>________________________________________ >From: 389-users-boun...@lists.fedoraproject.org >[389-users-boun...@lists.fedoraproject.org] on behalf of Rich Megginson >[rmegg...@redhat.com] >Sent: 21 October 2010 15:22 >To: General discussion list for the 389 Directory server project. >Subject: Re: [389-users] Chaining woes again v2 - solutions > >Gerrard Geldenhuis wrote: >> Hi >> Just a quick follow-up regarding this thread. >> >> We discovered the real problem.... encryption of the password. >> >> We have the following line in the ldif file to >> nsmultiplexorcredentials: {SSHA}VItDJ0gykk1q8rzsJmIkkj64mAW1kkaZY >> >That's very bad. This looks as though the password was set manually to >the output of pwdhash. You must always submit a clear text password to >the directory server in an ldap add or modify request for this attribute. >> We got one server working with chaining and the other not. The difference >> turned out to be how the password was stored and on the one box we changed >> the password via the console to make sure it was correct. >> >> We have noted asmall inconsistencies which we would like to verify >> >> On our production system the entry in dse.ldif looks like follows: >> nsmultiplexorcredentials:: >> e0RFU31ZczJMghghdtZkpTakl5Y29OYVIwc0NUdnpMVmFUU1JDd1 >> >> hZNfsadfasdfsaZY143NkduYmJRenBK33sdfsadffdssiRUpvDlvQjRvUWR4ai9uZ2lWbzJQejduWj >> NMcHE4UWR4Sw== >> >This is base64 encoded - it should usually not be base64 encoded when >output by ldapsearch, but the decoded version is quite strange: >python > >>> import base64 > >>> >base64.b64decode('e0RFU31ZczJMghghdtZkpTakl5Y29OYVIwc0NUdnpMVmFUU1JDd1hZNfsadfasdfsaZY143NkduYmJRenBK33sdfsadffdssiRUpvDlvQjRvUWR4ai9uZ2lWbzJQejduWjNMcHE4UWR4Sw==') >'{DES}Ys2L\x82\x18!v\xd6d\xa56\xa4\x97\x966\xf4\xe6\x15#\x0745Gg\xa4\xc5f\x15E5$7u\x85\x93_\xb1\xa7_j\xc7_\xb1\xa6X\xd7\x8d\xcd\x91\xdb\x98\x98\x94^\x9c\x12\xb7\xde\xc7_\xb1\xa7_}\xdb,\x89\x15)\xbc9oB4oQdxj/ngiVo2Pz7nZ3Lpq8QdxK' >and the length is 106. I'm not sure what this is or how it got there.
sorry that is my mistake, I modified it by hand, adding and removed characters. >> and on our test system it looks like follows: >> nsmultiplexorcredentials: {DES}slo6RKJHfEqtcfbpLWHdgQ== >> >This is correct. The question still remains why we would have DES and base64 encoding if we used the exact same method to change the password. >> Apart from the length which is due to use using a much longer password in >> production why does the test system use a {DES} and the production system >> does not. >Well, they both use a {DES} it's just that one is base64 encoded for >some reason. That is probably not that big a worry but the inconsitency should be noted. If you want I can test this again to see if this is a version issue or something else. Maybe it is length related... I will test that too. >> In both cases we used the 389-console to make the changes. >> >> The version differences is: (test on the left, prod on the right) >> >> 389-admin-1.1.11-1.el5 | >> 389-admin-1.1.11-0.6.rc2.el5 >> 389-admin-console-1.1.5-1.el5 | >> 389-admin-console-1.1.5-1.el5 >> 389-admin-console-doc-1.1.5-1.el5 | >> 389-admin-console-doc-1.1.5-1.el5 >> 389-adminutil-1.1.8-4.el5 | >> 389-adminutil-1.1.8-4.el5 >> 389-console-1.1.4-1.el5 | >> 389-console-1.1.4-1.el5 >> 389-ds-1.2.1-1.el5 | >> 389-ds-1.2.1-1.el5 >> 389-ds-base-1.2.6.1-1.el5 | >> 389-ds-base-1.2.6-0.11.rc7.el5 >> 389-ds-console-1.2.3-1.el5 | >> 389-ds-console-1.2.3-1.el5 >> 389-ds-console-doc-1.2.3-1.el5 | >> 389-ds-console-doc-1.2.3-1.el5 >> 389-dsgw-1.1.5-1.el5 | >> 389-dsgw-1.1.5-1.el5 >> >> On the client when we tried to do a password change the error we would see >> was operations error which is not very usefull. >How did you attempt the password change, what was the exact error >message you saw, what was in the directory server access and errors logs >for the password change operation? I will need to recreate the env and conditions. I will post the detail here tomorrow. >> We did not see authentication issues on the consumer server with chaining >> setup nor on the provider server. I can double check it again, could you >> recommend a specific log level that would catch it. If I don't see the error >> message I will raise it as an enhancement request in bugzilla for the some >> more informative error messages for this particular problem. I will also add >> some relevant notes to the 389 wiki. >> >> Lastly I have been "reprimanded" for this on the list before and have paid >> the prices as explained above, but just to be perfectly clear and for the >> sake of writing a small bit on the wiki regarding this issue what is the >> policy regarding putting passwords in ldif files? >> >I'm not sure what you mean? It was meant as joke, in a previous unrelated thread I was told that I should always use unencrypted passwords which I have not done. I run into this bug/issue because I used pre-encrypted passwords. >> For system settings like chaining should the password always be in clear >> text in the ldif file? >> >When adding/updating the nsmultiplexorcredentials attribute, in an add >or modify request, you must provide the clear text password, and let the >directory server encrypt it. Anything else will surely lead to problems. >> Can/should you use pre-encrypted DES strings for passwords for system >> settings. >> >No. >> Does the password encryption setting in the 389-console only apply to user >> passwords? >> >Yes. >> Is all system passwords encrypted to DES by default? >> >nsmultiplexorcredentials and the replication credentials are - >everything else uses the regular password hashing scheme >> Can the system default if there is one by change to SSHA or whatever? >> >You mean using the regular password policies? I mean, does other system entries like nsDS5ReplicaCredentials also use DES? And is there a global setting available that would control whether DES or some other encoding is used. Thus if I add ldif entries with clear text for "system" related configuration like replication, chaining etc. will they all be encoded in DES? Regards ________________________________________________________________________ In order to protect our email recipients, Betfair Group use SkyScan from MessageLabs to scan all Incoming and Outgoing mail for viruses. ________________________________________________________________________ -- 389 users mailing list 389-us...@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/389-users