Is there a way to figure out what exactly SASL GSSAPI is trying to do during an LDAP bind?
Background: I wrote a small Python program using python-ldap to maintain some data in my AD. It used to work fine until I joined the machine to the AD. Since then I see ldap.OPERATIONS_ERROR: {'info': '00002020: Operation unavailable without authentication', 'desc': 'Operations error'} Using ldap-tools with -Y GSSAPI I can still access and modify everything. In Wireshark however I just see entries like LDAPMessage bindRequest(2) "<ROOT>" sasl for both the granted and denied situation. I also see Kerberos protocol to fetch the service principal for the AD. I would like to know, which principal it actually uses to bind to the LDAP. Thanks for any hints, - lars. ________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos