Re: PAM passthru questions and SecureID

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





Richard Megginson wrote:

You mean like "every person who is a member of group A has to use {PAM}uid:groupAAuth"?

Yes, exactly.

> I suppose we could use Class of Service to
implement that.

That would be the best, architecturally and from a maintenance standpoint. It would a lot easier to change authentication sub-systems for a whole class of people rather than 1 by 1... I'm not sure how Class of Service works, but I'll look into it. Still learning a lot of the LDAP internals, it's been a pretty steep learning curve so far.

I just don't like overloading the userPassword {foo} syntax, but openldap has a history of doing something similar with {kerberos} and {sasl}, so there is precedent.

I agree, it's somewhat of a hack, but it would seem to the quick way to get to more flexibility in handling authentication externally. Given the myriad of potential external auths, more flexibility would be better. Perhaps instead you could have {LOOKUP}(some filter that points elsewhere)? I don't know if that's possible at all.

The other thing is that some accounts would need access no matter what (hence ques. 2) , although that would seem to defeat the purpose of tokens... I don't have an answer as to how to deal with that, but in the worst case, you could handle it at the PAM level.
Yeah, I'm not sure what that would look like.

PAM has built in fallback when an auth method fails. However, if the alternative auth method was a password in LDAP, how would LDAP know that the first auth had failed? You could easily do it with an alternative password store (like unix passwords), but it might be difficult to do if you wanted to contain everything in LDAP.

Ugh, I was afraid of that. I'm trying to avoid 'custom', 'proprietary' e.g. unsupport, unupdated stuff. I'm also very much hating all of the two-factor vendors out there as they seem very narrow minded. They have a single use-case and basically you're on your own (see 'custom' & 'proprietary') if you don't fit into it.
This sounds like a worthwhile project to work on. Have the token vendors provided SASL mechanisms for their products? That seems like the best way to enable authentication via their devices to a wide range of applications.

No. Most of them have their own proprietary auth protocols. Most provide RADIUS auth and some have PAM modules. When I was looking at using OpenLDAP, I worked out this crazy chained auth scheme involving LDAP -> SASL -> saslauthd -> pam_radius -> auth server. It gave me the willies as each piece of the chain represents yet another thing that can fail and another security hole. FedoraDS's PAM passthrough does away with a lot of that (well SASL mostly), which, IMHO, is a good thing.

The other main issue is that most token vendors only support account lookup in a limited set of LDAP servers (usually AD and one other). I'm running into this now with CryptoCard, as their auth server can lookup accounts in AD, OpenLDAP and Mac OpenDirectory, but not Fedora (they have schemas in their configs for Sun and Novell as well, but they are 'not supported'). The alternative is to clone each account to the auth server and not have it do LDAP lookups, which is kinda stupid, but a usable workaround.

All that said, I think that Fedora DS having pam passthrough makes it the open source LDAP server of choice (and potentially the only one on Linux that could do external auth against a token system) since OpenLDAP doesn't support this except through an complex/fragile SASL chain.

The only other LDAP server that I know of that directly supports tokens is Novell's eDirectory + RSA tokens, but the auth module for RSA only runs on WinX and Netware.... Even on WinX, there are issues with AD integration, particularly at the desktop login level.

Right now, I've got a copy of CryptoCard's (CC) server running on the same box as LDAP. It sees all the LDAP accounts fine, but CC's mappings don't recognize that the accounts are user accounts and I'm try to fix that. CC is being less than cooperative in explaining what is what (sigh). Supposedly RSA's server is a bit more flexible in account configuration and I might install that next.

All I know is that I'd love to get this working. Right now, pam passthrough seems the fastest way to get there, if I can figure out the right incantations to get a token auth server to lookup LDAP accounts.

(Sorry for the rant)

Chris.
--
Chris Maresca
Olliance Group, LLC
www.olliancegroup.com

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux