ldapsearch and kerberos authentication The 2019 Stack Overflow Developer Survey Results Are InProblems set-up Single Sign-On using Kerberos authenticationKerberos + Ldap Setup not working with sshPutty Kerberos/GSSAPI authenticationObtain krb ticket for another userOpenSSH two factor authentication combined with Kerberos / public keyKerberos PuTTY from non-domain machine via VPNLDAP Kerberos authentication on linuxCan ssh generate a kerberos ticket? (FreeBSD)Using resources in foreign Kerberos Realm from windows without cross-domain trust?Cross-Realm-Trust between Active Directory and MIT Kerberos

I see my dog run

JSON.serialize: is it possible to suppress null values of a map?

Monty Hall variation

How long do I have to send payment?

Does it makes sense to buy a new cycle to learn riding?

Can I write a for loop that iterates over both collections and arrays?

"To split hairs" vs "To be pedantic"

Does light intensity oscillate really fast since it is a wave?

On the insanity of kings as an argument against Monarchy

Polarization lost upon 2nd reflection?

Can we apply L'Hospital's rule where the derivative is not continuous?

Is there a name of the flying bionic bird?

Carnot-Caratheodory metric

Does duplicating a spell with wish count as casting that spell?

What is this 4-propeller plane?

Which Sci-Fi work first showed weapon of galactic-scale mass destruction?

Inflated grade on resume at previous job, might former employer tell new employer?

Why can Shazam do this?

"What time...?" or "At what time...?" - what is more grammatically correct?

Is three citations per paragraph excessive for undergraduate research paper?

Output the Arecibo Message

Why do UK politicians seemingly ignore opinion polls on Brexit?

What tool would a Roman-age civilisation use to reduce/breakup silver and other metals?

I looked up a future colleague on linkedin before I started a job. I told my colleague about it and he seemed surprised. Should I apologize?



ldapsearch and kerberos authentication



The 2019 Stack Overflow Developer Survey Results Are InProblems set-up Single Sign-On using Kerberos authenticationKerberos + Ldap Setup not working with sshPutty Kerberos/GSSAPI authenticationObtain krb ticket for another userOpenSSH two factor authentication combined with Kerberos / public keyKerberos PuTTY from non-domain machine via VPNLDAP Kerberos authentication on linuxCan ssh generate a kerberos ticket? (FreeBSD)Using resources in foreign Kerberos Realm from windows without cross-domain trust?Cross-Realm-Trust between Active Directory and MIT Kerberos



.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








2















I can successfully connect and search to an Active Directory domain controller using ldapsearch. I am using the -x option, to specify a username/password authentication (password being specified by -W and username by -D).



I currently need to dump directory from a MIT-kerberos domain. Kerberos is the only protocol available for authentication. I can retrieve a kerberos TGT ticket with kinit. I am using these command lines:



ldapsearch -Y SASL -b "REALM.INC" -H ldap://kerberos_IP_address
-> ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-4): no mechanism available: No worthy mechs found

ldapsearch -o "mech=GSSAPI" ...
-> Invalid general option name: mech


How can I authenticate with kerberos using ldapsearch?



Many thanks for your help&replies










share|improve this question






















  • What happened when you do ldapsearch -H ldap://kerberos_IP_address -U administrator -s base -b "CN=Users,DC=domain,DC=com" -Y GSSAPI -s sub "(cn=*)" ? Does klist show valid tickets in cache ?

    – Abey
    Apr 20 '17 at 16:21

















2















I can successfully connect and search to an Active Directory domain controller using ldapsearch. I am using the -x option, to specify a username/password authentication (password being specified by -W and username by -D).



I currently need to dump directory from a MIT-kerberos domain. Kerberos is the only protocol available for authentication. I can retrieve a kerberos TGT ticket with kinit. I am using these command lines:



ldapsearch -Y SASL -b "REALM.INC" -H ldap://kerberos_IP_address
-> ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-4): no mechanism available: No worthy mechs found

ldapsearch -o "mech=GSSAPI" ...
-> Invalid general option name: mech


How can I authenticate with kerberos using ldapsearch?



Many thanks for your help&replies










share|improve this question






















  • What happened when you do ldapsearch -H ldap://kerberos_IP_address -U administrator -s base -b "CN=Users,DC=domain,DC=com" -Y GSSAPI -s sub "(cn=*)" ? Does klist show valid tickets in cache ?

    – Abey
    Apr 20 '17 at 16:21













2












2








2








I can successfully connect and search to an Active Directory domain controller using ldapsearch. I am using the -x option, to specify a username/password authentication (password being specified by -W and username by -D).



I currently need to dump directory from a MIT-kerberos domain. Kerberos is the only protocol available for authentication. I can retrieve a kerberos TGT ticket with kinit. I am using these command lines:



ldapsearch -Y SASL -b "REALM.INC" -H ldap://kerberos_IP_address
-> ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-4): no mechanism available: No worthy mechs found

ldapsearch -o "mech=GSSAPI" ...
-> Invalid general option name: mech


How can I authenticate with kerberos using ldapsearch?



Many thanks for your help&replies










share|improve this question














I can successfully connect and search to an Active Directory domain controller using ldapsearch. I am using the -x option, to specify a username/password authentication (password being specified by -W and username by -D).



I currently need to dump directory from a MIT-kerberos domain. Kerberos is the only protocol available for authentication. I can retrieve a kerberos TGT ticket with kinit. I am using these command lines:



ldapsearch -Y SASL -b "REALM.INC" -H ldap://kerberos_IP_address
-> ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-4): no mechanism available: No worthy mechs found

ldapsearch -o "mech=GSSAPI" ...
-> Invalid general option name: mech


How can I authenticate with kerberos using ldapsearch?



Many thanks for your help&replies







debian kerberos






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Apr 20 '17 at 9:46









philippephilippe

1,23022141




1,23022141












  • What happened when you do ldapsearch -H ldap://kerberos_IP_address -U administrator -s base -b "CN=Users,DC=domain,DC=com" -Y GSSAPI -s sub "(cn=*)" ? Does klist show valid tickets in cache ?

    – Abey
    Apr 20 '17 at 16:21

















  • What happened when you do ldapsearch -H ldap://kerberos_IP_address -U administrator -s base -b "CN=Users,DC=domain,DC=com" -Y GSSAPI -s sub "(cn=*)" ? Does klist show valid tickets in cache ?

    – Abey
    Apr 20 '17 at 16:21
















What happened when you do ldapsearch -H ldap://kerberos_IP_address -U administrator -s base -b "CN=Users,DC=domain,DC=com" -Y GSSAPI -s sub "(cn=*)" ? Does klist show valid tickets in cache ?

– Abey
Apr 20 '17 at 16:21





What happened when you do ldapsearch -H ldap://kerberos_IP_address -U administrator -s base -b "CN=Users,DC=domain,DC=com" -Y GSSAPI -s sub "(cn=*)" ? Does klist show valid tickets in cache ?

– Abey
Apr 20 '17 at 16:21










2 Answers
2






active

oldest

votes


















1














-Y is used to specify the SASL mechanism, which will probably be GSSAPI, though could be GSS-SPNEGO. Also, base dn must be in dn syntax (i.e., dc=example,dc=com), not domain syntax (example.com).



$ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.1/
dn:
supportedSASLMechanisms: GSSAPI

$ ldapsearch -Y GSSAPI -b dc=example,dc=com -H ldap://192.0.2.1/

$ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.2/
dn:
supportedSASLMechanisms: GSS-SPNEGO
supportedSASLMechanisms: GSSAPI





share|improve this answer
































    0














    depending on your ldapsearch & OS version, you can try to first authenticate to kerberos using kinit and "cache" your ticket, use it in a kerberos env variable, and then let ldapsearch use this variable, with something like this :



    kinit -c /tmp/<yourlogin>.cc.tmp <yourlogin>
    export KRB5CCNAME=/tmp/<yourlogin>.cc.tmp
    ldapsearch -Tx -h <host> -p <port> -Y GSSAPI -b "dc=example,dc=com" cn=*





    share|improve this answer























    • -T means something different to debian / OpenLDAP than it does to Solaris.

      – 84104
      Apr 20 '17 at 22:27











    • my commands run perfectly on a Linux RHEL 6.x, didn't try on debian tho, but it should work anyway assuming that the variable is set and the -Y is passed i suppose, thanks for the info btw

      – olivierg
      Apr 20 '17 at 22:35











    Your Answer








    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "2"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader:
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    ,
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













    draft saved

    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f845470%2fldapsearch-and-kerberos-authentication%23new-answer', 'question_page');

    );

    Post as a guest















    Required, but never shown

























    2 Answers
    2






    active

    oldest

    votes








    2 Answers
    2






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    1














    -Y is used to specify the SASL mechanism, which will probably be GSSAPI, though could be GSS-SPNEGO. Also, base dn must be in dn syntax (i.e., dc=example,dc=com), not domain syntax (example.com).



    $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.1/
    dn:
    supportedSASLMechanisms: GSSAPI

    $ ldapsearch -Y GSSAPI -b dc=example,dc=com -H ldap://192.0.2.1/

    $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.2/
    dn:
    supportedSASLMechanisms: GSS-SPNEGO
    supportedSASLMechanisms: GSSAPI





    share|improve this answer





























      1














      -Y is used to specify the SASL mechanism, which will probably be GSSAPI, though could be GSS-SPNEGO. Also, base dn must be in dn syntax (i.e., dc=example,dc=com), not domain syntax (example.com).



      $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.1/
      dn:
      supportedSASLMechanisms: GSSAPI

      $ ldapsearch -Y GSSAPI -b dc=example,dc=com -H ldap://192.0.2.1/

      $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.2/
      dn:
      supportedSASLMechanisms: GSS-SPNEGO
      supportedSASLMechanisms: GSSAPI





      share|improve this answer



























        1












        1








        1







        -Y is used to specify the SASL mechanism, which will probably be GSSAPI, though could be GSS-SPNEGO. Also, base dn must be in dn syntax (i.e., dc=example,dc=com), not domain syntax (example.com).



        $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.1/
        dn:
        supportedSASLMechanisms: GSSAPI

        $ ldapsearch -Y GSSAPI -b dc=example,dc=com -H ldap://192.0.2.1/

        $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.2/
        dn:
        supportedSASLMechanisms: GSS-SPNEGO
        supportedSASLMechanisms: GSSAPI





        share|improve this answer















        -Y is used to specify the SASL mechanism, which will probably be GSSAPI, though could be GSS-SPNEGO. Also, base dn must be in dn syntax (i.e., dc=example,dc=com), not domain syntax (example.com).



        $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.1/
        dn:
        supportedSASLMechanisms: GSSAPI

        $ ldapsearch -Y GSSAPI -b dc=example,dc=com -H ldap://192.0.2.1/

        $ ldapsearch -x -b '' -s base supportedSASLMechanisms -H ldap://192.0.2.2/
        dn:
        supportedSASLMechanisms: GSS-SPNEGO
        supportedSASLMechanisms: GSSAPI






        share|improve this answer














        share|improve this answer



        share|improve this answer








        edited Apr 5 at 16:45









        Jonathon Reinhart

        1561115




        1561115










        answered Apr 20 '17 at 21:17









        8410484104

        10.4k43168




        10.4k43168























            0














            depending on your ldapsearch & OS version, you can try to first authenticate to kerberos using kinit and "cache" your ticket, use it in a kerberos env variable, and then let ldapsearch use this variable, with something like this :



            kinit -c /tmp/<yourlogin>.cc.tmp <yourlogin>
            export KRB5CCNAME=/tmp/<yourlogin>.cc.tmp
            ldapsearch -Tx -h <host> -p <port> -Y GSSAPI -b "dc=example,dc=com" cn=*





            share|improve this answer























            • -T means something different to debian / OpenLDAP than it does to Solaris.

              – 84104
              Apr 20 '17 at 22:27











            • my commands run perfectly on a Linux RHEL 6.x, didn't try on debian tho, but it should work anyway assuming that the variable is set and the -Y is passed i suppose, thanks for the info btw

              – olivierg
              Apr 20 '17 at 22:35















            0














            depending on your ldapsearch & OS version, you can try to first authenticate to kerberos using kinit and "cache" your ticket, use it in a kerberos env variable, and then let ldapsearch use this variable, with something like this :



            kinit -c /tmp/<yourlogin>.cc.tmp <yourlogin>
            export KRB5CCNAME=/tmp/<yourlogin>.cc.tmp
            ldapsearch -Tx -h <host> -p <port> -Y GSSAPI -b "dc=example,dc=com" cn=*





            share|improve this answer























            • -T means something different to debian / OpenLDAP than it does to Solaris.

              – 84104
              Apr 20 '17 at 22:27











            • my commands run perfectly on a Linux RHEL 6.x, didn't try on debian tho, but it should work anyway assuming that the variable is set and the -Y is passed i suppose, thanks for the info btw

              – olivierg
              Apr 20 '17 at 22:35













            0












            0








            0







            depending on your ldapsearch & OS version, you can try to first authenticate to kerberos using kinit and "cache" your ticket, use it in a kerberos env variable, and then let ldapsearch use this variable, with something like this :



            kinit -c /tmp/<yourlogin>.cc.tmp <yourlogin>
            export KRB5CCNAME=/tmp/<yourlogin>.cc.tmp
            ldapsearch -Tx -h <host> -p <port> -Y GSSAPI -b "dc=example,dc=com" cn=*





            share|improve this answer













            depending on your ldapsearch & OS version, you can try to first authenticate to kerberos using kinit and "cache" your ticket, use it in a kerberos env variable, and then let ldapsearch use this variable, with something like this :



            kinit -c /tmp/<yourlogin>.cc.tmp <yourlogin>
            export KRB5CCNAME=/tmp/<yourlogin>.cc.tmp
            ldapsearch -Tx -h <host> -p <port> -Y GSSAPI -b "dc=example,dc=com" cn=*






            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered Apr 20 '17 at 22:10









            oliviergolivierg

            382314




            382314












            • -T means something different to debian / OpenLDAP than it does to Solaris.

              – 84104
              Apr 20 '17 at 22:27











            • my commands run perfectly on a Linux RHEL 6.x, didn't try on debian tho, but it should work anyway assuming that the variable is set and the -Y is passed i suppose, thanks for the info btw

              – olivierg
              Apr 20 '17 at 22:35

















            • -T means something different to debian / OpenLDAP than it does to Solaris.

              – 84104
              Apr 20 '17 at 22:27











            • my commands run perfectly on a Linux RHEL 6.x, didn't try on debian tho, but it should work anyway assuming that the variable is set and the -Y is passed i suppose, thanks for the info btw

              – olivierg
              Apr 20 '17 at 22:35
















            -T means something different to debian / OpenLDAP than it does to Solaris.

            – 84104
            Apr 20 '17 at 22:27





            -T means something different to debian / OpenLDAP than it does to Solaris.

            – 84104
            Apr 20 '17 at 22:27













            my commands run perfectly on a Linux RHEL 6.x, didn't try on debian tho, but it should work anyway assuming that the variable is set and the -Y is passed i suppose, thanks for the info btw

            – olivierg
            Apr 20 '17 at 22:35





            my commands run perfectly on a Linux RHEL 6.x, didn't try on debian tho, but it should work anyway assuming that the variable is set and the -Y is passed i suppose, thanks for the info btw

            – olivierg
            Apr 20 '17 at 22:35

















            draft saved

            draft discarded
















































            Thanks for contributing an answer to Server Fault!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid


            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.

            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f845470%2fldapsearch-and-kerberos-authentication%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

            Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

            What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company