Issue 469 - modify userpassword needs server encryption
Summary: modify userpassword needs server encryption
Status: VERIFIED FIXED
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: slapd (show other issues)
Version: unspecified
Hardware: All All
: --- normal
Target Milestone: ---
Assignee: OpenLDAP project
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2000-03-02 00:21 UTC by michiel.steltman@disway.nl
Modified: 2014-08-01 21:06 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description michiel.steltman@disway.nl 2000-03-02 00:21:27 UTC
Full_Name: Michiel Steltman
Version: 1.2.8
OS: Solaris 2.6
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (212.187.22.96)


Change request:

When a '{crypt}xxxx..' or '{sha}xxxx...' userpassword is modified with a
cleartext value, that value is written un-encrypted into the attribute.
One would expect the server to encrypt the new value instead, following a
default scheme (as in slapd.conf) or using the encryption scheme of the old
value.

Regards,

Michiel Steltman



Comment 1 Kurt Zeilenga 2000-03-02 09:41:20 UTC
changed notes
changed state Open to Closed
Comment 2 Kurt Zeilenga 2000-03-02 22:50:51 UTC
>When a '{crypt}xxxx..' or '{sha}xxxx...' userpassword is modified with a
>cleartext value, that value is written un-encrypted into the attribute.

As per the defined syntax of userPassword [X.520].

>One would expect the server to encrypt the new value instead, following a
>default scheme (as in slapd.conf) or using the encryption scheme of the old
>value.

No.  One should expect the server to perform operations upon
attributes per their defined syntax.

Your suggestion cannot be implemented without redefining the
userPassword attribute type or violating the LDAP Information
Model.  userPassword is a "user" attribute.  As such, the
server cannot muck with the client provided values.

For further discussions on this issue (RFC 2307 abuse of
userPassword), see the archives of the OpenLDAP Software <http://www.openldap.org/lists/#archives> and IETF LDAPext WG
<ftp://ftp.innosoft.com/ietf-ldapext/> mailing lists.

OpenLDAP 2.0 will sport a new attribute type (authPassword)
specifically designed to store hashed user passwords and
will support server side password generation via an extended
operation (passwd-exop).  We are working with IETF to
standardize such mechanisms.

Kurt

At 12:21 AM 3/2/00 GMT, Michiel.Steltman@disway.nl wrote:
>Full_Name: Michiel Steltman
>Version: 1.2.8
>OS: Solaris 2.6
>URL: ftp://ftp.openldap.org/incoming/
>Submission from: (NULL) (212.187.22.96)
>
>
>Change request:
>
>When a '{crypt}xxxx..' or '{sha}xxxx...' userpassword is modified with a
>cleartext value, that value is written un-encrypted into the attribute.
>One would expect the server to encrypt the new value instead, following a
>default scheme (as in slapd.conf) or using the encryption scheme of the old
>value.
>
>Regards,
>
>Michiel Steltman
>
>
>
>
>
>
Comment 3 OpenLDAP project 2014-08-01 21:06:10 UTC
Unimplementable request (conflicts with LDAP Information Model)