On Wed, Nov 10, 2010 at 6:43 PM, Emmanuel Lecharny <firstname.lastname@example.org>
On 11/10/10 5:11 PM, email@example.com wrote:
I have been exploring the possibility of using the ApacheDS Kerberos
LDAP asn.1 is using BER encoding, when Kerberos is using DER. Not really a big deal though, as we are encoding and decoding the PDU the same way.
implementation in another application in which the backing store would not
be an LDAP server. There seem to be a number of areas in which the
Kerberos modules are entangled with the LDAP code. One area of particular
note is Kerberos' use of the ASN1 packages in "shared-ldap". As a test I
created a "shared-asn1" module containing all the ASN1 packages but none
of the LDAP packages. The module satisfied all of Kerberos' needs and the
jar file was only 81Kb whereas the shared-ldap jar file is over 1500 Kb.
So I'm asking the developer's opinion regarding separating the ASN1
packages from shared-ldap and created a "shared-asn1" module. The
relatively small size of such a module wouldn't seem to be a concern as
there are other modules, such as dsml-engine at only 14.5 Kb. I assume
that the ASN1 packages were originally created for the LDAP message
parsing but they clearly have application in non-LDAP protocols as
evidenced by their use in the Kerberos implementation.
FYI, we had a separate package shared-asn1 6 months earlier, and we decided to merge it into shared, just because it's a PITA to deal with many jars when building an application on top of shared (we have more than one : the server of course, but also the installers, Studio, the API, groovy-LDAP)
This was exactly one of the reasons why we separated out some modules. It is foreseeable that people want a small footprint and multiple jars and modules is really not bad. With the boom around low resource devices it's inevitable that our LDAP and KRB5 clients and libraries will be used in them. In fact we should separate out everything based on protocol. The should be a shared-ldap and shared-krb module and the associated asn1 classes/interfaces should be in the respective modules.
I will be investigating the other LDAP code dependencies in the Kerberos
There are not too many.
code as well.
True not many.
I'm just wondering if it would not be better to use the full stack, except that the Backend could be a SQL implementation.
On another topic... I raised the question some weeks ago about interest
in a RADIUS implementation. Since then I have written one using Mina 2.0
and modelled loosely on ApacheDS Kerberos. It was carefully crafted to be
independent of the information store implementation by including
definitions of a few Interfaces to be implemented by the instantiating
framework. I have created implementations of the interfaces that use a
SQL DB as the store and hope to have it deployed in a real-world
environment for intial testing in the next few weeks.
+1 - I recommend this approach. There will be several benefits to this.
(1) Configuration in DIT for your server even if the store for your users is not in LDAP natively.
(2) This will allow you to present user data in LDAP even if the store is not LDAP and this has great value since most user information is stored in LDAP.
(3) When we have auto-reconfiguration working for DIT based service configurations the RADIUS can auto-reconfigure if the configuration is changed in the DIT.
(4) Eventually we'll use OSGi to enable modularization and micro-rebooting and you'll automatically gain from this.
(5) This really is where RADIUS data should go anyways since you'll gain from the replication subsystem and have high availability for your service.
There's more but I'm sure this is enough to convince many. We can talk more about this if you like.
Another pluggable aspect to the design is the use of request "Evaluators"
Of course we are ! The question is : who will maintain it ? Are you going to be around ? If so, that would be a pleasure !
strung together using a "commons-chain" framework. I have created request
evaluators for PAP, CHAP, and MS-CHAP authentication requests (all based
on the availability of the users' clear-text password, Proxy forwarding to
another RADIUS server based on the domain name in the User-Name attribute
of the request, and Accounting message processing. I've also begun
creating the framework needed to handle EAP requests but it isn't
complete. Also the Accounting evaluator currently only accepts or rejects
messages based on whether it can find the specified user in the data
store, but always discards the message content. Clearly more is needed
I am planning to donate this RADIUS implementation to the Apache Directory
project if you're interested in incorporating it.
Yes that's great news - it's a wonderful addition to the set of protocols we already have. Nice to have DIAMETER as well :-). But you're more important to us than the code you donate. Code is static, it's the community that gives the code life.
If you're interested in getting involved and building this thing up we can start off by creating a sandbox project for the RADIUS server. Slowly as you get it operational and integrated we can start working on releasing it in the server.
That's a non issue at this point. We can work out a solution.
implementation of the data store interfaces which uses the ADS LDAP is
required in order for it to be useable within Apache Directory.
Unfortunately I have no experience creating applications which make
My Radius book is still in the bookshelf, I have to open it again (it was 3 years ago the last time I browse it) before I can bring some valuable insights atm...
extensive use of an LDAP store. Some basic information about each NAS
(network access server) which are the "clients" of a RADIUS server is
needed. Additionally, attributes which are to be incorporated into server
responses need to be associated with individual users, groups of users,
groups of NAS's, etc. Since I've also never been a RADIUS server
administrator, my familiarity with configuration management is limited to
what I've read in the descriptions of other servers such as FreeRADIUS and
Microsoft IAS. It is my understanding that making the decision-making as
to what attributes to included in a response is generally based on testing
of the attributes included in the request. I have classes to support a
basic implementation of this idea though I'm not clear it is sufficient
for all uses.
Anyway, sounds like a very good addition.