On Sat, 2014-07-05 at 15:40 -0700, Peter Mairhofer wrote:
> Irregularly, I find very strange, non-normal and possibly
> security-problem indicating messages in my syslog, e.g.:
> 
> nslcd[3338]: [16ec34] <passwd="pam_unix(sshd:auth"> request denied by 
> validnames option

The "request denied by validnames option" message indicates that some
process has requested information on a username that has a name that
should not be valid in the first place.

These messages do not necessarily point to a security issue (certainly
not in nslcd) and can be seen during normal operation.

From the posted log messages it seems that some log parsing function is
checking to see if certain parts of a log message refer to a known
username (I remember seeing that before, even recursively triggering
lookups on nslcd log messages).

If you run nslcd in debug mode (start nslcd with -d) you should be able
to find out which process performs these requests.

> nslcd[26547]: [180b0b] <passwd="peter"> ldap_search_ext() failed: Can't 
> contact LDAP server: Broken pipe
> nslcd[26547]: [180b0b] <passwd="peter"> no available LDAP server found, 
> sleeping 1 seconds
> 
> nslcd[26547]: [3dd3e8] <passwd="mark"> ldap_result() failed: Can't contact 
> LDAP server
> nslcd[26547]: [3dd3e8] <passwd="mark"> ldap_abandon() failed to abandon 
> search: Can't contact LDAP server: Transport endpoint is not connected
> nslcd[26547]: [c91298] <service="smtp"/tcp> ldap_result() failed: Can't 
> contact LDAP server
> 
> nslcd[26547]: [584bcb] <group/member="mark"> ldap_search_ext() failed: Can't 
> contact LDAP server: Broken pipe
> nslcd[26547]: [584bcb] <group/member="mark"> no available LDAP server found, 
> sleeping 1 seconds

These messages indicate some problem with contacting the LDAP server.
When the error occurs on ldap_search_ext() it is generally when starting
a new search, on ldap_result() it means that it happens while fetching
results.

> I think it could be related to a possibly non-standard PAM
> configuration, therefore I also post my common-auth:
> 
> auth    sufficient      pam_unix.so nullok_secure
> auth    sufficient      pam_ldap.so use_first_pass
> auth    requisite       pam_pwdfile.so pwdfile /etc/passwd.opie
> auth    sufficient      pam_opie.so
> auth    required        pam_deny.so
> 
> Interestingly the problems seem to be gone if I remove pam_opie and
> revert to the standard config.
> 
> To conclude, I think the issue appears when you use nscld, pam_ldap
> AND an additonal module (such as pam_opie or pam_otpw) together.

If you have a scenario that reasonably reliably triggers this problem I
will try to reproduce this issue. The process that triggers it (output
from nslcd -d) and circumstances that cause it (message happen on login,
from cron job, etc.) would help.

Thanks,

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to