May 162013

I recently ran into an issue configuring HTTP Basic authentication against Active Directory using Apache httpd.  What was happening was that I’d get a 500 Internal Server Error page every time I hit a location that required Basic authentication.  There wasn’t anything useful in the logs, and I started playing around with the configuration (which, I must point out, was correct in a way).  After about two hours of trial I finally figured out the problem — there appears to be some sort of bug either in the OpenLDAP libraries, Apache httpd, or Active Directory itself, when Apache was trying to connect to AD via LDAP.  I found this only appeared when I had my search base configured to be the top-level DN of my Active Directory.  Changing the search base to an OU lower also resolved the problem, but I couldn’t do that because I have users across several OU’s off the top of the DIT.  The solution I came up with was to connect to port 3268, the Global Catalog, rather than the normal port of 389.

Here’s my mod_authnz_ldap configuration settings:

Hope that helps!

Jul 182012

It’s been a while since I left you with my last pearl of wisdom.  A couple months ago, I presented a couple methods for authenticating to Active Directory using winbind and for authenticating using the LDAP interface.  In more recent versions of CentOS and RHEL, there is a new method for retriving user information and authenticating – SSS, the System Security Service, which runs as sssd.  SSS was devised by Red Hat as a replacement for the various nss and PAM modules and it seems like they did a halfway decent job with it.

SSS acts as a replacement for the various PADL, Samba winbind, and other ldap and AD based pam and nss modules.  In addition to consolidating several nss and authentication types, there are a couple other advantages, including one unified configuration file and offline authentication, as well as access control.

Continue reading »

Mar 242012

I’ve posted some new packages for php 5.4 in the TechRockDo yum repository.  I originally had uploaded some under the php package name.  To avoid confusion with doing an update from 5.3 straight to 5.4, I’ve since renamed them as php54.  The original packages can be found under the deprecated tree of the repository.

Repoview packages for the various RHEL versions and architectures are listed below:

If you want to install and use these packages, just run

Feb 222012

I’ve built and uploaded several new packages and uploaded them to the TechRockDo Yum Repository.    In case you missed the previous post, you can use the TechRockDo Yum Repository by issuing the following command (use the correct one based on your version of RHEL/Cent and your system architecture):


The following packages have been added: Continue reading »

Jan 182012

The TechRockDo yum repository has been created as a place to hold all rpm’s that I roll and use.  I’m making them available to the public; I hope you find everything you find here useful.  For now, only CentOS and RHEL 6 are supported.  There are channels for both 32- and 64-bit architectures.  To use the repository, just install the trd-release package for your architecture:

This will install the yum repository definition and the GPG key.  After that, you’ll be able to use the repository just like any other.


Sep 212011

For the past few weeks, I’ve been spinning my wheels trying to get CentOS 6 to use Active Directory (Windows 2008 R2-based) for user information and authentication. I currently am using LDAP for these purposes, but in the interest of moving towards a more centralized environment am working towards having all of the UNIX and Linux hosts use AD as a central repository for user information and authentication. This is can be done relatively easily and can be done a couple of different ways that I will outline for you here.

Continue reading »