LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Software (https://www.linuxquestions.org/questions/linux-software-2/)
-   -   phpldapadmin error (https://www.linuxquestions.org/questions/linux-software-2/phpldapadmin-error-478315/)

depam 08-29-2006 01:00 AM

phpldapadmin error
 
I'm kinda new to LDAP.. I've installed slapd and phpldapadmin for easy encoding of data. After inputting one data, i get the following error:

Could not add the object to the LDAP server.

LDAP said: Strong(er) authentication required
Error number: 0x08 (LDAP_STRONG_AUTH_REQUIRED)
Description: This LDAP server requires strong (encrypted) authentication, not clear text.

Anyone knows what to do?

drkstr 08-29-2006 01:06 AM

Are you using SSL (Secure Socket Layer)?

...drkstr

depam 08-29-2006 02:49 AM

Honestly,

I don't know. Here's my slapd.conf:

# Allow LDAPv2 binds
allow bind_v2

# This is the main slapd configuration file. See slapd.conf(5) for more
# info on the configuration options.

#######################################################################
# Global Directives:

# Features to permit
#allow bind_v2

# Schema and objectClass definitions
include /etc/ldap/schema/core.schema
include /etc/ldap/schema/cosine.schema
include /etc/ldap/schema/nis.schema
include /etc/ldap/schema/inetorgperson.schema

# Schema check allows for forcing entries to
# match schemas for their objectClasses's
schemacheck on

# Where the pid file is put. The init.d script
# will not stop the server if you change this.
pidfile /var/run/slapd/slapd.pid

# List of arguments that were passed to the server
argsfile /var/run/slapd.args

# Read slapd.conf(5) for possible values
loglevel 0

# Where the dynamically loaded modules are stored
modulepath /usr/lib/ldap
moduleload back_bdb

#######################################################################
# SSL:
# Uncomment the following lines to enable SSL and use the default
# snakeoil certificates.
#TLSCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem
#TLSCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key

#######################################################################
# Specific Backend Directives for bdb:
# Backend specific directives apply to this backend until another
# 'backend' directive occurs
backend bdb
checkpoint 512 30

#######################################################################
# Specific Backend Directives for 'other':
# Backend specific directives apply to this backend until another
# 'backend' directive occurs
#backend <other>

#######################################################################
# Specific Directives for database #1, of type bdb:
# Database specific directives apply to this databasse until another
# 'database' directive occurs
database bdb

# The base of your directory in database #1
suffix "dc=armscor,dc=com,dc=ph"

# Where the database file are physically stored for database #1
directory "/var/lib/ldap"

# Indexing options for database #1
index objectClass eq

# Save the time that the entry gets modified, for database #1
lastmod on

# Where to store the replica logs for database #1
# replogfile /var/lib/ldap/replog

# The userPassword by default can be changed
# by the entry owning it if they are authenticated.
# Others should not be able to see it, except the
# admin entry below
# These access lines apply to database #1 only
access to attrs=userPassword
by dn="cn=admin,dc=armscor,dc=com,dc=ph" write
by anonymous auth
by self write
by * none

# Ensure read access to the base for things like
# supportedSASLMechanisms. Without this you may
# have problems with SASL not knowing what
# mechanisms are available and the like.
# Note that this is covered by the 'access to *'
# ACL below too but if you change that as people
# are wont to do you'll still need this if you
# want SASL (and possible other things) to work
# happily.
access to dn.base="" by * read

# The admin dn has full write access, everyone else
# can read everything.
access to *
by dn="cn=admin,dc=armscor,dc=com,dc=ph" write
by * read

# For Netscape Roaming support, each user gets a roaming
# profile for which they have write access to
#access to dn=".*,ou=Roaming,o=morsnet"
# by dn="cn=admin,dc=armscor,dc=com,dc=ph" write
# by dnattr=owner write

#######################################################################
# Specific Directives for database #2, of type 'other' (can be bdb too):
# Database specific directives apply to this databasse until another
# 'database' directive occurs
#database <other>

# The base of your directory for database #2
#suffix "dc=debian,dc=org"

When I issued the command ldapadd, It prompts for:

SASL/DIGEST-MD5 authentication started
Please enter your password:

When I enter a password, it says:

ldap_sasl_interactive_bind_s: Internal (implementation specific) error (80)
additional info: SASL(-13): user not found: no secret in database

My guess is I need to open bdb and gain permission to it.

drkstr 08-29-2006 10:42 AM

Well from the original error you posted, it looks like it won't add anything to the database sine you are not using encrption.

Code:

#######################################################################
# SSL:
# Uncomment the following lines to enable SSL and use the default
# snakeoil certificates.
#TLSCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem
#TLSCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key

This section is probably what you're looking for.

regards,
...drkstr

depam 08-29-2006 07:22 PM

I tried to uncomment it but when I issued the command ldapadd, It prompts for:

SASL/DIGEST-MD5 authentication started
Please enter your password:

When I enter a password, it says:

ldap_sasl_interactive_bind_s: Internal (implementation specific) error (80)
additional info: SASL(-13): user not found: no secret in database

rem1986 08-31-2006 01:27 PM

ldap ...
 
use ldapadd with the option -x for simple authentication instead of SASL


All times are GMT -5. The time now is 06:58 AM.