Re: LDAP search without credetials

2015-08-24 Thread Robert Lemmen
hi carsten,

On Fri, Aug 21, 2015 at 07:10:09AM +0200, Carsten Czerner wrote:
> I understand your points. But is it the best way to start with low security
> and hope that the administrator knows exactly what to do, like me ;)?
> 
> I thing its a better way to start with a strong security and adapt it to
> your
>  needs (make it less secure) when you need it. An LDAP server is like a
>  database for me, when you whant to access any kind of data you better
>  setup the permissions first.

I agree in general, the point I was just trying to make is not so much
one of "higher" or "lower" default security, but a trade-off between two 
problems: either having default access for everyone to data you may not
want them to have access to, or having to proliferate a high-value
password all over the place. choose your poison :)

regards  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: LDAP search without credetials

2015-08-19 Thread Robert Lemmen
hi carsten,

On Mon, Aug 17, 2015 at 01:23:26PM +0200, Carsten Czerner wrote:
> on my Debian8 slapd installation I can query the ldap-server without typing
> in any password. That isn't ok!?
> 
> At the dn: olcDatabase={1}mdb.ldif I found the following entry:
> 
> olcAccess: {2}to * by * read
> 
> I guess that gives read access to everyone without authentification.
> 
> It was pure coincidence that I tested a login without credentials! Cause a
> login with credentilas works as well.
> 
> Please change olcAccess: {2}to * by * read -> olcAccess: {2}to * by users
> read

not really an LDAP expert, but I do use it a lot for various bits and
pieces. I have come to the opposite conclusion: we have a windows AD
LDAP at work as well as a UNIX one that behaves as you describe,
allowing basic queries with an anonymous bind. The windows AD LDAP
always requires a full bind. perversely that does not increase security
at all, the reason being that now every silly system that wants to
authenticate a user needs to have a dn + password configured so that it
can look up the user that it tries to authenticate. As far as I see it
this comes down to the fact that you typically do not log in with your
full DN, so the system you try to log on needs to first look up your dn
from your id, and it needs some credentials to do that. The same seems
to apply to PAM as well.

In a well-behaved system you can only query "basic" information with an
anonymous bind, in our case user ids, names, emails etc. If you do log
in with real credentials, you get more information. 

So just saying: locking down your LDAP may not make things more secure,
because you now need to proliferate actual credentials all over the
place...

regards  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: UNS: Debian 4.0 Upgrade Path

2010-01-21 Thread Robert Lemmen
On Thu, Jan 21, 2010 at 01:45:20PM -0500, Michael Gilbert wrote:
> i agree that longer support for old releases would be wonderful, but
> that would mean at times providing full support for three concurrent
> releases (oldstable, stable, and testing).  

very short times ;)

> it already seems hard enough with the current level of manpower to
> support two releases at the same time let alone three.  it may be
> doable, but the security team would need more volunteers (particularly
> those interested in doing the work to keep oldstable supported).

of course! i just wanted to point out that the fact that a direct
upgrade from N to N+2 isn't supported doesn't mean that it wouldn't be
desirable to get the length of the security support to that length.

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: UNS: Debian 4.0 Upgrade Path

2010-01-21 Thread Robert Lemmen
On Thu, Jan 21, 2010 at 11:20:28AM -0500, Noah Meyerhans wrote:
> In general, skipping major versions has never been supported.  An
> upgrade from etch to squeeze should always involve a short stop in
> lenny.

of course, but doing these two upgrades one after another on a couple of
machines is still easier than doing the first one on all the machines,
and then the second one a few months later. especially if you factor in
paperwork and explanations of changes that might be required.

i fully agree with thiemo, having the security support of release N run
out when the security support for N+2 starts would be *very* cool, then
people could skip releases if the cost/risk of upgrading is high and the
need for brand new software is low.

in fact if you look at the past releases [0], you will see that we were
almost there with the last two releases. admittedly the start of
security support for lenny is very early in that diagram, whether that
is true is questionable.

cu  robert

[0] http://wiki.debian.org/DebianReleases

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: first A record of security.debian.org extremely slow

2006-02-21 Thread Robert Lemmen
On Tue, Feb 21, 2006 at 09:23:07AM +, Brett Parker wrote:
> *blink* - erm, just out of interest, how does this help? This is just
> going to stop packets from going to that IP, it's not going to stop
> things resolving to that IP, so instead of getting a slow connection
> you're just going to get a connection refused... seems like an odd way
> of doing things - maybe it would be better to use a local caching
> nameserver that you can configure to filter out that IP when there is
> more than one A record available instead? (I can't think of a simple way
> of doing that off the top of my head, though)

it is an odd way, but it is simple and it works because apt will use the
other records if the blocked one fails (i do the same). messing with
your /etc/hosts isn't much better...

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: security.debian.org extremely slow

2006-02-21 Thread Robert Lemmen
On Mon, Feb 20, 2006 at 06:25:47PM -0800, Michael Sabala wrote:
> It looks like I'm having network problems somewhere along the way. Sorry for
> the noise :)

no, you are not having problems along the way, or you are not the only
one. me and madduck both experience the same problem from machines with
otherwise good network connection (colocated). and at least one other
person that i can't remember had the same problems too. it does indeed
look as if tartini is a bit flaky...

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: Addressing the recent zlib issue

2005-07-10 Thread Robert Lemmen
On Sun, Jul 10, 2005 at 03:59:43PM +0200, Florian Weimer wrote:
>   rsync (probably version 1.1)

i'll take care of this one

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: Debian Security Support in Place

2005-07-09 Thread Robert Lemmen
On Sat, Jul 09, 2005 at 10:22:29AM +0200, Lupe Christoph wrote:
> So in essence the announcement says "screw you, commercial customers".
> 
> Please don't do that. It makes promoting Debian awkward.

are you aware that we are talking about *oldstable* here? it was
released july 2002, i think if it is supported until may 2006(one year
after it got replaced with a new stable version) that's quite a long
timeframe and a very good reason for promoting debian!

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: Bad press related to (missing) Debian security - action

2005-06-28 Thread Robert Lemmen
On Tue, Jun 28, 2005 at 05:20:51AM -0700, Alvin Oga wrote:
> personally, i pull down all the important tar balls from the originating
> author's site and compile it ... if the distro's version of any app is
> "too far behind"

the main point about stable security is that exactly this does not
happen: i want security fixes for the versions that i have installed,
not newer versions. and that's also were things get complicated...

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: Darn skiddies (ssh login attempts)

2005-03-31 Thread Robert Lemmen
On Thu, Mar 31, 2005 at 10:44:53PM -0600, Brad Sims wrote:
> `less /var/log/auth.log|grep Failed|wc -l` shows 185 attempts to compromise
> my machine since March 27th...

of course the only thing that really helps is good passwords, but i
found this to be of great help too: http://blog.andrew.net.au/2005/02/17

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


Re: Compromised system - still ok?

2005-02-07 Thread Robert Lemmen
On Mon, Feb 07, 2005 at 06:32:12PM +0200, Ognyan Kulev wrote:
> Another thing he doesn't like is that check is based on signed MD5 hash of 
> content instead of based on signed content.  Is it true that signed MD5 is 
> weaker than signed content?

assymetric crypto ops are very slow, so you wouldn't want to do them on
the whole content (signature would be the same order of size as teh
content too..). so you always sign a message digest. you would want to
choose a better one than md5 though (sha1 for example), but that's a
trivial change

cu  robert

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature


debian security support history

2004-11-24 Thread Robert Lemmen
hi folks,

i am trying to sum up some facts about debian and created a graphic showing
the timeline of debian releases and security support, you can have a look
at a preliminary version [0]. i took the data from the debian news site [1]
but i am not sure everything is correct, so i wanted to ask:
- was there really no 2.1r1 to 2.1r3? the first point release i can see there 
 is r4...
- was there any security support for releases before slink?
- any other comments?

thanks a lot
robert

[0] http://www.semistable.com/files/releases.gif
[1] http://www.debian.org/News/

-- 
Robert Lemmen   http://www.semistable.com 


signature.asc
Description: Digital signature