OpenBSD Journal

login_ldap - Ready for primetime?

Contributed by jose on from the ldap-authentication dept.

Bards writes:
"Given that LDAP is becoming the 'de facto' standard for many things, including authentication, does anyone know if there are any plans for the inclusion of login_ldap (or equivalent) in a future release of our favourite OS?"
Actually, as of two weeks ago there is a port of login_ldap which works with the BSD auth system. While not quite ready for "prime time" in the base system, it's easy to incorporate it now with a port. Any initial reports of how well this works?

(Comments are closed)


Comments
  1. By Anonymous Coward () on

    it requires openldap.

    Comments
    1. By Anonymous Coward () on

      http://fefe.de/tinyldap/ would be nice. Help finish it, so we can stop using BloatLDAP.

      Comments
      1. By Anonymous Coward () on

        It only works Linux and the either is not thinking of supporting it to OpenBSD. He doesn't like OpenBSD. So you're on your own...

        Comments
        1. By Anonymous Coward () on

          FUD. It's developed on Linux. It will work everywhere.

          Comments
          1. By Anonymous Coward () on

            nope

      2. By Brad () brad@comstyle.com on mailto:brad@comstyle.com

        This is useless, we need a client library implementation NOT a server implementation.

        Comments
        1. By Anonymous Coward () on

          FUD. TinyLDAP is both.

  2. By Dave Terrell () dbt@meat.net on mailto:dbt@meat.net

    ... without extensions to getpw* to return user and group ids out of ldap (nsswitch.conf style).

    Comments
    1. Comments
      1. By Anonymous Coward () on

        NSS WOULD SUCK. It's a Nightmare no better than PAM.

        A sound alternative to NSS would be nice though.

        Comments
        1. By Jedi/Sector One () j@pureftpd.org on http://www.pureftpd.org/

          In 2 minutes with NSS, I can have *all* my existing applications use any user database, including a Windows PDC, an LDAP directory, an SQL database or even a custom backend.

          No need to recompile/reinstall/reconfigure anything.

          How is it a nightmare ?

          PAM is a nightmare (because it only authenticates, it doesn't fetch users/groups/hosts).
          But NSS is definitely something great.

          Comments
          1. By Anonymous Coward () on

            the problem i see with nss is its a very big commitment for an os to make, and its not clear that its the 'best' solution.

            what would be good is some way to use the existing yp stuff to provide generic name based resolutions as an extension/brother of bsd auth. i had a brief look the other day at this, but i dont think its possible without turning into some ungodly hack.

            Comments
            1. By Peter Werner () on

              oh and just cause it may be of interest, the company i was working for when i wrote login_ldap basically wanted all its unix machines to be able to auth of an ldap server, which meant openbsd wasnt an option. it was mainly written so an organisation that uses ldap everywhere else for authentication can sill use openbsd on firewalls/whatever and the admins can still log in.

              after looking at it, im lukewarm at best towards nss, i just think ldap is pretty neat.

            2. By DeadManMoving () sequel@neofreak.org on www.neofreak.org

              Have a look at this :
              http://www.radux.com/ypAnything/

          2. By Anonymous Coward () on

            Because it's not much less complex and ugly than PAM.

        2. By ikbenjarig () on

          Your arguments for your statements suck. You merely make statements, but don't even take the time to 'proof' or 'support' them. I'd say: post arguments and contribute to the subject or just read and stfu.

    2. By gk () on

      http://www.padl.com/OSS/nss_ldap.html

      Supposed to have been working on fbsd.

      Comments
      1. By Anonymous Coward () on

        FreeBSD uses PAM, not BSD_auth.

        Comments
        1. By Jedi/Sector One () j@pureftpd.org on http://www.pureftpd.org/

          NSS is not PAM, don't mess everything.

          But yes, padl.org has both a PAM-LDAP handler and an NSS-LDAP handler.

      2. By Anonymous Coward () on

        you still need the os to support nss (ie in the libraries)

    3. By CPU () anon@none.com on http://cpu.sf.net

      There is an application called CPU that I use for dealing with users and groups on an ldap backend. It runs on OpenBSD, and allows you to display users and groups in an /etc/group|/etc/passwd style format. Wouldn't it be easy enough to use a named pipe? This isn't exactly rocket science.

  3. By robert lessard () on

    ldap would provide a mean of authentication. I'm not sure it would be any better than heimdal when it gets working better.

    On the other hand, and please help me out if I am wrong, but authorizations are no different. So, with that said, it seems to me that local file security issues are still there and replication of password files is still required for resource access.

    ldap makes replication easier with its master/slave and logging capabilities but it seems that our scalability is limited in a heterogeneous enviroment by acl support.

    Comments
    1. By Anonymous Coward () on

      Is it not possible for LDAP to maintain user/group data with Kerberos as authentication/encryption support? Why would this not scale?

      Comments
      1. By robert lessard () on

        read my post again- I am talking about authorization, not authentication. Whether you use kerberos, ldap, or whatever you want, acls cannot be put in place that authorize access to files accross a heterogeneous (including smb shares) network without a local account and password file. Otherwise, obsd would have no samba pam/nss issues to worry about.

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]