Issue 6084 - ppolicy should allow scheduled password expiration
Summary: ppolicy should allow scheduled password expiration
Status: VERIFIED DUPLICATE of issue 9156
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: slapd (show other issues)
Version: 2.4.16
Hardware: All All
: --- normal
Target Milestone: 2.5.0
Assignee: OpenLDAP project
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-04-30 09:58 UTC by guillomovitch@gmail.com
Modified: 2020-04-02 15:23 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description guillomovitch@gmail.com 2009-04-30 09:58:02 UTC
Full_Name: Guillaume Rousse
Version: 2.4.16
OS: Linux
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (195.83.212.136)


Current ppolicy implementation allows to administratively lock a password, by
setting pwdAccountLockedTime attribute to '000001010000Z' value. However,
despite this value actually being a generalized date, setting it to any other
date in the future doesn't work as expected. Moreover, this is an operational
attribute, which is primarily supposed to be handled by slapd itself.

As a consequence, a normal pwdExpirationDate attribute, which itself would set
a
 boolean operational attribute pwdExpired attribute to a true value, would be
desirable.
Comment 1 Howard Chu 2009-04-30 10:35:10 UTC
Guillaume.Rousse@inria.fr wrote:
> Full_Name: Guillaume Rousse
> Version: 2.4.16
> OS: Linux
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (195.83.212.136)
>
>
> Current ppolicy implementation allows to administratively lock a password, by
> setting pwdAccountLockedTime attribute to '000001010000Z' value. However,
> despite this value actually being a generalized date, setting it to any other
> date in the future doesn't work as expected. Moreover, this is an operational
> attribute, which is primarily supposed to be handled by slapd itself.
>
> As a consequence, a normal pwdExpirationDate attribute, which itself would set
> a
>   boolean operational attribute pwdExpired attribute to a true value, would be
> desirable.

Since the ppolicy module's behavior is dictated by the Behera draft, any 
suggestions for changes in this area should probably first be raised on the 
ietf-ldapext mailing list.

-- 
   -- Howard Chu
   CTO, Symas Corp.           http://www.symas.com
   Director, Highland Sun     http://highlandsun.com/hyc/
   Chief Architect, OpenLDAP  http://www.openldap.org/project/

Comment 2 guillomovitch@gmail.com 2009-05-04 14:49:09 UTC
Howard Chu a écrit :
> Since the ppolicy module's behavior is dictated by the Behera draft, any 
> suggestions for changes in this area should probably first be raised on 
> the ietf-ldapext mailing list.
Right, but openldap implementation already have extension, such 
pwdCheckModule. Additional extension could be implemented, before 
getting standardized.

Also, the ietf-ldapext seems to be an highly-technical list, and I don't 
feel confortable enough to post this kind of request directly there. 
Discussing various limitations of ppolicy among openldap users first 
would probably allow openldap core team to suggest a more polished 
extension request themselves.


-- 
BOFH excuse #287:

Telecommunications is downshifting.

Comment 3 Howard Chu 2009-06-30 10:25:51 UTC
Guillaume Rousse wrote:
> Howard Chu a écrit :
>> Since the ppolicy module's behavior is dictated by the Behera draft, any
>> suggestions for changes in this area should probably first be raised on
>> the ietf-ldapext mailing list.
> Right, but openldap implementation already have extension, such
> pwdCheckModule. Additional extension could be implemented, before
> getting standardized.
>
> Also, the ietf-ldapext seems to be an highly-technical list, and I don't
> feel confortable enough to post this kind of request directly there.
> Discussing various limitations of ppolicy among openldap users first
> would probably allow openldap core team to suggest a more polished
> extension request themselves.

The draft doesn't say anything about setting pwdAccountLockedTime to a value 
in the future; since it doesn't preclude it I've fixed up the code to handle 
this case. However, it's not a good solution for your purpose, since the 
pwdAccountLockedTime value is automatically replaced with the current time if 
too many Bind failures occur, and it's automatically deleted when a password 
is changed. We'll leave this in HEAD on an experimental basis for now, until a 
real solution is spec'd out.

-- 
   -- Howard Chu
   CTO, Symas Corp.           http://www.symas.com
   Director, Highland Sun     http://highlandsun.com/hyc/
   Chief Architect, OpenLDAP  http://www.openldap.org/project/

Comment 4 Howard Chu 2009-06-30 10:26:34 UTC
changed notes
changed state Open to Test
moved from Incoming to Development
Comment 5 guillomovitch@gmail.com 2009-07-01 11:15:41 UTC
Howard Chu a écrit :
> Guillaume Rousse wrote:
>> Howard Chu a écrit :
>>> Since the ppolicy module's behavior is dictated by the Behera draft, any
>>> suggestions for changes in this area should probably first be raised on
>>> the ietf-ldapext mailing list.
>> Right, but openldap implementation already have extension, such
>> pwdCheckModule. Additional extension could be implemented, before
>> getting standardized.
>>
>> Also, the ietf-ldapext seems to be an highly-technical list, and I don't
>> feel confortable enough to post this kind of request directly there.
>> Discussing various limitations of ppolicy among openldap users first
>> would probably allow openldap core team to suggest a more polished
>> extension request themselves.
> 
> The draft doesn't say anything about setting pwdAccountLockedTime to a 
> value in the future; since it doesn't preclude it I've fixed up the code 
> to handle this case. However, it's not a good solution for your purpose, 
> since the pwdAccountLockedTime value is automatically replaced with the 
> current time if too many Bind failures occur, and it's automatically 
> deleted when a password is changed. We'll leave this in HEAD on an 
> experimental basis for now, until a real solution is spec'd out.
Indeed. Moreover, a variable date field is not a practical field for 
sorting out valid accounts in search requests, for authorization purposes.

Anyway, thanks for the change.
-- 
BOFH excuse #320:

You've been infected by the Telescoping Hubble virus.

Comment 6 OpenLDAP project 2014-08-01 21:05:00 UTC
leave in HEAD
Comment 7 Ondřej Kuzník 2020-04-02 10:33:48 UTC
ppolicy draft 10 has a way to set a password validity and is implemented now.

*** This issue has been marked as a duplicate of issue 9156 ***