Replies: 6 comments 4 replies
-
Please raise the log level to debug and post what errors you get. At a glance a few things that can cause issues:
For authorization you may want to use another service than direct LDAP queries anyway. For authorization apache does not provide a good way to directly query the nsswitch service, but a good workaround sometimes is to simply have a cron job that does something like: Of course you can also avoid SSSD/Winbind entirely and just produce a group file using a cron job and a script that periodically connects to LDAP, runs a search and dumps in a file the list of users in the group you care for (a bit of parsing would be need so using a scripting language for this operation would be needed) and remember that the user will be provide by its principal name in this case so something like [email protected] and that is what apache will query. |
Beta Was this translation helpful? Give feedback.
-
Thanks for responding. I will turn up debugging on the server and do more testing.
In case I wasn't clear, I only included the details about LDAP to make it clear that the Proxy setup is working fine with
And that the
This makes me think there is something specific about
Yes, we use Thanks! |
Beta Was this translation helpful? Give feedback.
-
Ok, I've been working on this for several hours now. I've reviewed the Apache logs with I've stripped my GSSAPI configuration down to just the following:
This is the extent of what's in the Apache error_log when I try and make a connection using
If I remove the GSSAPI directives for my Apache config so its just
The Apache error log is identical, except for the last line about
What's weird is, if I go through a process of destroying and re-creating the ticket on the client, everything starts working with GSSAPI. For example, on the Windows 10/11 system, if I have a browser (Any of Chrome, Edge or Firefox) reporting the I have had the same thing happen with the RHEL9 workstations, but I haven't quite figured out the pattern of So, any idea's on what I should be looking at or any other debugging suggestions? Thanks! |
Beta Was this translation helpful? Give feedback.
-
I use ProxyPass and ProxyPassReverse in various places to proxy to a "local" service in order exactly to add GSSAPI auth on top, and everything "seem" to be working fine. In those logs I see nothing from mod_auth_gssapi, seem like errors are raised from the Proxy itself? I see you do not use sessions in the latest examples, so that will cause each request to go thorough multiple roundtrips receiving a 401 to start negotiation and then resolving it, but this should enver result in a 400 error. I wonder if there is an issue setting up HTTP causing a downgrade to older HTTP level that does not allow to maintain a connection open. Perhaps you should try to capture the traffic between the browser and the server (you can do that with Firefox developer tools for example), and see what differences (besides the SPNEGO negotiation part) you see. It is also not clear to me what is returning the 400 error, can you see that in the access_log ? |
Beta Was this translation helpful? Give feedback.
-
We also use
But otherwise the
Yes, I was trying to remove as many confounding factors as possible and make the configuration as simple as I can, until I can get something that works. Once I have something that works, I can start reapplying settings and test each step.
This is what is in the Apache
Yeah, that was going to be my next step, to see if I can see anything about the difference between the two. |
Beta Was this translation helpful? Give feedback.
-
With Red Hat's assistance, I found a resolution to this issue, so I am updating for anyone else who comes across a similar problem. This issue can otherwise be closed. Using network tracking tools and increased log levels in Apache, Red Hat and I determined the issue was Since there is no reason to pass the
Thanks for all those who responded to my request and hopefully the above will save someone else the headache I went through. |
Beta Was this translation helpful? Give feedback.
-
Hello. I am having an issue configuring mod_auth_gssapi with a Proxy to a remote host and I am hoping there is something simple on my side I am missing. If this is not the best place to ask, then please let me were I should submit my question. Thanks.
I am using Red Hat Enterprise Linux 9 w/ Apache 2.4.57 and mod_auth_gssapi 1.6.3-7. My RHEL9 system is joined to our Active Directory. mod_auth_gssapi works fine for web pages (HTML and PHP) and other resources hosted directly on the Apache Server, but I can not get the configuration correct when Proxying through Apache to a remote system.
I have a web camera on a private network attached to my Apache host. I want to proxy the live stream of the camera feed through my Apache server on the public interface, but limit who can see the live stream based on group membership. A simple proxy itself is working fine using the following:
I have also set it up using BasicAuth with LDAP Authentication through our Active Directory Server with no problem:
However, when I try and throw mod_auth_gssapi into the mix in place of LDAP username/password authentication, I get the following error in the web browser:
My GSSAPI setup in Apache is
I use the above GSSAPI configuration on the same Apache server for other
<Location>
and<Directory>
directives without any issues and mod_auth_gssapi works as expected there (so it's not an issue with verifying the KRB5 ticket with the domain controller).There is nothing in the Apache logs that points to what the problem is.
Since a simple proxy works, Proxy w/BasicAuth (using LDAP) works, but Proxy w/mod_auth_gssapi doesn't, it seems like there is something about the GSSAPI setup that is causing the problem, but I've read through all the documentation on this site, searched the web and tried all the combinations of
Gssapi*
settings I thought might impact my setup, with no luck.Thanks!
Beta Was this translation helpful? Give feedback.
All reactions