--On Monday, March 06, 2006 9:34 PM +0100 Geert Jansen <[EMAIL PROTECTED]>
wrote:
Kurt D. Zeilenga wrote:
At 09:42 AM 3/5/2006, Geert Jansen wrote:
The attached patch implements UID based authorization for anonymous
connections. It adds an keyword "uid=xxx" to the access control syntax,
much like the "ssf=xxx" keyword that is already there (in fact the
implementation is largely copied from that). This feature is useful for
granting local processes access to protected attributes without the
requirement of adding clear-text passwords to configuration files.
Or you could just use SASL/EXTERNAL bind (assuming your client
supports it, of course. If not, well, I'd work with its developer
to add it.)
I will try that as well. However, current support for this is very poor
amongst LDAP clients. My email server (postfix), IMAP server (dovecot)
and web server (apache) all do not support SASL binds.
Of course, fixing postfix is trivial. I was able to write a patch for it
to support SASL binds in about 20 minutes.
See:
<http://www.stanford.edu/services/directory/openldap/integration/postfix.html>
for that patch.
You should be able to patch anything you have source to fairly easily.
Stanford already wrote a module (mod_webauth) that does SASL binds to our
directory servers.
We also already have an updated version of Shibboleth that supports SASL
binds via JNDI, too.
As for your 'dovecot' IMAP server, if you have access to the source and it
has even basic LDAP support, you should be able to patch it fairly simply.
The solution here really is to fix the clients, not break the server.
--Quanah
--
Quanah Gibson-Mount
Principal Software Developer
ITS/Shared Application Services
Stanford University
GnuPG Public Key: http://www.stanford.edu/~quanah/pgp.html