb5 pam_loginuid.so pam_opie.so pam_selinux.so pam_time.so pam_unix_passwd.so
pam_cracklib.so pam_filter pam_krb5.so pam_mail.so pam_permit.so pam_sepermit.so pam_timestamp.so pam_unix_session.so
pam_cryptpass.so pam_filter.so pam_krb5afs.so pam_make.so pam_pwcheck.so pam_shells.so pam_tty_audit.so pam_userdb.so
pam_debug.so pam_ftp.so pam_lastlog.so pam_mkhomedir.so pam_pwhistory.so pam_smbpass.so pam_umask.so pam_warn.so
pam_deny.so pam_group.so pam_ldap.so pam_motd.so pam_rhosts.so pam_stress.so pam_unix.so pam_wheel.so
pam_echo.so pam_homecheck.so pam_limits.so pam_mount.so pam_rootok.so pam_succeed_if.so pam_unix2.so pam_xauth.so
pam_env.so pam_issue.so pam_listfile.so pam_namespace.so pam_rpasswd.so pam_tally.so pam_unix_acct.so
Anybody have a solution for this?
Thanks a lot in advance
Kind regards
Javi
More information about the tac_plus
mailing list