[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: (ITS#3446) ACL val clause ineffective with bind



The only explanation that seems reasonable to me is that one should not
muck with password values.  I understand that while this might be a good
thing, mucking with password hashes could ne useful.  I'd favor doing
something like allowing a special "hash" value style for passwords, and
pass only this portion of the value.  This may require a bit of work, and
some overhead (e.g. creating temporaries for values of passwords that have
a "{[^}]+}" prefix).  We should move the discussion to -devel.

p.


>> I guess what you intend to do is to allow bind based on some hash
>> mechanism only.  I think this possibility should be considered, maybe
>> through a different mechanism
>
> OK. The motivating problem at hand (when I found this didn't work) was
> that we have some users with one-time password cards. We've coded this as
> a "hash" mechanism within OpenLDAP. So an entry might have:
>
> userPassword: {ONETIME}HWTOKEN123
> userPassword: {CLEAR}secret
>
>
> But we have certain services/hosts that should always use OTP, and we
> have certain services/hosts that should never use OTP.
>
>
> If userPassword 'val' worked, I was hoping for something like:
>
> access to userPassword val={CLEAR}*
> 	by peer=secure.server none
> 	by dn="cn=OTPOnly" none
> 	by * auth
>
> to restrict access to non-OTP entries for those with paranoia.
>


-- 
Pierangelo Masarati
mailto:pierangelo.masarati@sys-net.it


    SysNet - via Dossi,8 27100 Pavia Tel: +390382573859 Fax: +390382476497