Re: SASL EXTERNAL binds and sasl-secprops minssf > 0

2017-08-08 Thread Michael Ströder
Quanah Gibson-Mount wrote:
> --On Saturday, August 05, 2017 3:05 PM -0400 David Hawes  
> wrote:
> 
>> With ITS #8568 [1], I notice that the first SASL EXTERNAL (using TLS
>> client auth) bind on a connection succeeds, but subsequent SASL
>> EXTERNAL binds on the same connection fail with:
>>
>> slapd[31088]: conn=1009 op=3 RESULT tag=97 err=48 text=SASL(-15):
>> mechanism too weak for this user: mech EXTERNAL is too weak
> 
> Please file an ITS for this, thanks.  I would think the expected behavior for 
> SASL/EXTERNAL is the SASL SSF matches the TLS SSF, given it's a TLS encrypted
> connection.

This whole SSF numbering stuff is - ummh, let's say - interesting. ;-)

If a client connects via TLS with strong cipher suite (full-featured PFS, 
yeah!) but uses
a 512-bit RSA key in its client certificate with SASL/EXTERNAL should this be 
counted to
have a strong SSF?

So better do not use SSF values in a fine-grained security policy.

Ciao, Michael.



smime.p7s
Description: S/MIME Cryptographic Signature


Re: SASL EXTERNAL binds and sasl-secprops minssf > 0

2017-08-08 Thread David Hawes
On 7 August 2017 at 11:37, Quanah Gibson-Mount  wrote:
> --On Saturday, August 05, 2017 3:05 PM -0400 David Hawes 
> wrote:
>
>> With ITS #8568 [1], I notice that the first SASL EXTERNAL (using TLS
>> client auth) bind on a connection succeeds, but subsequent SASL
>> EXTERNAL binds on the same connection fail with:
>>
>> slapd[31088]: conn=1009 op=3 RESULT tag=97 err=48 text=SASL(-15):
>> mechanism too weak for this user: mech EXTERNAL is too weak
>
>
> Please file an ITS for this, thanks.  I would think the expected behavior
> for SASL/EXTERNAL is the SASL SSF matches the TLS SSF, given it's a TLS
> encrypted connection.
>

ITS filed:

http://www.openldap.org/its/index.cgi/Incoming?id=8708;selectid=8708



Re: SASL EXTERNAL binds and sasl-secprops minssf > 0

2017-08-07 Thread Quanah Gibson-Mount
--On Saturday, August 05, 2017 3:05 PM -0400 David Hawes  
wrote:



With ITS #8568 [1], I notice that the first SASL EXTERNAL (using TLS
client auth) bind on a connection succeeds, but subsequent SASL
EXTERNAL binds on the same connection fail with:

slapd[31088]: conn=1009 op=3 RESULT tag=97 err=48 text=SASL(-15):
mechanism too weak for this user: mech EXTERNAL is too weak


Please file an ITS for this, thanks.  I would think the expected behavior 
for SASL/EXTERNAL is the SASL SSF matches the TLS SSF, given it's a TLS 
encrypted connection.


--Quanah



--

Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP: