Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-06 Thread Will Sheldon

I’m not too concerned on the default as long as the user is warned (or even 
maybe asked) at install time.  


Kind regards,

Will Sheldon
+1.778-689-1244


On Monday, January 6, 2014 at 1:57 PM, Sigbjorn Lie wrote:

 On 03/01/14 20:33, Stephen Ingram wrote:
  On Fri, Jan 3, 2014 at 10:29 AM, Dmitri Pal d...@redhat.com 
  (mailto:d...@redhat.com) wrote:
   On 01/03/2014 12:50 PM, Will Sheldon wrote:  
Thanks Petr, that certainly makes sense from the point of view of 
functionality.  
 
I do think the default is sane, but there are a lot of possible 
deployment scenarios and my concern is that a junior or time poor admin 
looking to implement a trusted, secure solution should be made aware of 
any potential data leakage during configuration, (preferably in big red 
letters in the documentation, or better still, the install script).  
 
Though I am reluctant to draw comparisons between IPA and MS AD they do 
seem inevitable. AD restricts anonymous binds to the rootDSE entry by 
default and as such this may be considered by many to be the expected 
default. Extra care should therefore be made to point out this 
difference. To do otherwise risks undermining the confidence of users 
in the security of the solution.

   It is a double edge sword. We compared IPA to LDAP based solutions and 
   with those you have (had) anonymous bind enabled by default.
   IMO it is the question of a migration. The field of centralized 
   authentication is crowded with all sorts of different solutions, though 
   not that integrated as AD or IdM.
   It seems that migrating and then tightening security to the level you 
   need is the way to go. The default you suggest might be a barrier to 
   migration as people usually tackle problems one step at a time.
   I am not against changing the default eventually but I am not sure it is 
   the time to.  

   But may be I am wrong. Are there any opinions on the matter?
   
  I think traditionally LDAP-based solutions have been used as true 
  directories where one might be able to search for people through say a 
  Web-based interface, for example at a university. Whereas AD can also be 
  deployed as a directory, but more often than not though say an email 
  Interface (e.g. Outlook) where the user has already gained access via their 
  own credentials so there was not a need to allow anonymous binds. I like 
  following the tradition of LDAP-based directories where anonymous access is 
  allowed by default, however, it would be really nice as the OP requested to 
  have controls available via the WebUI where the admin could apply ACLs to 
  the directory to restrict access to various areas. As changing the overall 
  access scheme requires a directory restart, I'm not too sure how easy it 
  would be to incorporate that into the WebUI, but maybe a notice somewhere 
  to re-enforce the open nature of the directory if the default is 
  retained.  
   
   
  
 Not to start a flame war here - but I would like to say I disagree with you. 
 :)
  
 The traditional LDAP-based solutions you're mentioning keep information that 
 would be open to the public, such as a phone directory.
  
 However IPA (like AD) keep sensitive information that should not be open to 
 the public. From a security standpoint it's much easier to forget to secure a 
 piece of information in an open directory, than to simply close the directory 
 off and only open for known entities. In my point of view, it's better to 
 keep these directories closed by default, to anything but authenticated 
 requests.
  
 It's a great thing that IPA can easily be configured to either be open or 
 closed to anonymous requests by default. :)
  
  
 Regards,
 Siggi
  
  
  
 ___
 Freeipa-users mailing list
 Freeipa-users@redhat.com (mailto:Freeipa-users@redhat.com)
 https://www.redhat.com/mailman/listinfo/freeipa-users
  
  


___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-03 Thread Petr Viktorin

On 01/03/2014 02:23 AM, Will Sheldon wrote:


This is cause for concern. Is there a hardening / best practices for
production guide anywhere, did I miss a section of the documentation?

What else do I need to secure?

I understand that there is a tradeoff between security and
compatibility, but maybe there should be a ipa-secure script somewhere?


We are working on making the read permissions granular, so you can make 
your own tradeoffs if IPA defaults aren't appropriate for your use.


The work is tracked in https://fedorahosted.org/freeipa/ticket/3566 and 
linked tickets 4032-4034.



On Wed, Jan 1, 2014 at 10:41 AM, Jitse Klomp jitsekl...@gmail.com
mailto:jitsekl...@gmail.com wrote:

It is possible to disable anonymous binds to the directory server.
Take a look at

https://docs.fedoraproject.__org/en-US/Fedora/18/html/__FreeIPA_Guide/disabling-anon-__binds.html

https://docs.fedoraproject.org/en-US/Fedora/18/html/FreeIPA_Guide/disabling-anon-binds.html

  - Jitse



On 01/01/2014 07:01 PM, Rajnesh Kumar Siwal wrote:

It exposes the details of all the users/admins in the environment.
There should be a user that the IPA should use to fetch the
details from
the IPA Servers. Without Authentication , no one should be able
to fetch
any information from the IPA Server.



--
Petr³

___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users


Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-03 Thread Will Sheldon
Thanks Petr, that certainly makes sense from the point of view of
functionality.

I do think the default is sane, but there are a lot of possible deployment
scenarios and my concern is that a junior or time poor admin looking to
implement a trusted, secure solution should be made aware of any potential
data leakage during configuration, (preferably in big red letters in the
documentation, or better still, the install script).

Though I am reluctant to draw comparisons between IPA and MS AD they do
seem inevitable. AD restricts anonymous binds to the rootDSE entry by
default and as such this may be considered by many to be the expected
default. Extra care should therefore be made to point out this difference.
To do otherwise risks undermining the confidence of users in the security
of the solution.



On Fri, Jan 3, 2014 at 4:53 AM, Petr Viktorin pvikt...@redhat.com wrote:

 On 01/03/2014 02:23 AM, Will Sheldon wrote:


 This is cause for concern. Is there a hardening / best practices for
 production guide anywhere, did I miss a section of the documentation?

 What else do I need to secure?

 I understand that there is a tradeoff between security and
 compatibility, but maybe there should be a ipa-secure script somewhere?


 We are working on making the read permissions granular, so you can make
 your own tradeoffs if IPA defaults aren't appropriate for your use.

 The work is tracked in https://fedorahosted.org/freeipa/ticket/3566 and
 linked tickets 4032-4034.

  On Wed, Jan 1, 2014 at 10:41 AM, Jitse Klomp jitsekl...@gmail.com
 mailto:jitsekl...@gmail.com wrote:

 It is possible to disable anonymous binds to the directory server.
 Take a look at
 https://docs.fedoraproject.__org/en-US/Fedora/18/html/__
 FreeIPA_Guide/disabling-anon-__binds.html

 https://docs.fedoraproject.org/en-US/Fedora/18/html/
 FreeIPA_Guide/disabling-anon-binds.html

   - Jitse



 On 01/01/2014 07:01 PM, Rajnesh Kumar Siwal wrote:

 It exposes the details of all the users/admins in the environment.
 There should be a user that the IPA should use to fetch the
 details from
 the IPA Servers. Without Authentication , no one should be able
 to fetch
 any information from the IPA Server.



 --
 Petr³


 ___
 Freeipa-users mailing list
 Freeipa-users@redhat.com
 https://www.redhat.com/mailman/listinfo/freeipa-users




-- 

Kind regards,

Will Sheldon
+1.(778)-689-4144
___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-03 Thread Dmitri Pal
On 01/03/2014 12:50 PM, Will Sheldon wrote:
 Thanks Petr, that certainly makes sense from the point of view of
 functionality.

 I do think the default is sane, but there are a lot of possible
 deployment scenarios and my concern is that a junior or time poor
 admin looking to implement a trusted, secure solution should be made
 aware of any potential data leakage during configuration, (preferably
 in big red letters in the documentation, or better still, the install
 script).

 Though I am reluctant to draw comparisons between IPA and MS AD they
 do seem inevitable. AD restricts anonymous binds to the rootDSE entry
 by default and as such this may be considered by many to be the
 expected default. Extra care should therefore be made to point out
 this difference. To do otherwise risks undermining the confidence of
 users in the security of the solution.

It is a double edge sword. We compared IPA to LDAP based solutions and
with those you have (had) anonymous bind enabled by default.
IMO it is the question of a migration. The field of centralized
authentication is crowded with all sorts of different solutions, though
not that integrated as AD or IdM.
It seems that migrating and then tightening security to the level you
need is the way to go. The default you suggest might be a barrier to
migration as people usually tackle problems one step at a time.
I am not against changing the default eventually but I am not sure it is
the time to.

But may be I am wrong. Are there any opinions on the matter? 




 On Fri, Jan 3, 2014 at 4:53 AM, Petr Viktorin pvikt...@redhat.com
 mailto:pvikt...@redhat.com wrote:

 On 01/03/2014 02:23 AM, Will Sheldon wrote:


 This is cause for concern. Is there a hardening / best
 practices for
 production guide anywhere, did I miss a section of the
 documentation?

 What else do I need to secure?

 I understand that there is a tradeoff between security and
 compatibility, but maybe there should be a ipa-secure script
 somewhere?


 We are working on making the read permissions granular, so you can
 make your own tradeoffs if IPA defaults aren't appropriate for
 your use.

 The work is tracked in
 https://fedorahosted.org/freeipa/ticket/3566 and linked tickets
 4032-4034.

 On Wed, Jan 1, 2014 at 10:41 AM, Jitse Klomp
 jitsekl...@gmail.com mailto:jitsekl...@gmail.com
 mailto:jitsekl...@gmail.com mailto:jitsekl...@gmail.com
 wrote:

 It is possible to disable anonymous binds to the directory
 server.
 Take a look at

 
 https://docs.fedoraproject.__org/en-US/Fedora/18/html/__FreeIPA_Guide/disabling-anon-__binds.html



 
 https://docs.fedoraproject.org/en-US/Fedora/18/html/FreeIPA_Guide/disabling-anon-binds.html

   - Jitse



 On 01/01/2014 07:01 PM, Rajnesh Kumar Siwal wrote:

 It exposes the details of all the users/admins in the
 environment.
 There should be a user that the IPA should use to
 fetch the
 details from
 the IPA Servers. Without Authentication , no one
 should be able
 to fetch
 any information from the IPA Server.



 -- 
 Petr³


 ___
 Freeipa-users mailing list
 Freeipa-users@redhat.com mailto:Freeipa-users@redhat.com
 https://www.redhat.com/mailman/listinfo/freeipa-users




 -- 

 Kind regards,

 Will Sheldon
 +1.(778)-689-4144


 ___
 Freeipa-users mailing list
 Freeipa-users@redhat.com
 https://www.redhat.com/mailman/listinfo/freeipa-users


-- 
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


---
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/



___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-03 Thread Stephen Ingram
On Fri, Jan 3, 2014 at 10:29 AM, Dmitri Pal d...@redhat.com wrote:

  On 01/03/2014 12:50 PM, Will Sheldon wrote:

  Thanks Petr, that certainly makes sense from the point of view of
 functionality.

 I do think the default is sane, but there are a lot of possible deployment
 scenarios and my concern is that a junior or time poor admin looking to
 implement a trusted, secure solution should be made aware of any potential
 data leakage during configuration, (preferably in big red letters in the
 documentation, or better still, the install script).

  Though I am reluctant to draw comparisons between IPA and MS AD they do
 seem inevitable. AD restricts anonymous binds to the rootDSE entry by
 default and as such this may be considered by many to be the expected
 default. Extra care should therefore be made to point out this difference.
 To do otherwise risks undermining the confidence of users in the security
 of the solution.


 It is a double edge sword. We compared IPA to LDAP based solutions and
 with those you have (had) anonymous bind enabled by default.
 IMO it is the question of a migration. The field of centralized
 authentication is crowded with all sorts of different solutions, though not
 that integrated as AD or IdM.
 It seems that migrating and then tightening security to the level you need
 is the way to go. The default you suggest might be a barrier to migration
 as people usually tackle problems one step at a time.
 I am not against changing the default eventually but I am not sure it is
 the time to.

 But may be I am wrong. Are there any opinions on the matter?


I think traditionally LDAP-based solutions have been used as true
directories where one might be able to search for people through say a
Web-based interface, for example at a university. Whereas AD can also be
deployed as a directory, but more often than not though say an email
Interface (e.g. Outlook) where the user has already gained access via their
own credentials so there was not a need to allow anonymous binds. I like
following the tradition of LDAP-based directories where anonymous access is
allowed by default, however, it would be really nice as the OP requested to
have controls available via the WebUI where the admin could apply ACLs to
the directory to restrict access to various areas. As changing the overall
access scheme requires a directory restart, I'm not too sure how easy it
would be to incorporate that into the WebUI, but maybe a notice somewhere
to re-enforce the open nature of the directory if the default is retained.

Steve
___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-03 Thread Dmitri Pal
On 01/03/2014 02:33 PM, Stephen Ingram wrote:
 On Fri, Jan 3, 2014 at 10:29 AM, Dmitri Pal d...@redhat.com
 mailto:d...@redhat.com wrote:

 On 01/03/2014 12:50 PM, Will Sheldon wrote:
 Thanks Petr, that certainly makes sense from the point of view of
 functionality.

 I do think the default is sane, but there are a lot of possible
 deployment scenarios and my concern is that a junior or time poor
 admin looking to implement a trusted, secure solution should be
 made aware of any potential data leakage during configuration,
 (preferably in big red letters in the documentation, or better
 still, the install script).

 Though I am reluctant to draw comparisons between IPA and MS AD
 they do seem inevitable. AD restricts anonymous binds to the
 rootDSE entry by default and as such this may be considered by
 many to be the expected default. Extra care should therefore be
 made to point out this difference. To do otherwise risks
 undermining the confidence of users in the security of the solution.

 It is a double edge sword. We compared IPA to LDAP based solutions
 and with those you have (had) anonymous bind enabled by default.
 IMO it is the question of a migration. The field of centralized
 authentication is crowded with all sorts of different solutions,
 though not that integrated as AD or IdM.
 It seems that migrating and then tightening security to the level
 you need is the way to go. The default you suggest might be a
 barrier to migration as people usually tackle problems one step at
 a time.
 I am not against changing the default eventually but I am not sure
 it is the time to.

 But may be I am wrong. Are there any opinions on the matter?  


 I think traditionally LDAP-based solutions have been used as true
 directories where one might be able to search for people through say a
 Web-based interface, for example at a university. Whereas AD can also
 be deployed as a directory, but more often than not though say an
 email Interface (e.g. Outlook) where the user has already gained
 access via their own credentials so there was not a need to allow
 anonymous binds. I like following the tradition of LDAP-based
 directories where anonymous access is allowed by default, however, it
 would be really nice as the OP requested to have controls available
 via the WebUI where the admin could apply ACLs to the directory to
 restrict access to various areas. As changing the overall access
 scheme requires a directory restart, I'm not too sure how easy it
 would be to incorporate that into the WebUI, but maybe a notice
 somewhere to re-enforce the open nature of the directory if the
 default is retained.

 Steve
As it was mentioned there are two options. The anonymous bind can be
globally disabled. IMO it is not a UI option it is a deployment option.
The ability to create fine grain access control rules including read
access are in works as Petr mentioned in the earlier email. Seems like
we are covered or I am missing something?

-- 
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


---
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/



___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-03 Thread Stephen Ingram
On Fri, Jan 3, 2014 at 11:37 AM, Dmitri Pal d...@redhat.com wrote:

  On 01/03/2014 02:33 PM, Stephen Ingram wrote:

 On Fri, Jan 3, 2014 at 10:29 AM, Dmitri Pal d...@redhat.com wrote:

  On 01/03/2014 12:50 PM, Will Sheldon wrote:

  Thanks Petr, that certainly makes sense from the point of view of
 functionality.

 I do think the default is sane, but there are a lot of possible
 deployment scenarios and my concern is that a junior or time poor admin
 looking to implement a trusted, secure solution should be made aware of any
 potential data leakage during configuration, (preferably in big red letters
 in the documentation, or better still, the install script).

  Though I am reluctant to draw comparisons between IPA and MS AD they do
 seem inevitable. AD restricts anonymous binds to the rootDSE entry by
 default and as such this may be considered by many to be the expected
 default. Extra care should therefore be made to point out this difference.
 To do otherwise risks undermining the confidence of users in the
 security of the solution.


