Re: Problem with 389-ds authentication

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 3/7/23 2:23 PM, Mr Mysteron wrote:
Hi Mark,

Both servers are running the latest 2.2.x version from directory.fedoraproject.org:

python3-lib389-2.2.6-1.el9.noarch
389-ds-base-libs-2.2.6-1.el9.x86_64
389-ds-base-2.2.6-1.el9.x86_64
cockpit-389-ds-2.2.6-1.el9.noarch

This is listed in dse.ldif regarding PBKDF2-SHA512 and that makes the password storage schema active I assume:

dn: cn=PBKDF2-SHA512,cn=Password Storage Schemes,cn=plugins,cn=config
objectClass: top
objectClass: nsSlapdPlugin
cn: PBKDF2-SHA512
nsslapd-pluginPath: libpwdchan-plugin
nsslapd-pluginInitfunc: pwdchan_pbkdf2_sha512_plugin_init
nsslapd-pluginType: pwdstoragescheme
nsslapd-pluginEnabled: on
nsslapd-pluginId: none
nsslapd-pluginVersion: none
nsslapd-pluginVendor: none
nsslapd-pluginDescription: none

No error messages, all are log data points to "RESULT err=0" in access logfile.

I assume the problem is because the smtp server does not initiate a simple bind for checking the username & password when auth_bind is disabled in dovecot.

I'd like to know, if the object in the LDAP directory is set into some kind of "protective state" when a server has first authenticated with a simple bind in order to access the object, and when another server which doesn't make a simple bind in order to access the same object in the directory, 389-ds will not validate the users credentials.

Entries do not go into any kind of state during a bind (or any other operation).  Authentication is per connection.  You open a connection, you bind (or don't bind), and then perform operations against the database.  Access control rules are applied to those operations based on who authenticated when the connection was established.  There are no issues/restrictions with multiple connections concurrently binding as the same user.

HTH,

Mark



BR,
/MrM

On Tue, Mar 7, 2023 at 4:38 PM Mark Reynolds <mareynol@xxxxxxxxxx> wrote:
What rpm version of 389-ds-base are you using?  Is it the same on both
systems?

In newer versions the standard storage scheme is PBKDF2-SHA512. Is your
client trying to read or add already hashed passwords? Not sure why
dovecot, or any client, would be complaining about an unknown password
storage scheme since it should not know anything about the password
storage scheme as it's supposed to be handled by the Directory Server
internally.

Anything in the DS errors log?

Is PBKDF2-SHA512 in your DS config?

Anyway I'm not sure what is going on or what version of 389 you are
using.  I suspect you have two different versions of 389-ds-base, one
which is newer and supports PBKDF2-SHA512, and one that is older and
does not.  Otherwise, I guess your clients are processing/using the
userpassword value, and they just might not support PBKDF2-SHA512?  So
that means you have entries that already have PBKDF2-SHA512 (before you
changed the password policy to PBKDF2_SHA256?).  So those entries need
to have their passwords reset to use the updated global password policy
scheme.

FYI - you should avoid using SSHA512.  It's very insecure as the hash
can be cracked in 20 minutes or something like that.

Mark

On 3/7/23 8:22 AM, Mr Mysteron wrote:

> Hi.
>
> I'm running two 389-ds instances on Centos9 servers, one master and
> one readonly slave server.
> Global pwpolicy is PBKDF2_SHA256 and local pwpolicy is SSHA512.
> The mail-servers are querying the readonly slave server for LDAP data.
> All servers are using TLS for encryption.
>
> I'm running a two mail servers, one for incoming mail with Dovecot as
> an imap frontend and one for Postfix smtp with Dovecot as a SASL
> authentication backend.
> The Dovecot imap server has been running LDAP authentication
> flawlessly, but I recently switched the Postfix smtp server over to
> Dovecot SASL authentication.
>
> Here's when everything started taking an interesting turn.
>
> The incoming Dovecot imap server is set to do an authentication bind:
> auth_bind = yes
>
> while the smtp server with Postfix + Dovecot SASL authentication does
> not do an auth_bind.
>
> The authentication process started failing on the smtp server with the
> following error message for every authenticated user:
>
> dovecot[721505]: auth: Error: ldap(USERNAME): Unknown scheme PBKDF2-SHA512
>
> Changing password for a user will allow authentication against the
> LDAP from the smtp server, but when the imap server authenticates and
> use auth_bind, then no LDAP authentication is possible do on the smtp
> server and the above error message appears again for the user.
>
> I found out, that when I also use auth_bind for Dovecot on the smtp
> server everything works.
>
> What I hope someone could explain for me is, what's happening with the
> slave queries against the 389-ds ro server instance when the imap
> server authenticates the user with auth_bind enabled and the smtp
> server cannot authenticate the user when auth_bind is not enabled.
>
> The servers are binding prior to auth_bind with a
>
> dn = cn=binduser,ou=bindaccount,dc=example,dc=com
>
> user so that part is working as intended.
>
> Thank you.
>
>
> BR,
> /MrM
>
> _______________________________________________
> 389-users mailing list -- 389-users@xxxxxxxxxxxxxxxxxxxxxxx
> To unsubscribe send an email to 389-users-leave@xxxxxxxxxxxxxxxxxxxxxxx
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedoraproject.org/archives/list/389-users@xxxxxxxxxxxxxxxxxxxxxxx
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

--
Directory Server Development Team

-- 
Directory Server Development Team
_______________________________________________
389-users mailing list -- 389-users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to 389-users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/389-users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

[Index of Archives]     [Fedora User Discussion]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Yosemite Photos]     [Linux Apps]     [Maemo Users]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux