Issue 6607 - forwarded bind failure messages cause success
Summary: forwarded bind failure messages cause success
Status: VERIFIED FIXED
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: slapd (show other issues)
Version: unspecified
Hardware: All All
: --- normal
Target Milestone: ---
Assignee: OpenLDAP project
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-07-28 00:22 UTC by ebackes@symas.com
Modified: 2014-08-01 21:04 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description ebackes@symas.com 2010-07-28 00:22:03 UTC
Full_Name: Matthew Backes
Version: RE24
OS: 
URL: 
Submission from: (NULL) (76.88.107.46)


As noted in

    http://www.openldap.org/lists/openldap-technical/201004/msg00247.html

setting up a chain overlay on the frontend and then configuring ppolicy with
ppolicy_forward_updates causes BIND operations with invalid credentials to
return success, apparently from the result of the chain operation.

This is independent of the value of chain-return-error.

WHOAMI reports anonymous after these "successful" BINDs with invalid passwords,
so there is no security compromise within the directory itself, however this has
(as noted in the above email) catastrophic results for external apps trying to
authenticate with BIND.
Comment 1 Howard Chu 2010-07-28 13:09:05 UTC
changed notes
changed state Open to Test
moved from Incoming to Software Bugs
Comment 2 Howard Chu 2010-07-28 20:08:11 UTC
mbackes@symas.com wrote:
> Full_Name: Matthew Backes
> Version: RE24
> OS:
> URL:
> Submission from: (NULL) (76.88.107.46)
>
>
> As noted in
>
>      http://www.openldap.org/lists/openldap-technical/201004/msg00247.html
>
> setting up a chain overlay on the frontend and then configuring ppolicy with
> ppolicy_forward_updates causes BIND operations with invalid credentials to
> return success, apparently from the result of the chain operation.
>
> This is independent of the value of chain-return-error.
>
> WHOAMI reports anonymous after these "successful" BINDs with invalid passwords,
> so there is no security compromise within the directory itself, however this has
> (as noted in the above email) catastrophic results for external apps trying to
> authenticate with BIND.
>
>
This was already fixed in HEAD by back-ldap/chain.c rev 1.77 (apparently fixed 
for unrelated reasons).

-- 
   -- Howard Chu
   CTO, Symas Corp.           http://www.symas.com
   Director, Highland Sun     http://highlandsun.com/hyc/
   Chief Architect, OpenLDAP  http://www.openldap.org/project/

Comment 3 ando@openldap.org 2011-01-08 10:32:29 UTC
changed notes
Comment 4 Quanah Gibson-Mount 2011-01-10 12:37:24 UTC
changed notes
changed state Test to Release
Comment 5 Quanah Gibson-Mount 2011-02-14 12:29:11 UTC
changed notes
changed state Release to Closed
Comment 6 OpenLDAP project 2014-08-01 21:04:30 UTC
already fixed in HEAD (related to ITS#6475)
fixed in RE24