 It is a double edge sword. We compared IPA to LDAP based solutions and
 with those you have (had) anonymous bind enabled by default.
 IMO it is the question of a migration. The field of centralized
 authentication is crowded with all sorts of different solutions, though not
 that integrated as AD or IdM.
 It seems that migrating and then tightening security to the level you
 need is the way to go. The default you suggest might be a barrier to
 migration as people usually tackle problems one step at a time.
 I am not against changing the default eventually but I am not sure it is
 the time to.

 But may be I am wrong. Are there any opinions on the matter?


  I think traditionally LDAP-based solutions have been used as true
 directories where one might be able to search for people through say a
 Web-based interface, for example at a university. Whereas AD can also be
 deployed as a directory, but more often than not though say an email
 Interface (e.g. Outlook) where the user has already gained access via their
 own credentials so there was not a need to allow anonymous binds. I like
 following the tradition of LDAP-based directories where anonymous access is
 allowed by default, however, it would be really nice as the OP requested to
 have controls available via the WebUI where the admin could apply ACLs to
 the directory to restrict access to various areas. As changing the overall
 access scheme requires a directory restart, I'm not too sure how easy it
 would be to incorporate that into the WebUI, but maybe a notice somewhere
 to re-enforce the open nature of the directory if the default is retained.

  Steve

 As it was mentioned there are two options. The anonymous bind can be
 globally disabled. IMO it is not a UI option it is a deployment option.
 The ability to create fine grain access control rules including read
 access are in works as Petr mentioned in the earlier email. Seems like we
 are covered or I am missing something?


Sounds good to me. I was just throwing in a comment on why I thought
anonymous bind is and should be the default behavior.

Steve
___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-02 Thread Will Sheldon
This is cause for concern. Is there a hardening / best practices for
production guide anywhere, did I miss a section of the documentation?

What else do I need to secure?

I understand that there is a tradeoff between security and compatibility,
but maybe there should be a ipa-secure script somewhere?


On Wed, Jan 1, 2014 at 10:41 AM, Jitse Klomp jitsekl...@gmail.com wrote:

 It is possible to disable anonymous binds to the directory server. Take a
 look at https://docs.fedoraproject.org/en-US/Fedora/18/html/
 FreeIPA_Guide/disabling-anon-binds.html

  - Jitse



 On 01/01/2014 07:01 PM, Rajnesh Kumar Siwal wrote:

 It exposes the details of all the users/admins in the environment.
 There should be a user that the IPA should use to fetch the details from
 the IPA Servers. Without Authentication , no one should be able to fetch
 any information from the IPA Server.


 ___
 Freeipa-users mailing list
 Freeipa-users@redhat.com
 https://www.redhat.com/mailman/listinfo/freeipa-users




-- 

Kind regards,

Will Sheldon
+1.(778)-689-4144
___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

[Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-01 Thread Rajnesh Kumar Siwal
Hi,

IPA has really been a great Project.
But, I was really concerned about the security of IPA
I have been testing it on RHEL 7 Beta for some time.
ldapsearch is able to fetch the details from the IPA Server without
Authentication.
I would appreciate if IPA team could work on securing the IPA Server as it
the most critical server if installed in an infrastructure.
It exposes the details of all the users/admins in the environment.
There should be a user that the IPA should use to fetch the details from
the IPA Servers. Without Authentication , no one should be able to fetch
any information from the IPA Server.

-- 
Regards,
Rajnesh Kumar Siwal
___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Re: [Freeipa-users] FreeIPA Security issue : Anonymous user can fetch user details from IPA without authenticating

2014-01-01 Thread Jitse Klomp
It is possible to disable anonymous binds to the directory server. Take 
a look at 
https://docs.fedoraproject.org/en-US/Fedora/18/html/FreeIPA_Guide/disabling-anon-binds.html


 - Jitse


On 01/01/2014 07:01 PM, Rajnesh Kumar Siwal wrote:

It exposes the details of all the users/admins in the environment.
There should be a user that the IPA should use to fetch the details from
the IPA Servers. Without Authentication , no one should be able to fetch
any information from the IPA Server.


___
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users