Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    LDAP authentication; some users work, some don't

    Scheduled Pinned Locked Moved OpenVPN
    13 Posts 2 Posters 2.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      If you are using plain TCP for LDAP, running a packet capture of the LDAP query and looking at it in wireshark will tell you all you need to know.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • J
        Joschide
        last edited by

        @jimp:

        If you are using plain TCP for LDAP, running a packet capture of the LDAP query and looking at it in wireshark will tell you all you need to know.

        Using UDP.

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          For pfSense auth it's either plain TCP or SSL (still TCP). There is no option for LDAP to run UDP. The selector in the auth server settings only has two choices, TCP on port 389, or SSL on port 636.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • J
            Joschide
            last edited by

            @jimp:

            For pfSense auth it's either plain TCP or SSL (still TCP). There is no option for LDAP to run UDP. The selector in the auth server settings only has two choices, TCP on port 389, or SSL on port 636.

            My mistake, I was looking at the protocol value on the openVPN config page.  Yes I'm using TCP 389.  I'm reviewing the capture in wireshark now.

            1 Reply Last reply Reply Quote 0
            • J
              Joschide
              last edited by

              From the packet capture viewed in wireshark, I do see this error after searchRequest "<root>" wholeSubtree.

              LDAP 176 searchResDone(2) noSuchObject (0000208D: NameErr: DSID-031001A8, problem 2001 (NO_OBJECT), data 0, best match of:
              ''
              )  [0 results]

              Does this just mean, user not found in the root DN?</root>

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                If that was the server responding, that would appear to be the case.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • J
                  Joschide
                  last edited by

                  @jimp:

                  If that was the server responding, that would appear to be the case.

                  I would agree, but there are successful sendRequests that follow.

                  Got a bit further now:

                  When I originally configured LDAP authentication, I used http://www.geeklk.com/2014/03/pfsense-configuring-windows-active-directory-authentication/ as a guide.

                  I created an OU and user in AD just like the guide.

                  As a test, I changed the bind credentials in LDAP server to an existing user in AD and now the extended query is working correctly.

                  1 Reply Last reply Reply Quote 0
                  • J
                    Joschide
                    last edited by

                    It appears the pfsense user has to be a member of Domain admins or Administrators for it to work properly.  Does this have something to do with how SBS Domains are configured?

                    I don't really want to have that user part of such a high level security group, but I'm unable to get it working correctly otherwise.

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      That's entirely up to the Windows box and what it allows with Anonymous binds vs binds with a service account.  You might be able to find some other info on the net about that unrelated to pfSense (since it's a general Windows LDAP issue, not a pfSense issue)

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • J
                        Joschide
                        last edited by

                        @jimp:

                        That's entirely up to the Windows box and what it allows with Anonymous binds vs binds with a service account.  You might be able to find some other info on the net about that unrelated to pfSense (since it's a general Windows LDAP issue, not a pfSense issue)

                        I agree this has to do with my own server configuration and nothing to do with pfsense LDAP implementation.

                        Thank you for your responses.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.