[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
RE: Password policy messages - how can I pass back
I looked at the slapo-ppolicy man page. It's a shame ppolicy doesn't have
something like the following from the chain overlay:
chain-return-error {FALSE|true}
In case referral chasing fails, the real error is returned
instead of the orig‐
inal referral. In case multiple referral URIs are present,
only the first
error is returned. This behavior may not be always
appropriate nor desirable,
since failures in referral chasing might be better resolved by
the client (e.g.
when caused by distributed authentication issues).
Jason Trupp
Symas Corporation
(855) LDAP-GUY
-----Original Message-----
From: openldap-technical [mailto:openldap-technical-bounces@openldap.org] On
Behalf Of Ervin Hegedüs
Sent: Wednesday, October 10, 2018 1:16 PM
To: openldap-technical@openldap.org
Subject: Password policy messages - how can I pass back
Hi there,
there is a password policy external module with this config:
dn: cn=default,ou=pwpolicies,dc=hu
cn: default
objectClass: pwdPolicy
objectClass: pwdPolicyChecker
objectClass: device
pwdAllowUserChange: TRUE
pwdInHistory: 5
pwdMinLength: 10
pwdAttribute: userPassword
pwdCheckQuality: 1
pwdCheckModule: pwdCheckModule-poc.so
I've grabbed this source:
https://github.com/bindle/bofh-pwdCheckModules
Everything works as well: I can change the password with ldappasswd tool, or
ldap_exop() in PHP - the policy check works in both cases.
I just have one question: is there any way to send back to the client the
error message?
I mean:
# /usr/bin/ldappasswd -H ldaps://dev-ldap-01 -w "secret" -D
"UID="dminuser,dc=hu" -s "abcdefghijkl" "uid=airween,ou=Users,dc=hu"
Result: Constraint violation (19)
There isn't any detailed information, what's the reason why the policy
module drops the request, but I can see that in the logfile:
Oct 10 20:05:21 dev-ldap-01 slapd[16312]: check_password_quality: module
error: (pwdCheckModule-poc.so) Passwords less than 16 characters require at
least 3 traits (upper case, lower case, digits, or special characters).[1]
Oct 10 20:05:21 dev-ldap-01 slapd[16312]: send_ldap_result: conn=1742 op=1
p=3 Oct 10 20:05:21 dev-ldap-01 slapd[16312]: send_ldap_result: err=19
matched="" text="Passwords less than 16 characters require at least 3 traits
(upper case, lower case, digits, or special characters)"
It would be very good to catch this message at client side.
Is it possible?
Note, that in PHP side I'm using:
ldap_get_option($ldapconn, LDAP_OPT_DIAGNOSTIC_MESSAGE, $_err);
and $_err variable is empty.
When I send the old password, which exists in history, I got:
ldappasswd -H ldaps://... ... ... -s "oldpasswd" "uid=airween,..."
Result: Constraint violation (19)
Additional info: Password is not being changed from existing value
in PHP:
"Password is not being changed from existing value"
In syslog I can see:
Oct 10 20:09:36 dev-ldap-01 slapd[16312]: send_ldap_result: err=19
matched="" text="Password is not being changed from existing value"
Oct 10 20:09:36 dev-ldap-01 slapd[16312]: send_ldap_extended: err=19 oid=
len=0 Oct 10 20:09:36 dev-ldap-01 slapd[16312]: send_ldap_response: msgid=2
tag=120 err=19 Oct 10 20:09:36 dev-ldap-01 slapd[16312]: conn=1743 op=1
RESULT oid= err=19 text=Password is not being changed from existing value
Should I fill some member of Entry struct in 3rd argument in policy module?
int check_password (char *pPasswd, char **ppErrStr, Entry *pEntry)
....................................................^^^^^^^^^^^^^^
Thanks,
a.