Re: [ldapext] DBIS - new IETF drafts

Michael Ströder <michael@stroeder.com> Thu, 09 January 2014 15:56 UTC

Return-Path: <michael@stroeder.com>
X-Original-To: ldapext@ietfa.amsl.com
Delivered-To: ldapext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24F8F1AE413 for <ldapext@ietfa.amsl.com>; Thu, 9 Jan 2014 07:56:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.839
X-Spam-Level:
X-Spam-Status: No, score=-2.839 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BIwLhPrCYBt8 for <ldapext@ietfa.amsl.com>; Thu, 9 Jan 2014 07:56:09 -0800 (PST)
Received: from srv1.stroeder.com (srv1.stroeder.com [213.240.180.113]) by ietfa.amsl.com (Postfix) with ESMTP id 0EAB21AE412 for <ldapext@ietf.org>; Thu, 9 Jan 2014 07:56:09 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by srv1.stroeder.com (Postfix) with ESMTP id DAAF360771; Thu, 9 Jan 2014 16:55:58 +0100 (CET)
X-Virus-Scanned: amavisd-new at stroeder.com
Received: from srv1.stroeder.com ([127.0.0.1]) by localhost (srv1.stroeder.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 60Z-ycNNeuxu; Thu, 9 Jan 2014 16:55:49 +0100 (CET)
Received: from [10.1.0.2] (unknown [10.1.0.2]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "Michael Str??der", Issuer "CA Cert Signing Authority" (verified OK)) by srv1.stroeder.com (Postfix) with ESMTPS id 9808B60776; Thu, 9 Jan 2014 15:55:42 +0000 (UTC)
Message-ID: <52CEC1DC.6030907@stroeder.com>
Date: Thu, 09 Jan 2014 16:35:56 +0100
From: Michael Ströder <michael@stroeder.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:26.0) Gecko/20100101 Firefox/26.0 SeaMonkey/2.23
MIME-Version: 1.0
To: Mark R Bannister <dbis@proseconsulting.co.uk>, ldapext@ietf.org
References: <1389133522.4574.30.camel@sorbet.thuis.net> <52CD9F94.2090707@stroeder.com> <52CDC249.8050407@proseconsulting.co.uk>
In-Reply-To: <52CDC249.8050407@proseconsulting.co.uk>
X-Enigmail-Version: 1.6
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="------------ms020909030708050209030601"
Subject: Re: [ldapext] DBIS - new IETF drafts
X-BeenThere: ldapext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: LDAP Extension Working Group <ldapext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ldapext>, <mailto:ldapext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ldapext/>
List-Post: <mailto:ldapext@ietf.org>
List-Help: <mailto:ldapext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ldapext>, <mailto:ldapext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 15:56:11 -0000

Mark R Bannister wrote:
> On 08/01/2014 18:57, Michael Ströder wrote:
>> Arthur de Jong wrote:
>>> I personally like the use of flat names to describe group membership. It
>>> makes the semantics much simpler than dealing with things like the
>>> member or uniqueMember attribute (at least from a client implementation
>>> perspective).
>>>
>>> The use of distinguished names may seem more logical from an LDAP
>>> structure point of view, but you will have to dereference any DN to a
>>> user name for building up a group entry resulting in potentially a lot
>>> of search operations to get complete data.
>> Using DNs allows to implement server-side access control. I'm not a friend of
>> letting client-side demons enforce the access control because if a machine got
>> hacked the attacker can find out more about the infrastructure.
> 
> Please will you give me a more solid example of what you are referring to re
> access control?  What is it exactly you think you'd like to do with regards to
> group membership and server-side access control?

If the client system *individually* binds to the LDAP server you can implement
server-side access control in the LDAP server. During the last weeks I defined
a schema and OpenLDAP ACLs for such a deployment. Nothing to publish yet since
this is done for a customer.

Similar to what Simo described for IPA I use server groups (IPA host groups)
with rights assigned to user groups.

In opposite to all other implementations all clients MUST individually bind to
the LDAP server and server-side ACLs limit access to posixAccount, posixGroup,
server group and sudoRole entries.

I have to clarify if I'm allowed to disclose further details about this which
will take a while.

Ciao, Michael.