Toon posts:

[FreeBSD] nsswitch,LDAP,PAM en SSH

Pagina: 1
Acties:

Verwijderd

Topicstarter
Na mijn vorige avontuur met LDAP authenticatie ([rml][ FreeBSD] PAM en OpenLDAP backend[/rml])
besloot ik om het nogmaals met FreeBSD 5.2.1 te proberen aangezien hier het probleem wat ik in het vorige topic had opgelost is. Echter nu heb ik er een heel raar probleem bij gekregen.

Programmatjes zoals finger, id etc werken allemaal ik kan ook via ssh remote (bijvoorbeeld school,werk etc) inloggen. Maar als ik vanaf een pc thuis die op hetzelfde netwerk segment zit als me server probeer in te loggen werkt het niet! Met users die niet in LDAP staan kan ik op deze manier wel inloggen. Als ik in debug log files kijk lijkt het erop alsof PAM niet eens moeite doet om mijn password te verifieren en zegt meteen dat het fout is.

hier een log van een goede login via een "remote" pc (werk,school,etc.):
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
Feb  5 21:45:52 judicator slapd[344]: conn=76 fd=19 ACCEPT from IP=127.0.0.1:49229 (IP=0.0.0.0:389)
Feb  5 21:45:52 judicator slapd[344]: conn=76 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:45:52 judicator slapd[344]: conn=76 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:45:52 judicator slapd[344]: conn=76 op=0 RESULT tag=97 err=0 text=
Feb  5 21:45:52 judicator slapd[344]: conn=76 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uidNumber=1001))"
Feb  5 21:45:52 judicator slapd[344]: conn=76 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:45:52 judicator slapd[344]: <= bdb_equality_candidates: (uidNumber) index_param failed (18)
Feb  5 21:45:52 judicator slapd[344]: conn=76 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:45:52 judicator slapd[344]: conn=76 fd=19 closed
Feb  5 21:45:56 judicator slapd[344]: conn=77 fd=19 ACCEPT from IP=127.0.0.1:49230 (IP=0.0.0.0:389)
Feb  5 21:45:56 judicator slapd[344]: conn=77 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:45:56 judicator slapd[344]: conn=77 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:45:56 judicator slapd[344]: conn=77 op=0 RESULT tag=97 err=0 text=
Feb  5 21:45:56 judicator slapd[344]: conn=77 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uidNumber=1001))"
Feb  5 21:45:56 judicator slapd[344]: conn=77 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:45:56 judicator slapd[344]: <= bdb_equality_candidates: (uidNumber) index_param failed (18)
Feb  5 21:45:56 judicator slapd[344]: conn=77 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:45:56 judicator slapd[344]: conn=77 fd=19 closed
Feb  5 21:46:01 judicator sshd[787]: debug1: Received SIGCHLD.
Feb  5 21:46:01 judicator sshd[787]: debug1: session_by_pid: pid 788
Feb  5 21:46:01 judicator sshd[787]: debug1: session_exit_message: session 0 channel 0 pid 788
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: request exit-status
Feb  5 21:46:01 judicator sshd[787]: debug1: session_exit_message: release channel 0
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: write failed
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: close_write
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: output open -> closed
Feb  5 21:46:01 judicator sshd[787]: debug1: session_close: session 0 pid 788
Feb  5 21:46:01 judicator sshd[770]: debug1: session_by_tty: session 0 tty /dev/ttyp1
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: read<=0 rfd 10 len 0
Feb  5 21:46:01 judicator sshd[770]: debug1: session_pty_cleanup: session 0 release /dev/ttyp1
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: read failed
Feb  5 21:46:01 judicator slapd[344]: conn=70 op=2 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uid=ktf))"
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: close_read
Feb  5 21:46:01 judicator slapd[344]: conn=70 op=2 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: input open -> drain
Feb  5 21:46:01 judicator slapd[344]: conn=70 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: ibuf empty
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: send eof
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: input drain -> closed
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: send close
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: rcvd close
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: is dead
Feb  5 21:46:01 judicator sshd[787]: debug1: channel 0: garbage collecting
Feb  5 21:46:01 judicator sshd[787]: debug1: channel_free: channel 0: server-session, nchannels 1
Feb  5 21:46:01 judicator sshd[787]: debug1: krb5_cleanup_proc called
Feb  5 21:46:01 judicator sshd[787]: debug1: PAM: cleanup
Feb  5 21:46:01 judicator slapd[344]: conn=69 fd=17 closed
Feb  5 21:46:01 judicator slapd[344]: conn=70 fd=18 closed
Feb  5 21:46:04 judicator sshd[397]: debug1: Forked child 819.
Feb  5 21:46:04 judicator sshd[819]: debug1: res_init()
Feb  5 21:46:04 judicator sshd[819]: debug1: Client protocol version 2.0; client software version OpenSSH_3.7.1p1
Feb  5 21:46:04 judicator sshd[819]: debug1: match: OpenSSH_3.7.1p1 pat OpenSSH*
Feb  5 21:46:04 judicator sshd[819]: debug1: Enabling compatibility mode for protocol 2.0
Feb  5 21:46:04 judicator sshd[819]: debug1: Local version string SSH-1.99-OpenSSH_3.6.1p1 FreeBSD-20030924
Feb  5 21:46:04 judicator slapd[344]: conn=78 fd=17 ACCEPT from IP=127.0.0.1:49232 (IP=0.0.0.0:389)
Feb  5 21:46:04 judicator slapd[344]: conn=78 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:04 judicator slapd[344]: conn=78 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:04 judicator slapd[344]: conn=78 op=0 RESULT tag=97 err=0 text=
Feb  5 21:46:04 judicator slapd[344]: conn=78 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uid=ktf))"
Feb  5 21:46:04 judicator slapd[344]: conn=78 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:46:04 judicator slapd[344]: conn=78 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:46:04 judicator sshd[819]: debug1: PAM: initializing for "ktf"
Feb  5 21:46:04 judicator sshd[819]: debug1: PAM: setting PAM_RHOST to "digitalis.cs.hro.nl"
Feb  5 21:46:04 judicator slapd[344]: conn=79 fd=18 ACCEPT from IP=127.0.0.1:49233 (IP=0.0.0.0:389)
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=0 RESULT tag=97 err=0 text=
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(uid=ktf)"
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=2 BIND anonymous mech=implicit ssf=0
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=2 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=2 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:04 judicator slapd[344]: conn=79 op=2 RESULT tag=97 err=0 text=
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=3 BIND anonymous mech=implicit ssf=0
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=3 BIND dn="uid=ktf,ou=people,dc=protos,dc=net" method=128
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=3 BIND dn="uid=ktf,ou=people,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=3 RESULT tag=97 err=0 text=
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=4 BIND anonymous mech=implicit ssf=0
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=4 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=4 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:06 judicator slapd[344]: conn=79 op=4 RESULT tag=97 err=0 text=
Feb  5 21:46:06 judicator slapd[344]: conn=78 fd=17 closed
Feb  5 21:46:06 judicator slapd[344]: conn=80 fd=17 ACCEPT from IP=127.0.0.1:49234 (IP=0.0.0.0:389)
Feb  5 21:46:06 judicator slapd[344]: conn=80 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:06 judicator slapd[344]: conn=80 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:06 judicator slapd[344]: conn=80 op=0 RESULT tag=97 err=0 text=
Feb  5 21:46:06 judicator slapd[344]: conn=80 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uid=ktf))"
Feb  5 21:46:06 judicator slapd[344]: conn=80 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:46:06 judicator slapd[344]: conn=80 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:46:07 judicator slapd[344]: conn=80 fd=17 closed
Feb  5 21:46:07 judicator slapd[344]: conn=79 fd=18 closed
Feb  5 21:46:07 judicator sshd[819]: debug1: monitor_child_preauth: ktf has been authenticated by privileged process
Feb  5 21:46:07 judicator slapd[344]: conn=81 fd=17 ACCEPT from IP=127.0.0.1:49235 (IP=0.0.0.0:389)
Feb  5 21:46:07 judicator slapd[344]: conn=81 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:07 judicator slapd[344]: conn=81 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:07 judicator slapd[344]: conn=81 op=0 RESULT tag=97 err=0 text=
Feb  5 21:46:07 judicator slapd[344]: conn=81 op=1 SRCH base="ou=Group,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixGroup))"
Feb  5 21:46:07 judicator slapd[344]: conn=81 op=1 SRCH attr=cn userPassword memberUid uniqueMember gidNumber
Feb  5 21:46:07 judicator sshd[822]: debug1: Entering interactive session for SSH2.
Feb  5 21:46:07 judicator sshd[822]: debug1: fd 6 setting O_NONBLOCK
Feb  5 21:46:07 judicator sshd[822]: debug1: fd 8 setting O_NONBLOCK
Feb  5 21:46:07 judicator sshd[822]: debug1: server_init_dispatch_20
Feb  5 21:46:07 judicator slapd[344]: conn=81 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:46:07 judicator sshd[822]: debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384
Feb  5 21:46:07 judicator sshd[822]: debug1: input_session_request
Feb  5 21:46:07 judicator sshd[822]: debug1: channel 0: new [server-session]
Feb  5 21:46:07 judicator sshd[822]: debug1: session_new: init
Feb  5 21:46:07 judicator sshd[822]: debug1: session_new: session 0
Feb  5 21:46:07 judicator sshd[822]: debug1: session_open: channel 0
Feb  5 21:46:07 judicator sshd[822]: debug1: session_open: session 0: link with channel 0
Feb  5 21:46:07 judicator sshd[822]: debug1: server_input_channel_open: confirm session
Feb  5 21:46:07 judicator sshd[822]: debug1: server_input_channel_req: channel 0 request pty-req reply 0
Feb  5 21:46:07 judicator sshd[822]: debug1: session_by_channel: session 0 channel 0
Feb  5 21:46:07 judicator sshd[822]: debug1: session_input_channel_req: session 0 req pty-req
Feb  5 21:46:07 judicator slapd[344]: conn=81 op=2 UNBIND
Feb  5 21:46:07 judicator slapd[344]: conn=81 fd=17 closed
Feb  5 21:46:07 judicator slapd[344]: conn=82 fd=17 ACCEPT from IP=127.0.0.1:49236 (IP=0.0.0.0:389)
Feb  5 21:46:07 judicator slapd[344]: conn=82 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:07 judicator slapd[344]: conn=82 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:07 judicator slapd[344]: conn=82 op=0 RESULT tag=97 err=0 text=
Feb  5 21:46:07 judicator slapd[344]: conn=82 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uidNumber=1001))"
Feb  5 21:46:07 judicator slapd[344]: conn=82 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:46:07 judicator slapd[344]: <= bdb_equality_candidates: (uidNumber) index_param failed (18)
Feb  5 21:46:07 judicator sshd[822]: debug1: Allocating pty.
Feb  5 21:46:07 judicator slapd[344]: conn=82 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:46:07 judicator sshd[819]: debug1: session_new: init
Feb  5 21:46:07 judicator sshd[819]: debug1: session_new: session 0
Feb  5 21:46:07 judicator sshd[822]: debug1: session_pty_req: session 0 alloc /dev/ttyp1
Feb  5 21:46:07 judicator slapd[344]: conn=83 fd=18 ACCEPT from IP=127.0.0.1:49237 (IP=0.0.0.0:389)
Feb  5 21:46:07 judicator slapd[344]: conn=83 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:46:07 judicator sshd[822]: debug1: Ignoring unsupported tty mode opcode 37 (0x25)
Feb  5 21:46:07 judicator sshd[822]: debug1: Ignoring unsupported tty mode opcode 52 (0x34)
Feb  5 21:46:07 judicator sshd[822]: debug1: Ignoring unsupported tty mode opcode 71 (0x47)
Feb  5 21:46:07 judicator sshd[822]: debug1: server_input_channel_req: channel 0 request shell reply 0
Feb  5 21:46:07 judicator sshd[822]: debug1: session_by_channel: session 0 channel 0
Feb  5 21:46:07 judicator sshd[822]: debug1: session_input_channel_req: session 0 req shell
Feb  5 21:46:07 judicator sshd[822]: debug1: PAM: setting PAM_TTY to "/dev/ttyp1"
Feb  5 21:46:07 judicator sshd[822]: debug1: PAM: establishing credentials
Feb  5 21:46:07 judicator sshd[822]: debug1: channel 0: rfd 10 isatty
Feb  5 21:46:07 judicator sshd[822]: debug1: fd 10 setting O_NONBLOCK
Feb  5 21:46:07 judicator slapd[344]: conn=83 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:46:07 judicator sshd[823]: debug1: Setting controlling tty using TIOCSCTTY.
Feb  5 21:46:07 judicator slapd[344]: conn=83 op=0 RESULT tag=97 err=0 text=
Feb  5 21:46:07 judicator slapd[344]: conn=83 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uid=ktf))"
Feb  5 21:46:07 judicator slapd[344]: conn=83 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:46:07 judicator slapd[344]: conn=83 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:46:07 judicator sshd[823]: debug1: PAM: retrieving environment


