1 |
On 05/05/2010 02:02 AM, Indexer wrote: |
2 |
> I have solved this issue late last night. I took my inspiration from |
3 |
> fedora, who has a really nice automatic tool for adding ldap servers, |
4 |
> and i looked at their changes. The issue was that pam_unix was set as |
5 |
> required, not sufficient / optional. I also found that in fedora they |
6 |
> do includes in their pam, and my setup did not have it so you need to |
7 |
> modify the correct module for the system, you are using. Find below |
8 |
> my corrected pam config, and i will do a write up of this process. |
9 |
nice :) |
10 |
|
11 |
> I have also found that when the user logs in it takes a long tine for |
12 |
> commands to execute, and in this time it sends alot of requests to |
13 |
> the slapd server, using anonymous binds. Any idea how i make |
14 |
> anonymous binds return attrs such as groupUid etc? |
15 |
You have to allow that using ACLs in slapd.conf. |
16 |
|
17 |
In your first post they were: |
18 |
|
19 |
access to attrs=userPassword |
20 |
by dn="uid=william,ou=Admin,dc=chocolate,dc=lan" write |
21 |
by anonymous auth |
22 |
by self write |
23 |
by * none |
24 |
access to * |
25 |
by self write |
26 |
by users read |
27 |
|
28 |
I think you should have at least this: |
29 |
|
30 |
access to dn.base="" by * read |
31 |
|
32 |
So that anonymous can at least get to the root of your LDAP tree. This |
33 |
is important to some clients (especially SASL). |
34 |
|
35 |
And then I'd also open up read access to anonymous for everything else, |
36 |
or at least Users+Groups, as that is also the case with /etc/passwd. |
37 |
There is really no point in being more secretive than file permissions |
38 |
on /etc/passwd. |
39 |
|
40 |
|
41 |
access to * |
42 |
by * read |
43 |
|
44 |
or, more secure I think: |
45 |
|
46 |
access to ou=Group,dc=chocolate,dc=lan |
47 |
by dn.subtree="ou=Admin,dc=chocolate,dc=lan" write |
48 |
by * read |
49 |
|
50 |
access to ou=Admin,dc=chocolate,dc=lan |
51 |
by dn.subtree="ou=Admin,dc=chocolate,dc=lan" write |
52 |
by * read |
53 |
|
54 |
access to ou=Users,dc=chocolate,dc=lan |
55 |
by dn.subtree="ou=Admin,dc=chocolate,dc=lan" write |
56 |
by * read |
57 |
|
58 |
I'm not 100% sure with the "by dn.subtree=..." though I think that |
59 |
should work ($ man slapd.access). |
60 |
|
61 |
|
62 |
Bye, |
63 |
Daniel |
64 |
|
65 |
-- |
66 |
PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get |
67 |
# gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887 |