[389-users] Configuring TLS/SSL Enabled 389 Directory Server

2018-04-01 Thread Jeremy Tourville
Hello,

I used this guide to help setup 389 DS : 
https://www.unixmen.com/install-and-configure-ldap-server-in-centos-7/


Presently, I am following the guide: 
http://directory.fedoraproject.org/docs/389ds/howto/howto-ssl.html


I configured a certificate from my CA and imported the certificate to my 
server.  I confirmed that the server correctly imported the certificate into my 
database.  So basically, all the certificate work is done and working.


Now I am trying to modify the settings of my dse.ldif file.  I can modify the 
file without issue.  If I restart the service all my file edits are lost.  Why 
are my edits lost when restarting the service?  Thanks for your advice!

___
389-users mailing list -- 389-users@lists.fedoraproject.org
To unsubscribe send an email to 389-users-le...@lists.fedoraproject.org


[389-users] Re: Using PBKDF2_SHA256 Hashes

2018-04-01 Thread William Brown
On Tue, 2018-03-27 at 21:11 -0400, Joe Cooter wrote:
> Hi,
> 
> I’m attempting to build an application using the userPassword
> attribute, with hashes stored using PBKDF2_SHA256.  However, using
> the passlib hash library for pbkdf2_sha256 is complaining about a
> malformed hash.  Looking at the hash, it appears that there aren’t
> any delimiters between the salt, iterations, etc.
> 
> Is there some additional encoding happening on the userPassword
> attribute?

You should use the pwdhash utility from 389-ds-base to generate the
hashes for DS.

We made a number of decisions about the hash encoding and it's design
for portability and security reasons. 

We write the number of rounds into the hash in a bigendian form so that
it's portable. We also store the salt as 64 bytes statically into the
hash (NIST recommend 16 bytes last I checked).

Additionally, we calculate the number of rounds based on your CPU
performance. Because LDAP is often time sensitive to bind, we have a
time factor we try to meet (I think it's 40 ms, but I need to check the
source code). This way binds are still "fast", but there is a cost
factor to an attacker.

When you upgrade your CPU, it will run faster of course because you can
achieve more rounds in the time window. So the design always improves
your protection as you get a faster machine, but without sacrificing
performance or opening up to a DoS on a slower machine. 

Hope that helps,


> ___
> 389-users mailing list -- 389-users@lists.fedoraproject.org
> To unsubscribe send an email to 389-users-leave@lists.fedoraproject.o
> rg
___
389-users mailing list -- 389-users@lists.fedoraproject.org
To unsubscribe send an email to 389-users-le...@lists.fedoraproject.org