En hier een voorbeeld van een logfile als ik vanaf een lokale pc (pc die inhetzelfde segment als server zit) probeer inteloggen:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Feb  5 21:48:07 judicator sshd[822]: debug1: channel 0: rcvd eof
Feb  5 21:48:07 judicator sshd[822]: debug1: channel 0: output open -> drain
Feb  5 21:48:07 judicator sshd[822]: debug1: channel 0: obuf empty
Feb  5 21:48:07 judicator sshd[822]: debug1: channel 0: close_write
Feb  5 21:48:07 judicator sshd[822]: debug1: channel 0: output drain -> closed
Feb  5 21:48:07 judicator sshd[822]: debug1: channel_free: channel 0: server-session, nchannels 1
Feb  5 21:48:07 judicator sshd[822]: debug1: session_close: session 0 pid 823
Feb  5 21:48:07 judicator sshd[819]: debug1: session_by_tty: session 0 tty /dev/ttyp1
Feb  5 21:48:07 judicator sshd[822]: debug1: krb5_cleanup_proc called
Feb  5 21:48:07 judicator sshd[819]: debug1: session_pty_cleanup: session 0 release /dev/ttyp1
Feb  5 21:48:07 judicator slapd[344]: conn=83 op=2 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uid=ktf))"
Feb  5 21:48:07 judicator sshd[822]: debug1: PAM: cleanup
Feb  5 21:48:07 judicator slapd[344]: conn=83 op=2 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:48:07 judicator slapd[344]: conn=83 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:48:07 judicator sshd[822]: debug1: Received SIGCHLD.
Feb  5 21:48:07 judicator slapd[344]: conn=82 fd=17 closed
Feb  5 21:48:07 judicator slapd[344]: conn=83 fd=18 closed
Feb  5 21:48:26 judicator sshd[397]: debug1: Forked child 825.
Feb  5 21:48:26 judicator sshd[825]: debug1: res_init()
Feb  5 21:48:26 judicator sshd[825]: debug1: Client protocol version 1.5; client software version PuTTY-Release-0.53b
Feb  5 21:48:26 judicator sshd[825]: debug1: no match: PuTTY-Release-0.53b
Feb  5 21:48:26 judicator sshd[825]: debug1: Local version string SSH-1.99-OpenSSH_3.6.1p1 FreeBSD-20030924
Feb  5 21:48:27 judicator slapd[344]: conn=84 fd=17 ACCEPT from IP=127.0.0.1:49238 (IP=0.0.0.0:389)
Feb  5 21:48:27 judicator slapd[344]: conn=84 op=0 BIND dn="cn=nss,dc=protos,dc=net" method=128
Feb  5 21:48:27 judicator slapd[344]: conn=84 op=0 BIND dn="cn=nss,dc=protos,dc=net" mech=SIMPLE ssf=0
Feb  5 21:48:27 judicator slapd[344]: conn=84 op=0 RESULT tag=97 err=0 text=
Feb  5 21:48:27 judicator slapd[344]: conn=84 op=1 SRCH base="ou=People,dc=protos,dc=net" scope=1 filter="(&(objectClass=posixAccount)(uid=ktf))"
Feb  5 21:48:27 judicator slapd[344]: conn=84 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Feb  5 21:48:27 judicator slapd[344]: conn=84 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=
Feb  5 21:48:27 judicator sshd[825]: debug1: PAM: initializing for "ktf"
Feb  5 21:48:27 judicator sshd[825]: debug1: PAM: setting PAM_RHOST to "192.168.1.50"


Zoals hierboven te zien is word keurig de username in kwestie opgezocht, maar word er vervolgens helemaal geen moeite gedaan om het password optezoeken in LDAP en het te checken.

Ik snap er niks van waarom dit alleen lokaal op treed, overigens werkt "ssh -l ktf localhost" (dus sshen vanaf de server naar de server) wel gewoon.

Heeft iemand enig idee waardoor dit veroorzaakt kan worden?
P.S.

Sorry voor het verknallen van de layout :'(

Verwijderd

Topicstarter
Voor de nieuwsgierige ik heb de oplossing voor het probleem gevonden.
Putty staat standaard op ssh1 protocol, hiermee kunnen users die niet in de LDAP tree staan gewoon inloggen. Echter kennelijk werkt het niet goed voor users die WEL in de LDAP tree staan. Solution is dus om altijd protocol 2 te gebruiken, wat je overigerens altijd al moet doen.

Misschien is dit dus een klein bugje in ssh en nss_ldap, dat je een wrong password error krijgt ipv protocol not supported.