Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LDAP Provider using GSSAPI auth loses connection after 5 minutes #1341

Closed
sssd-bot opened this issue May 2, 2020 · 0 comments
Closed

LDAP Provider using GSSAPI auth loses connection after 5 minutes #1341

sssd-bot opened this issue May 2, 2020 · 0 comments
Assignees
Labels
Closed: Fixed Issue was closed as fixed.

Comments

@sssd-bot
Copy link

sssd-bot commented May 2, 2020

Cloned from Pagure issue: https://pagure.io/SSSD/sssd/issue/299

  • Created at 2009-12-02 23:37:19 by sgallagh
  • Closed as Fixed
  • Assigned to sbose

When configured to use GSSAPI Kerberos encryption, the LDAP provider requests a ticket for 300 seconds. When this time is up, the next time the LDAP provider attempts to make a request to the remote server, it is refused, receiving the error "Cannot contact LDAP server". This causes the request to fail and the domain to enter offline mode.

As discussed on IRC, when we receive this error, we should check whether our kerberos ticket is expired. If it is, we should kinit and retry before going offline.

Comments


Comment from sgallagh at 2009-12-09 06:00:44

Fixed by d239b49

fixedin: => 1.0.0
resolution: => fixed
status: new => closed


Comment from dpal at 2012-01-19 02:28:57

Fields changed

rhbz: => 0


Comment from sgallagh at 2017-02-24 14:43:06

Metadata Update from @sgallagh:

  • Issue assigned to sbose
  • Issue set to the milestone: SSSD 1.0
@sssd-bot sssd-bot added the Closed: Fixed Issue was closed as fixed. label May 2, 2020
@sssd-bot sssd-bot closed this as completed May 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Closed: Fixed Issue was closed as fixed.
Projects
None yet
Development

No branches or pull requests

2 participants