Your message dated Thu, 10 Mar 2011 23:18:58 +0000
with message-id <[email protected]>
and subject line Bug#610925: fixed in nss-pam-ldapd 0.8.1
has caused the Debian Bug report #610925,
regarding nslcd: please clarify the meaning of the $hostname variable
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
610925: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610925
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nslcd
Version: 0.7.13
Severity: normal

Hi there!

This bug is a (sorf of) follow-up for #610888 (thank you Arthur for the
quick reply).

According to the nslcd.conf manpage [1], the pam_check_host_attr option
in PADL's pam_ldap can be emulated with the following filter for
pam_authz_search:

  (&(objectClass=posixAccount)(uid=$username)(|(host=$hostname)(!(host=*))))

[1] <http://arthurdejong.org/nss-pam-ldapd/nslcd.conf.5#pam_authz_search>

However, the result is not the same as with the default behavior of
pam_check_host_attr, at least for 2 reasons:

1) 'host=*' is not honoured

   I am not an LDAP expert and I could not find any documentation
   (authoritative or not) about the accepted values for this LDAP
   attribute, so I do not know who is at fault here.

   FWIW, the Debian wiki publicises 'host=*' as a valid entry in the
         "Allowing logins on a per-host basis" section at
         <http://wiki.debian.org/LDAP/PAM>.

   After having tested with `ldapsearch -x`, I ended up with

     (&(objectClass=posixAccount)(uid=$username)(|(host=$hostname)(host=\*)))

   However, this seems not to work and nlscd translates it as:

     myldap_search(base="dc=pca,dc=it", \
       filter="(&(objectClass=posixAccount)(uid=$username)\
                 (|(host=$hostname)(host=*)))")

   As you can see, nslcd removes the escape and the correct results is
   obtained with a double escape in nslcd.conf:

     (&(objectClass=posixAccount)(uid=$username)(|(host=$hostname)(host=\\*)))

   I could not find any documentation about escaping in the
   pam_authz_search filter...

2) the variable $hostname contains the value of `hostname` and not the
   FQDN like with PADL's pam_ldap, thus a tricky filter must be used:

     (&(objectClass=posixAccount)(uid=$username)\
      (|(host=$hostname)(host=$hostname.$DOMAIN)(!(host=*))))

   Again, the major problem resides on the definition of the LDAP 'host'
   attribute, i.e. if FQDNs *must* be used or not.

BTW, I was expecting any PAM-related output to be in /var/log/auth.log,
     until I realized that nslcd logs to /var/log/syslog.

Thx, bye,
Gismo / Luca

-- System Information:
Debian Release: 6.0
  APT prefers unstable
  APT policy: (990, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.36-rc6-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nslcd depends on:
ii  adduser                     3.112+nmu2   add and remove users and groups
ii  debconf [debconf-2.0]       1.5.38       Debian configuration management sy
ii  libc6                       2.11.2-9     Embedded GNU C Library: Shared lib
ii  libgssapi-krb5-2            1.8.3+dfsg-4 MIT Kerberos runtime libraries - k
ii  libldap-2.4-2               2.4.23-7     OpenLDAP libraries

Versions of packages nslcd recommends:
ii  libnss-ldapd [libnss-ldap]    0.7.13     NSS module for using LDAP as a nam
ii  libpam-ldapd [libpam-ldap]    0.7.13     PAM module for using LDAP as an au
pn  nscd                          <none>     (no description available)

Versions of packages nslcd suggests:
pn  kstart                        <none>     (no description available)

-- debconf information:
  nslcd/ldap-starttls: false
  nslcd/ldap-reqcert:
* nslcd/ldap-uris: ldap://ldap.pca.it
  nslcd/ldap-binddn:
* nslcd/ldap-base: dc=pca,dc=it

Attachment: pgpkfjJCe0LFF.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: nss-pam-ldapd
Source-Version: 0.8.1

We believe that the bug you reported is fixed in the latest version of
nss-pam-ldapd, which is due to be installed in the Debian FTP archive:

libnss-ldapd_0.8.1_i386.deb
  to main/n/nss-pam-ldapd/libnss-ldapd_0.8.1_i386.deb
libpam-ldapd_0.8.1_i386.deb
  to main/n/nss-pam-ldapd/libpam-ldapd_0.8.1_i386.deb
nslcd_0.8.1_i386.deb
  to main/n/nss-pam-ldapd/nslcd_0.8.1_i386.deb
nss-pam-ldapd_0.8.1.dsc
  to main/n/nss-pam-ldapd/nss-pam-ldapd_0.8.1.dsc
nss-pam-ldapd_0.8.1.tar.gz
  to main/n/nss-pam-ldapd/nss-pam-ldapd_0.8.1.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Arthur de Jong <[email protected]> (supplier of updated nss-pam-ldapd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 10 Mar 2011 22:00:00 +0100
Source: nss-pam-ldapd
Binary: nslcd libnss-ldapd libpam-ldapd
Architecture: source i386
Version: 0.8.1
Distribution: experimental
Urgency: low
Maintainer: Arthur de Jong <[email protected]>
Changed-By: Arthur de Jong <[email protected]>
Description: 
 libnss-ldapd - NSS module for using LDAP as a naming service
 libpam-ldapd - PAM module for using LDAP as an authentication service
 nslcd      - Daemon for NSS and PAM lookups using LDAP
Closes: 610925
Changes: 
 nss-pam-ldapd (0.8.1) experimental; urgency=low
 .
   * SECURITY FIX: the PAM module will allow authentication for users that do
                   not exist in LDAP, this allows login to local users with an
                   incorrect password (CVE-2011-0438)
                   the explotability of the problem depends on the details of
                   the PAM stack and the use of the minimum_uid PAM option
   * add FreeBSD support, partially imported from the FreeBSD port (thanks to
     Jacques Vidrine, Artem Kazakov and Alexander V. Chernikov)
   * document how to replace name pam_check_service_attr and
     pam_check_host_attr options in PADL's pam_ldap with with pam_authz_search
     in nss-pam-ldapd (closes: #610925)
   * implement a fqdn variable that can be used in pam_authz_search filters
   * create the directory to hold the socket and pidfile on startup
   * implement host, network and netgroup support in pynslcd
Checksums-Sha1: 
 21d65885f242a0c9cef23c072662454e3bd031e3 1102 nss-pam-ldapd_0.8.1.dsc
 3507457b09667affe73538e09cbb404e31b7f718 532186 nss-pam-ldapd_0.8.1.tar.gz
 8cd3a9fffde91c8230953d7777766eb38d1f79a8 128144 nslcd_0.8.1_i386.deb
 12c6c768ae7356a45b2b9591ea1ad98112678215 45218 libnss-ldapd_0.8.1_i386.deb
 701b818745b4eb2a3e96f5ae4e1435ab216dd2f9 38280 libpam-ldapd_0.8.1_i386.deb
Checksums-Sha256: 
 5313ddb1810abad94f8872e3913b9068afc67c32a611bc46db9784b33f4b294c 1102 
nss-pam-ldapd_0.8.1.dsc
 ea2f11a26967e9bcaa8fda4e547fdfbf1dae5b23312f2ee8a79dedc2b3d5c91d 532186 
nss-pam-ldapd_0.8.1.tar.gz
 af01f74d2d21c44148a0bf840951cdc629b7831427e84a4806745f986013edb9 128144 
nslcd_0.8.1_i386.deb
 d40f90f22fa6018a72faa39678dd62bb00a621140613f0c5103332b73091a000 45218 
libnss-ldapd_0.8.1_i386.deb
 35bf91c7d23ecad26a76652866c501556fbe1b483ddaf04694c9dd7a696c3458 38280 
libpam-ldapd_0.8.1_i386.deb
Files: 
 d315209b322dbe8b753830adceff05ad 1102 admin extra nss-pam-ldapd_0.8.1.dsc
 8d3216b76e1291f95072466508ad8b26 532186 admin extra nss-pam-ldapd_0.8.1.tar.gz
 ab5ab3975d9669fafd868f7b3415abf7 128144 admin extra nslcd_0.8.1_i386.deb
 e196e10fefe011aea20cfedb6f1f957d 45218 admin extra libnss-ldapd_0.8.1_i386.deb
 b68cdcd65509556be8d98ac278b6e3ae 38280 admin extra libpam-ldapd_0.8.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk15RtoACgkQVYan35+NCKfDgACeMgcqRzQ2F7FpEI7h7J7azQVX
EtMAn02ckIZzsiBB5jG21kETtz9yqhGt
=C+zX
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to