Advertisement
Guest User

Untitled

a guest
Jul 26th, 2016
59
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.60 KB | None | 0 0
  1. host XXX.XX.XX.XX
  2. base dc=XXXX,dc=de
  3.  
  4. shadow: files ldap
  5. passwd: files ldap
  6. group: files ldap
  7.  
  8. #%PAM-1.0
  9. auth required pam_unix2.so
  10. auth sufficient pam_ldap.so debug
  11.  
  12. account required pam_unix2.so
  13. account sufficient pam_ldap.so debug
  14.  
  15. password required pam_pwcheck.so
  16. password sufficient pam_ldap.so use_authtok debug
  17. password required pam_unix2.so use_first_pass use_authtok
  18.  
  19. session required pam_unix2.so
  20. session required pam_limits.so
  21. session required pam_env.so
  22.  
  23. getent passwd XXX
  24.  
  25. 2016-07-26T15:25:51.248330+02:00 LDAPServ slapd[2913]: conn=1338 op=2 SRCH base="dc=XXX,dc=de" scope=2 deref=0 filter="(&(objectClass=posixAccount)(uid=ldaptest))"
  26. 2016-07-26T15:25:51.249119+02:00 LDAPServ slapd[2913]: conn=1338 op=2 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
  27. 2016-07-26T15:25:51.249381+02:00 LDAPServ slapd[2913]: <= bdb_equality_candidates: (objectClass) not indexed
  28. 2016-07-26T15:25:51.249646+02:00 LDAPServ slapd[2913]: <= bdb_equality_candidates: (objectClass) not indexed
  29. 2016-07-26T15:25:51.249905+02:00 LDAPServ slapd[2913]: <= bdb_equality_candidates: (uid) not indexed
  30. 2016-07-26T15:25:51.250205+02:00 LDAPServ slapd[2913]: conn=1338 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
  31.  
  32. Tue Jul 26 15:25:51 2016 - 2551: handle_request: request received (Version = 2) from PID 2580
  33. Tue Jul 26 15:25:51 2016 - 2551: GETFDPW
  34. Tue Jul 26 15:25:51 2016 - 2551: provide access to FD 8, for passwd
  35. Tue Jul 26 15:25:51 2016 - 2551: handle_request: request received (Version = 2) from PID 2580
  36. Tue Jul 26 15:25:51 2016 - 2551: GETPWBYNAME (ldaptest)
  37. Tue Jul 26 15:25:51 2016 - 2551: Haven't found "ldaptest" in password cache!
  38. Tue Jul 26 15:25:51 2016 - 2551: add new entry "ldaptest" of type GETPWBYNAME for passwd to cache (first)
  39. Tue Jul 26 15:26:11 2016 - 2551: pruning passwd cache; time 1469539571
  40. Tue Jul 26 15:26:11 2016 - 2551: considering GETPWBYUID entry "0", timeout 1469539696
  41. Tue Jul 26 15:26:11 2016 - 2551: considering GETPWBYNAME entry "ldaptest", timeout 1469539571
  42. Tue Jul 26 15:26:11 2016 - 2551: considering GETPWBYUID entry "51", timeout 1469539906
  43. Tue Jul 26 15:26:11 2016 - 2551: considering GETPWBYNAME entry "nobody", timeout 1469539906
  44. Tue Jul 26 15:26:11 2016 - 2551: considering GETPWBYNAME entry "root", timeout 1469539696
  45. Tue Jul 26 15:26:11 2016 - 2551: considering GETPWBYUID entry "65534", timeout 1469539906
  46. Tue Jul 26 15:26:11 2016 - 2551: considering GETPWBYNAME entry "postfix", timeout 1469539906
  47. Tue Jul 26 15:26:26 2016 - 2551: pruning passwd cache; time 1469539586
  48. Tue Jul 26 15:26:26 2016 - 2551: considering GETPWBYUID entry "0", timeout 1469539696
  49. Tue Jul 26 15:26:26 2016 - 2551: considering GETPWBYNAME entry "ldaptest", timeout 1469539571
  50. Tue Jul 26 15:26:26 2016 - 2551: considering GETPWBYUID entry "51", timeout 1469539906
  51. Tue Jul 26 15:26:26 2016 - 2551: considering GETPWBYNAME entry "nobody", timeout 1469539906
  52. Tue Jul 26 15:26:26 2016 - 2551: considering GETPWBYNAME entry "root", timeout 1469539696
  53. Tue Jul 26 15:26:26 2016 - 2551: considering GETPWBYUID entry "65534", timeout 1469539906
  54. Tue Jul 26 15:26:26 2016 - 2551: considering GETPWBYNAME entry "postfix", timeout 1469539906
  55. Tue Jul 26 15:26:26 2016 - 2551: remove GETPWBYNAME entry "ldaptest"
  56. Tue Jul 26 15:26:26 2016 - 2551: freed 216 bytes in passwd cache
  57. Tue Jul 26 15:26:43 2016 - 2551: handle_request: request received (Version = 2) from PID 2593
  58. Tue Jul 26 15:26:43 2016 - 2551: GETFDPW
  59. Tue Jul 26 15:26:43 2016 - 2551: provide access to FD 8, for passwd
  60. Tue Jul 26 15:26:43 2016 - 2551: handle_request: request received (Version = 2) from PID 2593
  61. Tue Jul 26 15:26:43 2016 - 2551: GETFDGR
  62. Tue Jul 26 15:26:43 2016 - 2551: provide access to FD 10, for group
  63. Tue Jul 26 15:26:43 2016 - 2551: handle_request: request received (Version = 2) from PID 2593
  64. Tue Jul 26 15:26:43 2016 - 2551: GETPWBYUID (4)
  65. Tue Jul 26 15:26:43 2016 - 2551: Haven't found "4" in password cache!
  66. Tue Jul 26 15:26:43 2016 - 2551: add new entry "4" of type GETPWBYUID for passwd to cache (first)
  67. Tue Jul 26 15:26:43 2016 - 2551: add new entry "lp" of type GETPWBYNAME for passwd to cache
  68. Tue Jul 26 15:26:43 2016 - 2551: handle_request: request received (Version = 2) from PID 2593
  69. Tue Jul 26 15:26:43 2016 - 2551: GETGRBYGID (7)
  70. Tue Jul 26 15:26:43 2016 - 2551: Haven't found "7" in group cache!
  71. Tue Jul 26 15:26:43 2016 - 2551: add new entry "7" of type GETGRBYGID for group to cache (first)
  72. Tue Jul 26 15:26:43 2016 - 2551: add new entry "lp" of type GETGRBYNAME for group to cache
  73. Tue Jul 26 15:26:43 2016 - 2551: handle_request: request received (Version = 2) from PID 2593
  74. Tue Jul 26 15:26:43 2016 - 2551: GETPWBYUID (9)
  75. Tue Jul 26 15:26:43 2016 - 2551: Haven't found "9" in password cache!
  76. Tue Jul 26 15:26:43 2016 - 2551: add new entry "9" of type GETPWBYUID for passwd to cache (first)
  77. Tue Jul 26 15:26:43 2016 - 2551: add new entry "news" of type GETPWBYNAME for passwd to cache
  78. Tue Jul 26 15:26:43 2016 - 2551: handle_request: request received (Version = 2) from PID 2593
  79. Tue Jul 26 15:26:43 2016 - 2551: GETGRBYGID (13)
  80. Tue Jul 26 15:26:43 2016 - 2551: Haven't found "13" in group cache!
  81. Tue Jul 26 15:26:43 2016 - 2551: add new entry "13" of type GETGRBYGID for group to cache (first)
  82. Tue Jul 26 15:26:43 2016 - 2551: add new entry "news" of type GETGRBYNAME for group to cache
  83.  
  84. 2016-07-26T15:29:35.444271+02:00 SSHServ sshd[2612]: Invalid user ldaptest from XXX.XXX.XXX.XXX
  85. 2016-07-26T15:29:35.448138+02:00 SSHServ sshd[2612]: input_userauth_request: invalid user ldaptest [preauth]
  86. 2016-07-26T15:29:35.453752+02:00 SSHServ sshd[2612]: Postponed keyboard-interactive for invalid user ldaptest from XXX.XXX.XXX.XXX port 59483 ssh2 [preauth]
  87. 2016-07-26T15:29:37.372348+02:00 SSHServ sshd[2612]: Postponed keyboard-interactive/pam for invalid user ldaptest from XXX.XXX.XXX.XXX port 59483 ssh2 [preauth]
  88. 2016-07-26T15:29:40.240791+02:00 SSHServ sshd[2614]: pam_ldap: error trying to bind as user "cn=ldaptest,o=XXXX,dc=XXX,dc=de" (Invalid credentials)
  89. 2016-07-26T15:29:40.244404+02:00 SSHServ sshd[2612]: error: PAM: User not known to the underlying authentication module for illegal user ldaptest from XXX.XXX.XXX.XXX
  90. 2016-07-26T15:29:40.244980+02:00 SSHServ sshd[2612]: Failed keyboard-interactive/pam for invalid user ldaptest from XXX.XXX.XXX.XXX port 59483 ssh2
  91. 2016-07-26T15:29:40.248708+02:00 SSHServ sshd[2612]: Postponed keyboard-interactive for invalid user ldaptest from XXX.XXX.XXX.XXX port 59483 ssh2 [preauth]
  92. 2016-07-26T15:29:41.929544+02:00 SSHServ sshd[2612]: error: Received disconnect from XXX.XXX.XXX.XXX: 13: Unable to authenticate [preauth]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement