Patrick,
Thanks a lot for your help. I will test the mentioned configuration and will
post the results to the list. I hope it works. Unfortunately, I do not have
so much knowledge about LDAP, but I do know that it is possible to store
Kerberos principals in an LDAP structure. Well, I don't know whether that is
useful or not.
Thanks again.

Kind Regards
Ali Majdzadeh Kohbanani

2009/11/11, Patrick Ben Koetter <p...@state-of-mind.de>:
>
> * Ali Majdzadeh <ali.majdza...@gmail.com>:
> > Patrick,
>
> > Thanks for your reply. So if I have concluded correctly, the following
> > configuration is the one which should bring together gssapi, plain and
> > cram-md5 authentication mechanisms:
>
>
> It should. I have never done this myself.
>
>
> > pwcheck_method: saslauthd auxprop
> > mech_list: gssapi plain cram-md5
> > saslauthd_path: /var/run/saslauthd/mux
> > keytab: /etc/krb5.keytab
> > auxprop_plugin: sasldb
> >
> > But, you say that currently this does not work. True?
>
>
> It does not work, if you use saslauthd alone. You need an auxprop_plugin to
> get access to shared-secret mechs.
>
>
> > What about ldapdb? I mean, is there actually anyway to achieve such a
> setup?
>
>
> ldapdb gives access to OpenLDAP. If (!) you store the userpassword values
> in
> plaintext, then you can use shared-secret mechanisms, such as CRAM-MD5 (and
> also DIGEST-MD5 and NTLM).
>
>
> > Is it possible to use ldapdb in a way that eliminates the need to
> duplicate
> > the credentials?
>
>
> AFAIK you still need to run ldapdb -> OpenLDAP and Kerberos in parallel.
> Single entry password maintainance should be possible using an OpenLDAP
> overlay, which IIRC changes passwords in OpenLDAP and kerberos at the same
> time. I don't remember the overlays name, though. Maybe its best to ask the
> openldap mailing list how you can use kerberos and LDAP at the same time
> and
> then see how that goes together with SMTP AUTH.
>
>
> p...@rick
>
>
>
> >
> > Kind Regards
> > Ali Majdzadeh Kohbanani
> >
> > 2009/11/11 Patrick Ben Koetter <p...@state-of-mind.de>
> >
> > > * Ali Majdzadeh <ali.majdza...@gmail.com>:
> > > > Patrick,
> > > > Hi
> > > > Thanks for your mail. I use the following options in smtpd.conf:
> > > >
> > > > mech_list: gssapi plain
> > > > pwcheck_method: saslauthd
> > > > saslauthd_path: /var/run/saslauthd/mux
> > > > keytab: /etc/krb5.keytab
> > > >
> > > > and I am able to use GSSAPI and PLAIN (Over PAM using pam_krb5.so)
> > > > mechanisms. How is it possible to add cram-md5 mechanism?
> > >
> > > Sorry, but no. saslauthd is unable to handle shared-secret mechanisms.
> You
> > > could, theoretically, tell libsasl to query different pwcheck_methods
> like
> > > this:
> > >
> > > pwcheck_method: saslauthd auxprop
> > > mech_list: gssapi plain cram-md5
> > > saslauthd_path: /var/run/saslauthd/mux
> > > keytab: /etc/krb5.keytab
> > > auxprop_plugin: sasldb
> > >
> > > libsasl would first try verification using saslauthd and if that fails
> it
> > > would turn to auxprop "sasldb". This backend COULD provide cram-md5,
> but
> > > you
> > > would have to provide credentials in your kerberos backend AND in
> sasldb,
> > > which IMHO is a pain to support and somehow renders all the security
> > > efforts
> > > for GSSAPI and kerberos useless, because you store the same credentials
> in
> > > plaintext in a local database file.
> > >
> > > > By the way, I do know about sasldb and auxprop, but what I plan to
> > > achieve
> > > > is to have cram-md5 mechanism while supporting plain mechanism using
> > > > saslauthd, PAM and pam_krb5.so. I have got no problems using native
> > > GSSAPI
> > > > support.
> > >
> > > AFAIK this in not possible at the moment.
> > >
> > > p...@rick
> > >
> > >
> > >
> > > >
> > > > Kind Regards
> > > > Ali Majdzadeh Kohbanani
> > > >
> > > > 2009/11/11 Patrick Ben Koetter <p...@state-of-mind.de>
> > > >
> > > > > * Ali Majdzadeh <ali.majdza...@gmail.com>:
> > > > > > Hello All
> > > > > > Is it possible to have both PLAIN and CRAM-MD5 authentication
> > > > > > mechanisms using SASL?
> > > > >
> > > > > Yes. The password must be stored as plaintext. Then plaintext and
> > > > > shared-secret mechanisms will work.
> > > > >
> > > > > p...@rick
> > > > >
> > > > > --
> > > > > All technical questions asked privately will be automatically
> answered
> > > on
> > > > > the
> > > > > list and archived for public access unless privacy is explicitely
> > > required
> > > > > and
> > > > > justified.
> > > > >
> > > > > saslfinger (debugging SMTP AUTH):
> > > > > <http://postfix.state-of-mind.de/patrick.koetter/saslfinger/>
> > > > >
> > >
> > > --
> > > All technical questions asked privately will be automatically answered
> on
> > > the
> > > list and archived for public access unless privacy is explicitely
> required
> > > and
> > > justified.
> > >
> > > saslfinger (debugging SMTP AUTH):
> > > <http://postfix.state-of-mind.de/patrick.koetter/saslfinger/>
> > >
>
>
> --
>
> All technical questions asked privately will be automatically answered on
> the
> list and archived for public access unless privacy is explicitely required
> and
> justified.
>
> saslfinger (debugging SMTP AUTH):
> <http://postfix.state-of-mind.de/patrick.koetter/saslfinger/>
>

Reply via email to