Re: [389-devel] [PATCH] Add require secure binds switch.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Your fixes look good to me.
--noriko

Nathan Kinder wrote:
Nathan Kinder wrote:
Nathan Kinder wrote:
Andrey Ivanov wrote:

Does it mean that when "nsslapd-require-secure-binds" is "on" then even the anonymous binds should be made by SSL? Maybe there is some sense in leaving a possibility to have anonymous binds non-SSL and frocing non-anonymous ones to be secure?
Sorry for the late response, but I was on vacation the last week.

The current patch does force all simple binds, including anonymous, to use a secure connection. I can see value in allowing anonymous simple binds over an unencrypted connection, as the main reason for this new setting is to prevent clear text transmission of passwords. I will revise the patch to ignore anonymous binds when nsslapd-require-secure-binds is on unless anyone else has arguments otherwise.
A new patch with the above change is attached.
After some discussion with Rich, we determined that a change to the patch was necessary with regards to the way unauthenticated binds are treated. The attached patch treats unauthenticated binds the same as anonymous binds (assuming that they are allowed in the config). This means that the new setting to require secure binds will not affect unauthenticated binds or anonymous binds.

The patch also fixed a typo in one of the new log messages.

There are a number of other security related configuration settings that I plan to add soon, which will provide other ways of dealing with restricting anonymous operations. One of these features are a switch to disable any anonymous operations completely. Another is to have a minimum SSF setting on the server. The only operation we would allow after first connecting over plain LDAP would be startTLS. If the SSF then meets the minimum requirement, other operations would be allowed.

2009/5/15 Rich Megginson <rmeggins@xxxxxxxxxx <mailto:rmeggins@xxxxxxxxxx>>

    Nathan Kinder wrote:


------------------------------------------------------------------------

        --
        Fedora-directory-devel mailing list
        Fedora-directory-devel@xxxxxxxxxx
        <mailto:Fedora-directory-devel@xxxxxxxxxx>
        https://www.redhat.com/mailman/listinfo/fedora-directory-devel

    Looks good.

    --
    Fedora-directory-devel mailing list
    Fedora-directory-devel@xxxxxxxxxx
    <mailto:Fedora-directory-devel@xxxxxxxxxx>
    https://www.redhat.com/mailman/listinfo/fedora-directory-devel


------------------------------------------------------------------------

--
Fedora-directory-devel mailing list
Fedora-directory-devel@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-devel

--
Fedora-directory-devel mailing list
Fedora-directory-devel@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-devel

------------------------------------------------------------------------

--
Fedora-directory-devel mailing list
Fedora-directory-devel@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-devel

------------------------------------------------------------------------

--
Fedora-directory-devel mailing list
Fedora-directory-devel@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-devel

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

--
Fedora-directory-devel mailing list
Fedora-directory-devel@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-devel

[Index of Archives]     [Fedora Directory Announce]     [Fedora Users]     [Older Fedora Users Mail]     [Fedora Advisory Board]     [Fedora Security]     [Fedora Devel Java]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Mentors]     [Fedora Package Review]     [Fedora Art]     [Fedora Music]     [Fedora Packaging]     [CentOS]     [Fedora SELinux]     [Big List of Linux Books]     [KDE Users]     [Fedora Art]     [Fedora Docs]

  Powered by Linux