Re: Model clarification - was: RE: Fedora LDAP authentication failure

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> GT: Yes /etc/ldap.secret is for "rootdn" binding and RECOMMENDED NOT
> needed at LDAP Clients' end for security reason.
> 
> If I am incorrect please could someone correct me.
[...]
> >Second - There needs to exist '/etc/ldap.secret' containing the 
> >password to bind with the LDAP server which is used by ldap clients.  
> >This file did not exist on my server until a few minutes ago after I 
> >created it.
> 
> I'm guessing you need this secret only because you're running a local
> instance of openldap that needs to synchronize with a remote server. In
> most of our client installations we don't need such a "secret" file,
> which of course seems a bit of a worry from a security viewpoint.

That depends on the directory environment. We've implemented
strict limits on what's returned to anonymous (or general user)
binds. So for authentication we normally use a dedicated
service DN/PW. Software binds as the service DN, searches for
the user DN, then tries to bind as the user. This idiom is supported
by a lot of software, including the PADL pam_ldap, Apache, and Tomcat.

(I'd say it's roughly analogous to having a Kerberos server keytab;
by having some trusted user with a shared secret do local 
authentication, one improves security elsewhere. Though Kerberos
has a stronger security model...)

_______________________________________________

Pam-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/pam-list

[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux