<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent posts to WEBMIN LDAP authentication: passwd returns "Authentication token manipulation error"</title><link>https://sourceforge.net/p/webadmin/discussion/55378/thread/ef1aaab62d/</link><description>Recent posts to WEBMIN LDAP authentication: passwd returns "Authentication token manipulation error"</description><atom:link href="https://sourceforge.net/p/webadmin/discussion/55378/thread/ef1aaab62d/feed.rss" rel="self"/><language>en</language><lastBuildDate>Wed, 08 Feb 2023 15:18:02 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/webadmin/discussion/55378/thread/ef1aaab62d/feed.rss" rel="self" type="application/rss+xml"/><item><title>WEBMIN LDAP authentication: passwd returns "Authentication token manipulation error"</title><link>https://sourceforge.net/p/webadmin/discussion/55378/thread/ef1aaab62d/?limit=25#1a61</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Incase anyone runs into the same problem I resolved this by install the following module and updating my webmin pam configuration.yum install perl-Authen-PAM&lt;/p&gt;
&lt;p&gt;auth       required     pam_env.so&lt;br/&gt;
auth       sufficient   pam_unix.so likeauth nullok&lt;br/&gt;
auth       sufficient   pam_ldap.so use_first_pass&lt;br/&gt;
auth       required     pam_deny.so&lt;/p&gt;
&lt;p&gt;account    sufficient   pam_unix.so&lt;br/&gt;
account    sufficient   pam_ldap.so&lt;br/&gt;
account    required     pam_ldap.so&lt;/p&gt;
&lt;p&gt;password   required     pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2 retry=3&lt;br/&gt;
password   sufficient   pam_unix.so nullok md5 shadow use_authtok&lt;br/&gt;
password   sufficient   pam_ldap.so use_first_pass&lt;br/&gt;
password   required     pam_deny.so&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">raul</dc:creator><pubDate>Wed, 08 Feb 2023 15:18:02 -0000</pubDate><guid>https://sourceforge.neted47b0e9c226a91469efac83c4ab14754bca06e2</guid></item><item><title>WEBMIN LDAP authentication: passwd returns "Authentication token manipulation error"</title><link>https://sourceforge.net/p/webadmin/discussion/55378/thread/ef1aaab62d/?limit=25#1fb8</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Update:jan 25 2023&lt;br/&gt;
I believe I have sssd and nslcd working properly I also adjusted the pam modules in webmin. I also added db to nsswitch.conf so I checks there first. As of right now I can use things like ldapsearch -x -D cn=bindadmin,ou=People,dc=xxx,dc=com -W to query my db full of user succesfully I can also passwd $USER succesfully and log in with the new password using su -l $USER the only remaining problem I'm having is allowing the user to log into webmin I was hoping since the client is working and passwd changing works it would allow me to log in but when I attempt to change the converted webmin users acl for webmin log in I get the following error in /var/webmin/miniserv.error and this seems to be the only log error msg I get which is preventing my webmin users from logging in. Any thoughts?&lt;/p&gt;
&lt;p&gt;Argument "" isn't numeric in numeric ne (!=) at /usr/libexec/webmin/acl/save_unix.cgi line 80.&lt;br/&gt;
&lt;span&gt;[25/Jan/2023:11:01:59 -0500]&lt;/span&gt; Reloading configuration&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">raul</dc:creator><pubDate>Wed, 25 Jan 2023 16:11:56 -0000</pubDate><guid>https://sourceforge.net565de20579a1a84e803f80f7a1f0f0eb6e83f4bb</guid></item><item><title>WEBMIN LDAP authentication: passwd returns "Authentication token manipulation error"</title><link>https://sourceforge.net/p/webadmin/discussion/55378/thread/ef1aaab62d/?limit=25#f254</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Update:jan 25 2023&lt;br/&gt;
I believe I have sssd and nslcd working properly I also adjusted the pam modules in webmin. I also added db to nsswitch.conf so I checks there first. As of right now I can use things like ldapsearch -x -D cn=bindadmin,ou=People,dc=xxx,dc=com -W to query my db full of user succesfully I can also passwd $USER succesfully and log in with the new password using su -l $USER the only remaining problem I'm having is allowing the user to log into webmin I was hoping since the client is working and passwd changing works it would allow me to log in but when I attempt to change the converted webmin users acl for webmin log in I get the following error in /var/webmin/miniserv.error and this seems to be the only log error msg I get which is preventing my webmin users from logging in. Any thoughts?&lt;/p&gt;
&lt;p&gt;Argument "" isn't numeric in numeric ne (!=) at /usr/libexec/webmin/acl/save_unix.cgi line 80.&lt;br/&gt;
&lt;span&gt;[25/Jan/2023:11:01:59 -0500]&lt;/span&gt; Reloading configuration&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">raul</dc:creator><pubDate>Wed, 25 Jan 2023 16:11:49 -0000</pubDate><guid>https://sourceforge.net011146b1828d1cd95e164d70682202a1db4b8859</guid></item><item><title>WEBMIN LDAP authentication: passwd returns "Authentication token manipulation error"</title><link>https://sourceforge.net/p/webadmin/discussion/55378/thread/ef1aaab62d/?limit=25#d71a</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;I'm trying to setup ldap authentication for unix users to log in and I'm getting the token error. I have ldap users and groups working and I've converted all the unix users to webmin users but I cant get the users to log in or change password with passwd. I configured and enabled sssd.conf but I believe the issue may have to do with PAM files which I have limited experience with any help would be appreciated I'll add a few of the PAM configs along with the sssd.conf below. Let me know if you need anything else to help trouble shoot this thank you.&lt;/p&gt;
&lt;p&gt;I also cant use anything like ldapmodify or ldapsearch which is because of a misconfigured ldap-client not reaching the server I presume? When I configure ldap-client on webmin with the nslcd.conf file and I use the validate button it returns the following but it doesnt give me the option to run/start the client as it had prior now it only gives me the validate configuration option and both start ldap-client alongside could this be why its not connecting properly?&lt;/p&gt;
&lt;p&gt;error msg when I try ldap search&lt;br/&gt;
SASL/GSS-SPNEGO authentication started&lt;br/&gt;
ldap_sasl_interactive_bind_s: Local error (-2)&lt;br/&gt;
additional info: SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (SPNEGO cannot find mechanisms to negotiate)&lt;/p&gt;
&lt;p&gt;Finding LDAP base for users ..&lt;br/&gt;
.. found base dc=xxxx,dc=com.&lt;br/&gt;
Connecting to LDAP server ..&lt;br/&gt;
.. connected to ldap-primary.ue1.-prod.com&lt;/p&gt;
&lt;p&gt;Searching for users ..&lt;br/&gt;
.. found 507 users.&lt;/p&gt;
&lt;p&gt;Checking Unix users service ..&lt;br/&gt;
.. service is setup to query LDAP.&lt;/p&gt;
&lt;p&gt;Looking for Unix user bjones ..&lt;br/&gt;
.. user found successfully.&lt;/p&gt;
&lt;p&gt;Your system has been successfully configured as an LDAP client!&lt;/p&gt;
&lt;p&gt;Expectations:&lt;br/&gt;
LDAP users and groups functionality working &lt;span&gt;[complete]&lt;/span&gt;&lt;br/&gt;
converted unix webmin users log in functionality working &lt;span&gt;[not working]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The following commands works&lt;br/&gt;
id tuser&lt;br/&gt;
uid=6469(tuser) gid=6250(gwtest) groups=6250(gwtest),9003(git),9001(softeng)&lt;/p&gt;
&lt;p&gt;getent passwd tuser&lt;br/&gt;
tuser:*:6469:6250:test user:/home/tuser:/bin/bash&lt;/p&gt;
&lt;p&gt;log msg when I try "passwd tuser"&lt;br/&gt;
passwd: pam_unix(passwd:chauthtok): user "tuser" does not exist in /etc/passwd&lt;br/&gt;
passwd: pam_sss(passwd:chauthtok): Authentication failed for user tuser: 4 (System error)&lt;/p&gt;
&lt;p&gt;log msg when converted webmin users attempts to log in&lt;br/&gt;
pam_unix(webmin:auth): authentication failure; logname= uid=0 euid=0 tty=10000 ruser= rhost=xxx user=xxx&lt;br/&gt;
webmin&lt;span&gt;[8072]&lt;/span&gt;: Invalid login as xxxx from xxxx&lt;/p&gt;
&lt;p&gt;passwdauth:&lt;/p&gt;
&lt;h1 id="pam-10"&gt;%PAM-1.0&lt;/h1&gt;
&lt;h1 id="this-file-is-auto-generated"&gt;This file is auto-generated.&lt;/h1&gt;
&lt;h1 id="user-changes-will-be-destroyed-the-next-time-authconfig-is-run"&gt;User changes will be destroyed the next time authconfig is run.&lt;/h1&gt;
&lt;p&gt;auth required pam_env.so&lt;br/&gt;
auth required pam_faildelay.so delay=2000000&lt;br/&gt;
auth &lt;span&gt;[default=1 ignore=ignore success=ok]&lt;/span&gt; pam_succeed_if.so uid &amp;gt;= 1000 quiet&lt;br/&gt;
auth &lt;span&gt;[default=1 ignore=ignore success=ok]&lt;/span&gt; pam_localuser.so&lt;br/&gt;
auth sufficient pam_unix.so nullok try_first_pass&lt;br/&gt;
auth requisite pam_succeed_if.so uid &amp;gt;= 1000 quiet_success&lt;br/&gt;
auth sufficient pam_sss.so forward_pass&lt;br/&gt;
auth required pam_deny.so&lt;/p&gt;
&lt;p&gt;account required pam_unix.so broken_shadow&lt;br/&gt;
account sufficient pam_localuser.so&lt;br/&gt;
account sufficient pam_succeed_if.so uid &amp;lt; 1000 quiet&lt;br/&gt;
account &lt;span&gt;[default=bad success=ok user_unknown=ignore]&lt;/span&gt; pam_sss.so&lt;br/&gt;
account required pam_permit.so&lt;/p&gt;
&lt;p&gt;password requisite pam_pwquality.so try_first_pass local_users_only retry=3&lt;br/&gt;
password sufficient pam_unix.so sha512 shadow nullok try_first_pass&lt;br/&gt;
password sufficient pam_sss.so&lt;/p&gt;
&lt;p&gt;password required pam_deny.so&lt;/p&gt;
&lt;p&gt;session optional pam_keyinit.so revoke&lt;br/&gt;
session required pam_limits.so&lt;br/&gt;
-session optional pam_systemd.so&lt;br/&gt;
session optional pam_mkhomedir.so umask=0077&lt;br/&gt;
session &lt;span&gt;[success=1 default=ignore]&lt;/span&gt; pam_succeed_if.so service in crond quiet use_uid&lt;br/&gt;
session required pam_unix.so&lt;br/&gt;
session optional pam_sss.so&lt;/p&gt;
&lt;p&gt;passwd&lt;/p&gt;
&lt;h1 id="pam-10_1"&gt;%PAM-1.0&lt;/h1&gt;
&lt;p&gt;auth include system-auth&lt;br/&gt;
account include system-auth&lt;br/&gt;
password substack system-auth&lt;br/&gt;
-password optional pam_gnome_keyring.so&lt;br/&gt;
password substack postlogin&lt;/p&gt;
&lt;p&gt;webmin&lt;/p&gt;
&lt;h1 id="pam-10_2"&gt;%PAM-1.0&lt;/h1&gt;
&lt;p&gt;auth sufficient pam_ldap.so&lt;br/&gt;
auth required pam_unix.so nullok&lt;br/&gt;
account sufficient pam_ldap.so&lt;br/&gt;
account required pam_unix.so&lt;br/&gt;
session sufficient pam_ldap.so&lt;br/&gt;
session required pam_unix.so&lt;/p&gt;
&lt;p&gt;system-auth&lt;/p&gt;
&lt;h1 id="pam-10_3"&gt;%PAM-1.0&lt;/h1&gt;
&lt;h1 id="this-file-is-auto-generated_1"&gt;This file is auto-generated.&lt;/h1&gt;
