Re: ip address based aci

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2017-11-13 at 10:34 +0100, Jan Kowalsky wrote:
> Hi William,
> 
> thanks a lot for clearing.

Sorry for the very late response! I have been quite busy :( 

> 
> Am 13.11.2017 um 00:42 schrieb William Brown:
> > On Sun, 2017-11-12 at 23:06 +0100, Jan Kowalsky wrote:
> > > On some comments I read that it's generally discouraged to use
> > > aci's
> > > with a "not" logic like:
> > > 
> > >  ip != 10.0.0.*
> > > 
> > > or something like this.
> > > 
> > 
> > The != is only an issue for targetattr, because if you do:
> > 
> > targetattr != sn
> > 
> > Then this includes all system attributes like nsACcountlock and
> > resource limit types etc. 
> > 
> > IP addr != is fine :) 
> > > As long as I understood, I have to define aci's for every base dn
> > > separately if I running multiple databases. Is there any way to
> > > define
> > > this for the whole server?
> > 
> > If you have the databases nested IE:
> > 
> > dc=example,dc=com
> > ou=foo,dc=example,dc=com
> > 
> > And in the mapping tree these are marked as "parent", then the aci
> > of
> > dc=example,dc=com should apply to ou=foo too. 
> 
> ok. So for me it doesn't work. The databases are completely
> separeted.

Then you can't share aci's sorry :( This is just a reality of how our
aci's operate. 

> 
> > Generally, I would look at:
> > 
> > https://research.google.com/pubs/pub43231.html
> > 
> > IP address based security is not a good control: You should be
> > using
> > other factors and information to provide access I think. You could
> > limit admins to using TLS user certs for identity rather than
> > passwords, using minssf rules, longer password policy, etc.
> 
> The ip based access control in my setting is only to give a
> additionally
> control beside the firewall. The Directory should not to be
> accessible
> from public internet at all. But for the case there is any error on
> firewalling I want to protect the whole directory. Other access
> rights
> are more granular.

Why not limit this based on iptables *and* your routers instead? That
would be a more effective control I think than ip based access
controls.

Additionally, another option is remove anonymous binds (or heavily
limit anonymous access), and use service accounts for applications to
read attributes that they require? This could be more effective than IP
controls, because when you think about an attacker, they don't just go
"from internet to ldap". They'll have poped a box on your network
internally, so the exfiltration route is:

ds -> poped internal box -> internet.

So your internet controls won't help here, because your ds is talking
*internally*. Better option is limit based on service accounts and
privilege than IP. 


I really hope this advice helps,


> 
> Regards
> Jan
> _______________________________________________
> 389-users mailing list -- 389-users@xxxxxxxxxxxxxxxxxxxxxxx
> To unsubscribe send an email to 389-users-leave@lists.fedoraproject.o
> rg
-- 
Sincerely,

William Brown
Software Engineer
Red Hat, Australia/Brisbane
_______________________________________________
389-users mailing list -- 389-users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to 389-users-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora User Discussion]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Yosemite Photos]     [Linux Apps]     [Maemo Users]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux