[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: ppolicy by group

On Thursday 26 June 2008 12:32:04 Michael Ströder wrote:
> Buchan Milne wrote:
> > The biggest problem here is that not all software makes provision
> > for "authentication" to respond with anything besides "yes" or "no".
> Yupp.
> > I was trying to see if it would be feasible to add ppolicy support to
> > mod_auth_ldap (for apache), or Squid's mod_auth_ldap, but what HTTP code
> > should the authentication return (ideally one that would result in the
> > user being sent to a page suitable for that code - e.g. to change their
> > password) to apache? In the squid case, it looks initially like squid
> > needs a patch support any password expiry at all
> > (http://sarg.sourceforge.net/ncsaplus.php).
> Bear in mind that in a single password environmemt proxy authentication
> (like with Squid) is somewhat a security risk anyway since the password
> is transferred in clear over the wire to the proxy for each HTTP hit
> going through the proxy.

Unfortunately, however, it does not seem that there is any secure proxy 
authentication scheme for an entirely Unix environment (Mozilla on Unix as 
the client, Squid on Unix as the proxy server), even with Kerberos 
infrastructure in place.

> > I have also started discussions with some web application frameworks
> > (e.g. Catalyst).
> I'd rather recommend to use a decent WebSSO system and integrate web
> servers/applications with that central authentication component because
> when using centralized passwords you don't want to transmit the password
> to every integrated system. Rather in a SSO system system see only
> short-time tickets. I'm successfully using CAS for that in one customer
> project. It works pretty well and the developers are very responsive.

Indeed, but if you have existing applications on an existing framework that 
has LDAP support (we use SSL end-to-end), then it should have support for 
expiring passwords. Migrating to an SSO system would be an option, but I have 
many more features which have higher priority ... In this specific case, 
there are also advantages to the application having access to the clear-text 
password (as it can then be used with the logged-in users credentials to 
perform operations on other devices which authenticate against the same 
system, but have no SSO support).

> > Maybe it would be worthwhile making a list of which applications could
> > really do with password expiry support, and filing bugs on them for the
> > missing pieces?
> Not worth the effort for web access. Rather integrate with a WebSSO
> solution and handle the password policy stuff in a central place.

Yes and no. Either people should stop shipping web server authentication 
modules for LDAP, or they should have password policy support. Not having 
password policy support because you should use a different system is 
irrelevant IMHO.