Issue 655 - slurpd with SASL
Summary: slurpd with SASL
Status: VERIFIED FIXED
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: slapd (show other issues)
Version: unspecified
Hardware: All All
: --- normal
Target Milestone: ---
Assignee: OpenLDAP project
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2000-08-10 19:11 UTC by Mark Adamson
Modified: 2014-08-01 21:05 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description Mark Adamson 2000-08-10 19:11:31 UTC
I was working on making slurpd work with more than simple authentication
since I wanted SASL authentication, so I made a quick patch in
the servers/slurpd/ tree that would allows the of use Kerberos V4 under
SASL when slurpd connects to slave servers. The patch is against
OpenLDAP 2.0 Beta, and is available at

   http://nil.andrew.cmu.edu/ldap/slurpd_sasl.gdiff

It includes a short update to the slapd.conf(5) man page.

The patch does not include code to fetch a Kerberos service ticket from
the /etc/srvtab file, since that breaks the intent of SASL (which is to
free the application from having to write mechanism specific code).
Therefore, if a SASL mechanism that uses Kerberos (i.e. KERBEROS_V4 or
GSSAPI) is to be used, the slurpd process needs to run as the child of a
ticket refreshing program like "reauth" or "kauth".


The slapd.conf on the master slapd will need lines like

  replica host=ldap2.andrew.cmu.edu \
    bindmethod=SASL \
    saslmech=KERBEROS_V4 \
    bindprincipal=ldapserver.ldap1


and the slapd.conf on the slave will need an updatedn line that gives the
SASL name. Running slapd with -d128 will produce "acl_mask" lines that
tell the SASL name that the server applies to bound connections.

  updatedn "UID=U:LDAPSERVER.LDAP1+REALM=ANDREW.CMU.EDU"

  access to attr=entry
    by dn="UID=U:LDAPSERVER.LDAP1+REALM=ANDREW.CMU.EDU" write
    <...>


(The "access" line is provided just to show how SASL names can be put into
an ACL, and that the updatedn will probably be adding/removing entries and
attributes.)



   -Mark Adamson
    Carnegie Mellon


Comment 1 Kurt Zeilenga 2000-08-10 22:32:00 UTC
Mark,

You are invited to join OpenLDAP-core.  This will give you
CVS privileges to make changes to our HEAD branch and as
well as allow you to participate in project management
discussions.

If you are interested, send me a note with your preferred
account name and e-mail forwarding address and I'll set
up your access.

Regards, Kurt

Comment 2 Kurt Zeilenga 2000-08-10 22:34:19 UTC
My last message was obviously not meant for general consumption,
everyone (but Mark) should ignore it.

Kurt

Comment 3 Kurt Zeilenga 2000-08-15 18:37:19 UTC
moved from Incoming to Development
Comment 4 Kurt Zeilenga 2000-08-17 16:09:14 UTC
changed notes
changed state Open to Closed
Comment 5 OpenLDAP project 2014-08-01 21:05:27 UTC
committed