[Date Prev][Date Next] [Chronological] [Thread] [Top]

Proper ACL's?



I'm having what must be a really simple issue with ACL's in OpenLDAP and
allowing users to authenticate with ssh.  If I have no ACL's, it works
fine.  If I put in something like this:

access to dn="" by * read
access to attr=userpassword
   by self write
   by anonymous auth

access to *
    by self write
    by users read

Then users can't authenticate with ssh.

I'm using OpenLDAP 2.0.27 that ships with Redhat EL Advanced Server. 
Upgrading to OpenLDAP 2.1 is not an option at this time.

My /etc/openldap/slapd.conf has:

include         /etc/openldap/schema/core.schema
include         /etc/openldap/schema/cosine.schema
include         /etc/openldap/schema/inetorgperson.schema
include         /etc/openldap/schema/nis.schema
include         /etc/openldap/schema/redhat/rfc822-MailMember.schema
include         /etc/openldap/schema/redhat/autofs.schema
include         /etc/openldap/schema/redhat/kerberosobject.schema
access to dn="" by * read
access to attr=userpassword
   by self write
   by anonymous auth
access to *
    by self write
    by users read
database        ldbm
suffix          "dc=nc,dc=REDACTED,dc=com"
rootdn          "cn=admin,dc=nc,dc=REDACTED,dc=com"
directory       /var/lib/ldap
index   objectClass,uid,uidNumber,gidNumber,memberUid   eq
index   cn,mail,surname,givenname                       eq,subinitial
TLSCertificateFile      /etc/openldap/ssl-cert/slapd.pem
TLSCertificateKeyFile   /etc/openldap/ssl-cert/slapd.pem
TLSCACertificateFile    /etc/openldap/ssl-cert/slapd.pem

My /etc/ldap.conf is:
host 127.0.0.1
base dc=nc,dc=REDACTED,dc=com
pam_filter objectclass=account
pam_groupdn cn=PAM,ou=Group,dc=nc,dc=REDACTED,dc=com
ssl no
pam_password md5

My /etc/pam.d/system-auth is:
auth        required      /lib/security/pam_env.so
auth        sufficient    /lib/security/pam_unix.so likeauth nullok
auth        sufficient    /lib/security/pam_ldap.so use_first_pass
auth        required      /lib/security/pam_deny.so

account     sufficient      /lib/security/pam_unix.so
account     [default=bad success=ok user_unknown=ignore service_err=ignore
system_err=ignore] /lib/security/pam_ldap.so

password    required      /lib/security/pam_cracklib.so retry=3 type=
password    sufficient    /lib/security/pam_unix.so nullok use_authtok
password    sufficient    /lib/security/pam_ldap.so use_authtok
password    required      /lib/security/pam_deny.so

session     required      /lib/security/pam_limits.so
session     required      /lib/security/pam_unix.so
session     optional      /lib/security/pam_ldap.so

Without ACL's, LDAP works great for authentication. Any pointers as to
what I'm doing wrong?

--
Brian