• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

LDAP authentication; some users work, some don't

Scheduled Pinned Locked Moved OpenVPN
13 Posts 2 Posters 2.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    Joschide
    last edited by Sep 28, 2015, 6:43 PM

    I'm having a strange issue where some users authenticate to a security group while others don't.

    Running SBS 2008
    pfSense 2.2.4-Release (amd64)

    I currently have all users authenticating which is not what I want.  However, If I add the extended query memberOf=CN=Mobile Users,OU=Security Groups,OU=MyBusiness,DC=mydomain,DC=local.  Only some of the accounts authenticate properly.

    I created a test user and added them to the security group.  At first it would not authenticate to the group, but later it did.

    I cannot re-create this success with existing users.

    Any thoughts?  Does pfSense or openVPN cache authentication or LDAP? Is there a password policy that would fail authentication?

    I don't see my diagnostic authentication requests in any logs.  So, I'm not seeing where my issue is.

    1 Reply Last reply Reply Quote 0
    • J
      Joschide
      last edited by Sep 28, 2015, 7:05 PM

      So far what seems to work on test accounts is add all groups a working user has, wait a little while and they will authenticate properly.  I can remove the other groups after that and they still authenticate.

      1 Reply Last reply Reply Quote 0
      • J
        Joschide
        last edited by Sep 28, 2015, 8:00 PM

        Is the Diagnostic authentication page caching results?  going to reboot the firewall after hours and hope for the best.  Existing users don't seem to get security group updates very well.

        1 Reply Last reply Reply Quote 0
        • J
          jimp Rebel Alliance Developer Netgate
          last edited by Sep 28, 2015, 8:52 PM

          If you are using plain TCP for LDAP, running a packet capture of the LDAP query and looking at it in wireshark will tell you all you need to know.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • J
            Joschide
            last edited by Sep 29, 2015, 11:33 AM

            @jimp:

            If you are using plain TCP for LDAP, running a packet capture of the LDAP query and looking at it in wireshark will tell you all you need to know.

            Using UDP.

            1 Reply Last reply Reply Quote 0
            • J
              jimp Rebel Alliance Developer Netgate
              last edited by Sep 29, 2015, 11:42 AM

              For pfSense auth it's either plain TCP or SSL (still TCP). There is no option for LDAP to run UDP. The selector in the auth server settings only has two choices, TCP on port 389, or SSL on port 636.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • J
                Joschide
                last edited by Sep 29, 2015, 11:55 AM

                @jimp:

                For pfSense auth it's either plain TCP or SSL (still TCP). There is no option for LDAP to run UDP. The selector in the auth server settings only has two choices, TCP on port 389, or SSL on port 636.

                My mistake, I was looking at the protocol value on the openVPN config page.  Yes I'm using TCP 389.  I'm reviewing the capture in wireshark now.

                1 Reply Last reply Reply Quote 0
                • J
                  Joschide
                  last edited by Sep 29, 2015, 1:15 PM

                  From the packet capture viewed in wireshark, I do see this error after searchRequest "<root>" wholeSubtree.

                  LDAP 176 searchResDone(2) noSuchObject (0000208D: NameErr: DSID-031001A8, problem 2001 (NO_OBJECT), data 0, best match of:
                  ''
                  )  [0 results]

                  Does this just mean, user not found in the root DN?</root>

                  1 Reply Last reply Reply Quote 0
                  • J
                    jimp Rebel Alliance Developer Netgate
                    last edited by Sep 29, 2015, 1:32 PM

                    If that was the server responding, that would appear to be the case.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • J
                      Joschide
                      last edited by Sep 29, 2015, 2:19 PM

                      @jimp:

                      If that was the server responding, that would appear to be the case.

                      I would agree, but there are successful sendRequests that follow.

                      Got a bit further now:

                      When I originally configured LDAP authentication, I used http://www.geeklk.com/2014/03/pfsense-configuring-windows-active-directory-authentication/ as a guide.

                      I created an OU and user in AD just like the guide.

                      As a test, I changed the bind credentials in LDAP server to an existing user in AD and now the extended query is working correctly.

                      1 Reply Last reply Reply Quote 0
                      • J
                        Joschide
                        last edited by Sep 29, 2015, 3:34 PM

                        It appears the pfsense user has to be a member of Domain admins or Administrators for it to work properly.  Does this have something to do with how SBS Domains are configured?

                        I don't really want to have that user part of such a high level security group, but I'm unable to get it working correctly otherwise.

                        1 Reply Last reply Reply Quote 0
                        • J
                          jimp Rebel Alliance Developer Netgate
                          last edited by Sep 29, 2015, 3:36 PM

                          That's entirely up to the Windows box and what it allows with Anonymous binds vs binds with a service account.  You might be able to find some other info on the net about that unrelated to pfSense (since it's a general Windows LDAP issue, not a pfSense issue)

                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 0
                          • J
                            Joschide
                            last edited by Sep 29, 2015, 3:57 PM

                            @jimp:

                            That's entirely up to the Windows box and what it allows with Anonymous binds vs binds with a service account.  You might be able to find some other info on the net about that unrelated to pfSense (since it's a general Windows LDAP issue, not a pfSense issue)

                            I agree this has to do with my own server configuration and nothing to do with pfsense LDAP implementation.

                            Thank you for your responses.

                            1 Reply Last reply Reply Quote 0
                            1 out of 13
                            • First post
                              1/13
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                              This community forum collects and processes your personal information.
                              consent.not_received