[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: schema access must not be crontrolled by ACL (ITS#2706)
At 07:13 AM 9/9/2003, suomi@ayni.com wrote:
>Full_Name: suomi hasler
>Version: openldap-2.1.22-1
>OS: Linux 2.4.19-4GB
>URL: ftp://ftp.openldap.org/incoming/
>Submission from: (NULL) (195.141.97.126)
>
>
>i am intending to use LDAP for nss purpose. to this aim, i install as
>restrictive ACLs as possible. But when i installed the following ACL:
>
>access to *
> by dn="cn=suomi,ou=pam-ldap,dc=ayni,dc=com" write
> by dn="cn=manager,dc=ayni,dc=com" write
> by self write
> by anonymous none
>
>i could not even read such basic things as the namingcontext and the schema any
>more.
Good.
>rfc 2251 says (3.2.2)
>
> Servers which follow X.500(93) models SHOULD implement subschema
> using the X.500 subschema mechanisms, and so these subschemas are not
> ordinary entries. LDAP clients SHOULD NOT assume that servers
> implement any of the other aspects of X.500 subschema. A server
> which masters entries and permits clients to modify these entries
> MUST implement and provide access to these subschema entries, so that
> its clients may discover the attributes and object classes which are
> permitted to be present. It is strongly recommended that all other
> servers implement this as well.
The sentence is misleading (LDAPbis should clarify this).
Servers are free to subject any and all information they provide to
access control.