RE: LDAP olcAccess for auth_bind

2023-05-29 Thread Marc
> >> > >> I really got your point, but how you will implement aliases > > has nothing to do with dovecot, sendmail can get those from ldap. > > > >> or domain > > sendmail gets these from ldap (but requires a restart) > > > >> query or maybe quota? You still need to access ldap directly for > other

Re: LDAP olcAccess for auth_bind

2023-05-28 Thread Mihai Badici
But this is something old that I had and am not using. This allows the cn=dovecot to also access the password field. I am not sure if that is necessary/wanted. LDAP server directly using the login and password provided by the client. To perform authentication, it must execute a BIND by an in

Re: LDAP olcAccess for auth_bind

2023-05-28 Thread Emmanuel Fusté
Le 28/05/2023 à 21:36, Marc a écrit : Am I understanding correctly that the auth_bind option, regardless of whether it is set to yes or no, and even if anonymous access to the LDAP directory is blocked, must be used with dn=cn=manager,dc=example,dc=com and dnpass=password to enable authentication

RE: LDAP olcAccess for auth_bind

2023-05-28 Thread Marc
> > Am I understanding correctly that the auth_bind option, regardless of > whether it is set to yes or no, and even if anonymous access to the LDAP > directory is blocked, must be used with dn=cn=manager,dc=example,dc=com > and dnpass=password to enable authentication? Forget about using manager

Re: LDAP olcAccess for auth_bind

2023-05-26 Thread Andrzej Milewski
Hi, I would like to ask about one more thing regarding LDAP server authentication. Am I understanding correctly that the auth_bind option, regardless of whether it is set to yes or no, and even if anonymous access to the LDAP directory is blocked, must be used with dn=cn=manager,dc=example,dc=com

Re: LDAP olcAccess for auth_bind

2023-05-22 Thread Andrzej Milewski
Hi, I reviewed your guidelines and focused only on how olcAccess works to block anonymous users. I installed a blank native Debian and interestingly, the default Debian rules also allow anonymous reading of the LDAP directory. olcAccess by Debian olcAccess: {0} to attrs=userPassword by self write

Re: LDAP olcAccess for auth_bind

2023-05-21 Thread Mihai Badici
On 5/21/23 12:42, Marc wrote: My LDAP server is installed on a Proxmox container using the TurnKey Linux template. I always thought it was a clean Debian installation. I tried it on a fresh Debian installation, and both olcAccess and the LDAP tree differ significantly from what is provided in

RE: LDAP olcAccess for auth_bind

2023-05-21 Thread Marc
> > My LDAP server is installed on a Proxmox container using the TurnKey > Linux template. I always thought it was a clean Debian installation. I > tried it on a fresh Debian installation, and both olcAccess and the LDAP > tree differ significantly from what is provided in the template. > > I

Re: LDAP olcAccess for auth_bind

2023-05-17 Thread Andrzej Milewski
Hi, My LDAP server is installed on a Proxmox container using the TurnKey Linux template. I always thought it was a clean Debian installation. I tried it on a fresh Debian installation, and both olcAccess and the LDAP tree differ significantly from what is provided in the template. I need to pract

Re: LDAP olcAccess for auth_bind

2023-05-17 Thread Mihai Badici
You can check if the acl's are correct using ldapsearch  . This second bind without dn is weird so you need to check from where it come. Anyway I think is better to have a special user for binding because you can't use the %u if you have multiple organisational units which will occur in the

Re: LDAP olcAccess for auth_bind

2023-05-17 Thread Andrzej Milewski
Hi, Thank you for your response. What you wrote makes sense, and it was definitely my mistake. I have made the necessary changes in the settings. auth_bind_userdn = cn=%u,ou=Users,dc=example,dc=com I changed the user's cn to u...@example.com. It appears that there is indeed a specific BIND attemp

RE: LDAP olcAccess for auth_bind

2023-05-17 Thread Marc
> Here are my default olcAccess settings after installation: don't put samba stuff here, just focus on one application's access. > olcAccess: {10} to * by * read > > However, I am not satisfied with these settings because using the > anonymous user, anyone can browse the entire LDAP tree. While

Re: LDAP olcAccess for auth_bind

2023-05-16 Thread Mihai Badici
I think you need also add "by users read" but the problem in this setup is to find the user you have a filter so you need to search for this . So you need either specify a special binding account or the format of the biding user This is from the default config on debian : # For example: #  

LDAP olcAccess for auth_bind

2023-05-16 Thread Andrzej Milewski
Hi, I'm trying to set up a production mail server. I have installed Dovecot on Debian from the package. For authentication, I have another machine running OpenLDAP, also installed on Debian. I would like the end mail client to authenticate with Dovecot using the login and password set in LDAP. In