Project

General

Profile

Actions

Enhancement #593

closed

PAM LDAP Rework

Added by Marc Dequènes over 6 years ago. Updated over 6 years ago.

Status:
Resolved
Priority:
Urgent
Category:
Service :: IS / AAA / PKI
Start date:
2017-09-19
Due date:
% Done:

100%

Estimated time:
Patch Available:
Confirmed:
No
Branch:
pam_ldap_rework2
Entity:
DuckCorp
Security:
Yes
Help Needed:

Description

Most hosts are using nslcd to handle LDAP cache and authentication/authorization filters. It proved to be a better system and I wanted to use it everywhere but Elwing and Orfeo had services in need of special authorization filters and still use nss-ldap+pam-ldap+unscd.

Example of the minbif PAM config with pam_ldap_minbif.conf containing specific LDAP filters:

auth            requisite       pam_ldap.so config=/etc/pam_ldap_minbif.conf
account         requisite       pam_ldap.so config=/etc/pam_ldap_minbif.conf
session         optional        pam_ldap.so config=/etc/pam_ldap_minbif.conf
password        requisite       pam_ldap.so config=/etc/pam_ldap_minbif.conf use_authtok

With nslcd's pam_authz_search it is now possible to mix various variables and couple host+service names like this:

pam_authz_search (&(objectClass=shellUser)(uid=$username)(|(allowedServices=$fqdn--$service)(allowedServices=$service)))

The goal is to improve the LDAP config to use these new values into allowedServices instead and switch to nslcd. Then we can cleanup the whole config and distribute it via Ansible.

Also changes in the PAM common files introduced problems (see #349), which may open unwanted accesses, so this would also fix these problem as we would get back to pam-auth-update management, as intended by the Debian package maintainers.


Related issues 1 (0 open1 closed)

Related to DuckCorp Infrastructure - Bug #349: pam-auth-update activated LDAP in common non-ldap configurationsRejected2014-09-10

Actions
Actions

Also available in: Atom PDF