Return-Path: Delivered-To: apmail-directory-dev-archive@www.apache.org Received: (qmail 51919 invoked from network); 13 Aug 2010 19:31:43 -0000 Received: from unknown (HELO mail.apache.org) (140.211.11.3) by 140.211.11.9 with SMTP; 13 Aug 2010 19:31:43 -0000 Received: (qmail 91777 invoked by uid 500); 13 Aug 2010 19:31:43 -0000 Delivered-To: apmail-directory-dev-archive@directory.apache.org Received: (qmail 91688 invoked by uid 500); 13 Aug 2010 19:31:42 -0000 Mailing-List: contact dev-help@directory.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Apache Directory Developers List" Delivered-To: mailing list dev@directory.apache.org Received: (qmail 91681 invoked by uid 99); 13 Aug 2010 19:31:42 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 13 Aug 2010 19:31:42 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.22] (HELO thor.apache.org) (140.211.11.22) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 13 Aug 2010 19:31:40 +0000 Received: from thor (localhost [127.0.0.1]) by thor.apache.org (8.13.8+Sun/8.13.8) with ESMTP id o7DJVIg7016304 for ; Fri, 13 Aug 2010 19:31:18 GMT Message-ID: <1694485.337971281727878370.JavaMail.jira@thor> Date: Fri, 13 Aug 2010 15:31:18 -0400 (EDT) From: "Andreas Oberritter (JIRA)" To: dev@directory.apache.org Subject: [jira] Created: (DIRKRB-29) Using randomKey creates a valid LDAP login MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org Using randomKey creates a valid LDAP login ------------------------------------------ Key: DIRKRB-29 URL: https://issues.apache.org/jira/browse/DIRKRB-29 Project: Directory Kerberos Issue Type: Bug Affects Versions: 2.0.0 Reporter: Andreas Oberritter Assignee: Emmanuel Lecharny Fix For: 2.0.0 Setting userPassword to "randomKey" triggers the generation of Kerberos keys. However, "randomKey" also gets stored as the real LDAP users password. This creates accounts with easily guessable DNs like uid=krbtgt,ou=people,dc=example,dc=com, which can be used to access the LDAP server. -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.