Hello!

On Wed, Dec 06, 2006 at 06:02:37PM -0800, Rachel Florentine wrote:
> ----- Original Message ----
> From: Quanah Gibson-Mount <[EMAIL PROTECTED]>
> 
> >These binaries are part of the cyrus SASL package.
> 
> Yes, but is there an _explanation_ of how they work??

No. It's rather the other way around, when you understand your SASL
setup then you will know how to use these two.

Basically, they are just wrappers around the SASL library in client and
server mode, respectively, because the library cannot run on its own and
needs a minimal program around it. Imagine some networked service
between sample_client and sample_server. The sample_client simulates the
client end of the service by printing the data that SASL would send
through the service. The sample_server simulates the server end by
printing the responses that SASL would send back to the client. You
simulate the networked service by running sample_client and
sample_server in one window each and copy-and-paste'ing the client
output into the server window and vice versa. What passes between these
two is opaque data that need not interest you. In the end one of the
programs (server?) will report success or failure and that is about the
information you get, i.e. your SASL setup works or does not work,
respectively.

The downside is that you have to provide client and server side with
your chosen realm, mechanism, service id, ... and you don't know all
that until you have answered the next question. So leave the sample
programs aside for now. You can return to them when authentication
against OpenLDAP fails. (Note that i am not saying "if" but "when", just
my experience.)

> 
> >There are many different types of SASL mechansims.  What SASL mechanisms 
> >are you specifically interested in using?
> 
> Heck if I know! LOL! I just want some kind of authentication to protect from 
> hackers! Can you give me a little guidance?

There are many things to consider, and it is difficult to advise you
without knowing your situation. You want to authenticate people
accessing your LDAP. Do these people already have accounts in your
system (i.e. for shell access)? Do you want to reuse these accounts? If
so then where do these accounts reside, e.g. passwd file, kerberos, ...?

Do you need authentication realms, i.e. separate namespaces for users,
so [EMAIL PROTECTED] is considered different from [EMAIL PROTECTED] Do you need
proxy authorization, e.g. userA needs the access rights of userB when
userB is on vacation, or userA and userB share a responsibility and you
want to set up a role account that both have access to? Do you need
challenge-response authentication or are you ok with plain passwords
over a TLS secured connection? In other words, do you need the SASL
features at all?

You may have to consider the access rules you want to enforce. The use
of roles accounts, for example, ties into the proxy auth question above.
A simple "super user may write, authenticated user may read, others may
nothing (except authenticate)" scheme, on the other hands, requires no
"SASL special" features to implement.

Tons of questions, see?

You can only choose a SASL (or even a non-SASL) setup when you have
decided on some answers.

Sincerely,
   Ralph Rößner

---
You are currently subscribed to ldap@umich.edu as: [EMAIL PROTECTED]
To unsubscribe send email to [EMAIL PROTECTED] with the word UNSUBSCRIBE as the 
SUBJECT of the message.

Reply via email to