[Date Prev][Date Next]
- To: firstname.lastname@example.org
- Subject: OpenLDAP Statistics
- From: Felip Moll <email@example.com>
- Date: Fri, 25 Nov 2011 15:01:33 +0100
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; bh=HCXT1SavD5yTeexcx0gL/dSxuU0QpT0HY62qexRxRLk=; b=OjQhutcezd/jM9C3jx7i7LdXDjJixdwjo/GsDFNIj1NpB3vdsgk7pA90Jp1lQGxon7 P9+neVripBftmvfKI7wKtvqCpGC4PcZxm8mZQ55KCA7zmGtWX8W7wAT/pjB5YYGOlwVI w9a0YLUmqxA5NThNBp4qAn9o2L4QqZXnqKT7E=
I am new to this list and I would like to ask you a question regarding OpenLDAP.
The fact is that I have an OpenLDAP server that receive a lot of operations every day. I have different kind of services that make use of LDAP and bind to this server.
In a particular case, there are an ou=Users that contain approx. 200 users with their attributes. I am using also a private LDAP schema developed by me in which I have some extra attributes.
Recently we have managed an audit promoted by our government in which a lot of security items had been checked and corrected if had found some issue. One of this security checks was about the management
of user passowrds and an other regarding to user accounts. The first one could be satisfied by implementing the ppolicy overlay in LDAP. But in the second one, the audit people imposed us to have a control of which
accounts were not being used in the last year, and to delete/backup/etc them if it were the case.
The fact is that I searched for ways of gathering statistics of account usage. The alternatives that I found were:
First, save the statistics in 2 attributes in each user: lastBind, failedBinds.
1. For each service, whenever a bind from a user has done to LDAP, send a ldapmodify operation for this user and if the bind was successful, write in user.lastBind the timestamp. If it was not, increment failedBinds++.
It implies the modification of each service, taking in account that all has to be documented, that in many services the implementation is not trivial, and also taking care of the upgrades of the services. In conclusion, a lot of work and
constant modifications and checks.
2. Act on the LDAP server and activate the "overlay accesslog" funcionality. In this case, monitor every bind operation, then create a daemon that reads every X time the LDAP accesslog tree and process it.
For each entry processed:
- Delete it from the ldap accesslog tree.
- Check if the reqResult was 49 (invalid creds.) or 0 (success).
- If it was 49, ldapsearch the reqDN who made the bind request, and read his failedBins attribute. Increment it in one, and send a ldapmodify to the user and with the new value of failedBinds.
- If it was 0, ldapmodify the reqDN setting the lastBind as reqEnd.
I programmed it in C++ and ldapc++ library, and it works. But the fact is that I am not convinced of this solution. It saved us from the audit but for the future there are some problems to take into account:
- Deleting the ldap entry every time it's read is bad, because then we cannot use the overlay for delta syncrepl.
- Every 10 minutes, ldap deletes the oldest entries, making that in some cases my dameon can fail (treated with an exception, but not cool).
- 3000 binds / 10 minutes in normal hours. Up to 40.000 binds in one Monday morning.
My question is obvious. Is there any way other than the daemon, the first option, or suicide, to accomplish the requeriments of the audit? How does a big company to register the last bind of every user account, if this account can use
many different and heterogenous services? (VPN, FTP, WEBs, propietary software, Windows samba, Linux login, etc.)
Best regards, sorry for my bad english and for my big post!.