Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 13834 invoked from network); 11 Jul 2007 06:36:44 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 11 Jul 2007 06:36:44 -0000 Received: (qmail 36069 invoked by uid 500); 11 Jul 2007 06:36:36 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 35540 invoked by uid 500); 11 Jul 2007 06:36:34 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 35529 invoked by uid 99); 11 Jul 2007 06:36:34 -0000 Received: from herse.apache.org (HELO herse.apache.org) (140.211.11.133) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 10 Jul 2007 23:36:34 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: pass (herse.apache.org: local policy) Received: from [83.236.212.130] (HELO mail.imfn.org) (83.236.212.130) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 10 Jul 2007 23:36:31 -0700 Received: (qmail 22057 invoked by uid 1011); 11 Jul 2007 08:35:09 +0200 Received: from 10.10.10.66 by mail.imfn.net (envelope-from , uid 1002) with qmail-scanner-2.01st (clamdscan: 0.90rc2/2162. spamassassin: 3.1.3. perlscan: 2.01st. Clear:RC:1(10.10.10.66):. Processed in 0.088621 secs); 11 Jul 2007 06:35:09 -0000 Received: from unknown (HELO ?10.10.10.66?) (10.10.10.66) by 10.10.20.2 with SMTP; 11 Jul 2007 08:35:08 +0200 Message-ID: <46947A58.60700@radion.org> Date: Wed, 11 Jul 2007 08:36:08 +0200 From: Kamil Wencel User-Agent: Thunderbird 2.0.0.4 (Windows/20070604) MIME-Version: 1.0 To: users@httpd.apache.org, openldap-software@openldap.org References: <4693834E.3010206@radion.org> <813716b60707100653m38f4797fke392e982eb08e2db@mail.gmail.com> <4693A364.7040008@radion.org> <46940A9D.4060002@pc-tony.com> In-Reply-To: <46940A9D.4060002@pc-tony.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org Subject: FYI: [users@httpd] Apache 2.2.4 / Auth LDAP / OpenLDAP 2.3.35 User authentication [solved] Tony Stevenson schrieb: > Kamil, > Did you try anything I suggested in my last email? > Wrapping the CN in "'s, i.e "Tony Stevenson" or in your case "U000001 " Yes, without success. > Also, why dont you create a group per person, and use the group option, > as my other mail suggested. Both of these should work. Because that is not what I had in mind. If I'd have to have a weird LDAP structure in order to get this to fly (and I consider creating numerous groups for everyone who actually is in the same ou=DAV (group) very weird) I wouldn't want to use LDAP. Nevertheless, thanks for all the efforts but I managed to solve the matter after six more hours trial and error myself. The "problem" was completely elsewhere and no hint in mod_auhnz_ldap's error messages could lead you there: LDAP Access restrictions! My OpenLDAP defaultaccess restriction was set to none and my access rule access to attr="userpassword" by self write by * compare obviously didn't work. As soon as I set defaultaccess to write it worked. No matter how hard I try I can't get THIS out of neither mod_authnz_ldap's nor openldap's error/debug logs. I went mad as I set the defaultaccess restriction to write and it just worked right away. Well,I just have to dig deeper regarding LDAP access rules in order to get that right because I don't want the defaultaccess to be "write". If anyone from the ldap list can tell me why this didn't work with the following rules in slapd.conf I would really appreciate it: defaultaccess none access to attr="userpassword" by self write by * compare access to * by self write by dn=".+" read by * none access to * by dn="^$$" none by * read My testing suggested that mod_authnz_ldap needs at least compare access in order to verify the user. READ alone does not work. I thought that my first access rule would permit that. Currently the passwords are stored in cleartext but I really don't consider that productive. Do I just have to set password-hash{MD5}in slapd.conf so that both the password storage is MD5 AND the comparison automatically use MD5 too ? Well, I tried it anyway but to no avail. I ask because I saw mod_authnz_ldap sending the password to compare in cleartext (tcpdump) to openldap. How does one encrypt the passwords when the comparison string is delivered in cleartext ? Does openldap automatically generate the hash of the submitted cleartext password based on the {MD5} hash descriptor stored in userPassword and THEN compare the hashes (which I would consider the expected behaviour) because I cannot tell mod_authnz_ldap to submit it hashed (well yeah except for rewriting the module), can I ? Apart from that you're out again openldap-list, thanks. Today I'll try to "backport" my config to the original DAV container config and check if it's working in conjunction with DAV too (currently I don't foresee any reasons why it shouldn't). Also it could have been easily avoided if one of the logs could have made more efforts to tell me that I hit access restrictions which failed my compare. Maybe there will be some time in the future to make verbose REALLY verbose (just my 2cents) Have a nice day, thanks a lot for all suggestions and sorry for cross-posting... Kamil -- Kamil Wencel RADION Imaginery Swakopmunder Str. 1 81827 Munich --------------------------------------------------------- voice office : +49 89 4522058-1 voice mobile : +49 174 3050550 fax-server : +49 89 4522058-9 ---------------------------------------------------------- browser : http://imaginery.radion.org/ --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org