directory-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Stefan Zoerner (JIRA)" <>
Subject [jira] Commented: (DIREVE-283) If anonymous access is disabled, reading the Root DSE is forbidden by the server
Date Wed, 26 Oct 2005 21:53:55 GMT
    [ ] 

Stefan Zoerner commented on DIREVE-283:

My last comment was unclear. The problem described above which causes an LdapNoPermissionException
although anonymously binds are allowed still exists, unfortunately. Only the "other problems"
mentioned in the comment are described in DIREVE-294 (and fixed, thanks to Alex!).

In order to demonstrate this remaining one I have added a test to an existing testcase here
which tries to do the same thing in Java which I have performed with command line tools as
described above. The method ("testAnonymousBindsEnabledBaseSearch") is currently commented
out because it fails.

> If anonymous access is disabled, reading the Root DSE is forbidden by the server
> --------------------------------------------------------------------------------
>          Key: DIREVE-283
>          URL:
>      Project: Directory Server
>         Type: Bug
>     Reporter: Stefan Zoerner
>     Assignee: Alex Karasulu
>      Fix For: 0.9.3

> If anonymous access is disabled, i.e. configuration is 
>  <property name="allowAnonymousAccess"><value>false</value></property>
> a client which binds anonymously is not allowed to fetch any Root DSE data. 
> $ ldapsearch -b "" -s base -p 10389 "(objectclass=*)"
> ldap_simple_bind: Insufficient access
> It is expected that a client is at least able to read the attribute supportedSASLMechanisms
if connected anonymously. This is because s/he can then decide which mechanism fits his/her
needs best, before authentication. Here is what RFC 2829 says:
> 5. Anonymous authentication
>    ...
>    LDAP implementations MUST support anonymous authentication, as
>    defined in section 5.1.
>    ...
>    While there MAY be access control restrictions to prevent access to
>    directory entries, an LDAP server SHOULD allow an anonymously-bound
>    client to retrieve the supportedSASLMechanisms attribute of the root
>    DSE.
>    ...
> It is quite normal, that LDAP servers present the other information advertised in the
Root DSE to anonymously connected clients as well (e.g. supportedLDAPVersion, namingContexts),
even if anonymous binds are not allowed (e.g. default configuration of Active Directory).
> But it seems to be up to us, which information we give anonymously bind users (except
supportedSASLMechanisms), this is what RFC 2251 says:
> 3.4. Server-specific Data Requirements
>    An LDAP server MUST provide information about itself and other
>    information that is specific to each server.  This is represented as
>    a group of attributes located in the root DSE (DSA-Specific Entry),
>    which is named with the zero-length LDAPDN.  These attributes are
>    retrievable if a client performs a base object search of the root
>    with filter "(objectClass=*)", however they are subject to access
>    control restrictions.

This message is automatically generated by JIRA.
If you think it was sent incorrectly contact one of the administrators:
For more information on JIRA, see:

View raw message