&lt;h1 id="user-changes-will-be-destroyed-the-next-time-authconfig-is-run_1"&gt;User changes will be destroyed the next time authconfig is run.&lt;/h1&gt;
&lt;p&gt;auth required pam_env.so&lt;br/&gt;
auth required pam_faildelay.so delay=2000000&lt;br/&gt;
auth &lt;span&gt;[default=1 ignore=ignore success=ok]&lt;/span&gt; pam_succeed_if.so uid &amp;gt;= 1000 quiet&lt;br/&gt;
auth &lt;span&gt;[default=1 ignore=ignore success=ok]&lt;/span&gt; pam_localuser.so&lt;br/&gt;
auth sufficient pam_unix.so nullok try_first_pass&lt;br/&gt;
auth requisite pam_succeed_if.so uid &amp;gt;= 1000 quiet_success&lt;br/&gt;
auth sufficient pam_sss.so forward_pass&lt;br/&gt;
auth required pam_deny.so&lt;/p&gt;
&lt;p&gt;account required pam_unix.so&lt;br/&gt;
account sufficient pam_localuser.so&lt;br/&gt;
account sufficient pam_succeed_if.so uid &amp;lt; 1000 quiet&lt;br/&gt;
account &lt;span&gt;[default=bad success=ok user_unknown=ignore]&lt;/span&gt; pam_sss.so&lt;br/&gt;
account required pam_permit.so&lt;/p&gt;
&lt;p&gt;password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=&lt;br/&gt;
password sufficient pam_unix.so sha512 shadow nullok try_first_pass use_authtok&lt;br/&gt;
password sufficient pam_sss.so use_authtok&lt;br/&gt;
password required pam_deny.so&lt;/p&gt;
&lt;p&gt;session optional pam_keyinit.so revoke&lt;br/&gt;
session required pam_limits.so&lt;br/&gt;
-session optional pam_systemd.so&lt;br/&gt;
session optional pam_mkhomedir.so umask=0077&lt;br/&gt;
session &lt;span&gt;[success=1 default=ignore]&lt;/span&gt; pam_succeed_if.so service in crond quiet use_uid&lt;br/&gt;
session required pam_unix.so&lt;br/&gt;
session optional pam_sss.so&lt;/p&gt;
&lt;p&gt;sssd.conf&lt;br/&gt;
&lt;span&gt;[sssd]&lt;/span&gt;&lt;br/&gt;
config_file_version = 2&lt;br/&gt;
services = nss, pam, ssh&lt;br/&gt;
reconnection_retries = 3&lt;br/&gt;
domains = xxxx&lt;/p&gt;
&lt;p&gt;&lt;span&gt;[nss]&lt;/span&gt;&lt;br/&gt;
filter_groups = root&lt;br/&gt;
filter_users = root,named,nscd&lt;/p&gt;
&lt;p&gt;[&lt;/p&gt;
&lt;p&gt;&lt;span&gt;[domain/xxx]&lt;/span&gt;&lt;br/&gt;
access_provider = ldap&lt;br/&gt;
auth_provider = ldap&lt;br/&gt;
cache_credentials = true&lt;br/&gt;
chpass_provider = none&lt;br/&gt;
debug_level = 3&lt;br/&gt;
entry_cache_timeout = 300&lt;br/&gt;
enum_cache_timeout = 300&lt;br/&gt;
enumerate = true&lt;br/&gt;
id_provider = ldap&lt;br/&gt;
ldap_access_order = expire&lt;br/&gt;
ldap_account_expire_policy = shadow&lt;br/&gt;
ldap_default_authtok_type = password&lt;br/&gt;
ldap_default_authtok = xxxx&lt;/p&gt;
&lt;p&gt;ldap_default_bind_dn = cn=bindadmin-sssd,ou=People,dc=xxxx,dc=com&lt;br/&gt;
ldap_enumeration_refresh_timeout = 300&lt;br/&gt;
ldap_group_member = memberUid&lt;br/&gt;
ldap_group_name = cn&lt;br/&gt;
ldap_group_object_class = posixGroup&lt;br/&gt;
ldap_group_search_base = ou=Groups,dc=xxxx,dc=com&lt;br/&gt;
ldap_id_use_start_tls = false&lt;br/&gt;
ldap_network_timeout = 3&lt;br/&gt;
ldap_pwd_policy = shadow&lt;br/&gt;
ldap_schema = rfc2307&lt;br/&gt;
ldap_search_base = dc=xxx,dc=com&lt;br/&gt;
ldap_tls_cacertdir = /etc/openldap/cacerts&lt;br/&gt;
ldap_tls_reqcert = never&lt;br/&gt;
ldap_uri = ldaps://ldap-01.ue1-prod.com&lt;br/&gt;
ldap_user_name = uid&lt;br/&gt;
ldap_user_object_class = posixAccount&lt;br/&gt;
ldap_user_search_base = ou=People,dc=xxxx,dc=com&lt;br/&gt;
ldap_user_shadow_expire = shadowExpire&lt;br/&gt;
shell_fallback = /bin/bash&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">raul mendes</dc:creator><pubDate>Fri, 13 Jan 2023 19:33:52 -0000</pubDate><guid>https://sourceforge.net90d341df46b592702819d6297f0cfc3647711ebb</guid></item></channel></rss>