[Freedombox-discuss] LDAP

Jonas Smedegaard dr at jones.dk
Sun Nov 3 17:40:55 UTC 2013


Quoting Simo (2013-11-03 18:02:56)
> On Sun, 2013-11-03 at 13:38 +0100, Jonas Smedegaard wrote:
> > Quoting Petter Reinholdtsen (2013-11-03 09:49:24)
> > > [Lorenzo]
> > >> For these reasons I think it's not necessary to put LDAP in the 
> > >> freedombox.  Maybe I'm overlooking something (maybe some critical 
> > >> daemon is incompatible with SASL?). I hope what I wrote can be of 
> > >> help in the design, I'm curious to hear what are the other 
> > >> opinions on this topic.
> > > 
> > > The reason I believe it is a good idea to have LDAP on the 
> > > freedombox, is that it reduces the number of user databases on the 
> > > system.  Some web service systems, like owncloud and ejabberd, 
> > > have their own user databases while also supporting LDAP as their 
> > > user database backend. Several, or perhaps most, do not use 
> > > /etc/passwd as their user database. So we can either maintain 
> > > several user databases specific to a lot of the services we want 
> > > to set up in the Freedombox, or we can maintain one in LDAP and 
> > > hook the services up to LDAP to use one common user database 
> > > instead.  I prefer the latter.
> > 
> > Ok.  Makes good sense to mandate use of shared auth mechanism.  Not 
> > convinced LDAP is the ideal for that, though.
> > 
> > Beware that simply "supports LDAP" may not tell the full story: Some 
> > applications integrate with LDAP only by optional lookups of LDAP 
> > records, while maintaining its user data in a custom database anyway 
> > (i.e. not writing back to LDAP).
> > 
> > If LDAP is used only for readonly user/group data, not for sharing 
> > other user data and not updated from the applications, then it might 
> > be safer to write a script exporting POSIX info to those 
> > applications needing a custom format (e.g. as a cron job or added as 
> > hooks to e.g. change of password.
> > 
> > Ejabberd, specifically, _does_ support POSIX getent.  That's the 
> > very reason I suggested to use that daemon: I have experience using 
> > it in production, because it fits my requirements of using that 
> > simple shared auth mechanism.
> 
> It would help to avoid confusing identity store with authentication or 
> authorization mechanisms.

Please elaborate on the differences.


> > Hint for someone wanting to help: Above has to potentially low 
> > hanging fruits:
> > 
> >   * collect concrete data on which applications support which shared
> >     mechanisms for user/group management, and whether the support is 
> >     readonly or read/write.
> 
> Read Only is the most sensible, you do not want random apps to be able 
> to write to an identity store, or you open up your flank for 
> privileges escalations.
> 
> >   * document how to make prosody use getent.
> 
> the nsswitch interface (which is what you refer to with getent) is 
> pluggable, so LDAP would fit in quite easily, there are a number of 
> tools that provide plugins for all sort of identity stores.

Petter suggests that FreedomBox use LDAP.

I suggest to try keep it simpler.  Yes, LDAP supports nsswitch, but that 
does not help keep the actual software stack simpler.


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: signature
URL: <http://lists.alioth.debian.org/pipermail/freedombox-discuss/attachments/20131103/625e1aaf/attachment.sig>


More information about the Freedombox-discuss mailing list