[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: forcing encryption for external server access while allowing unencrypted localhost connections
Dieter Kluenter wrote:
My sense is that what Chris'd really like is to be able to assign
an SSF to connections via a particular transport (or to a particular
peer). And he'd probably like this at startup-time via the conf
file, rather than via compile-time options.
Yes.... Is this possible? And though I've read and re-read your posts,
Kurt, I'm really not quite sure what -DLDAP_PVT_LOCAL_SSF=128 gets me.
Think about a rule something like
,----[ rule design ]
| access to a subtree
| by an authenticated distinguished name with sasl_ssf=a
| and
| if local socket with transport_ssf=x
| grant privilege
| if local network with transport_ssf=y
| grant privilege
| if public network with tls_ssf=z
| grant privilege
| else
| grant privilege
| stop
`----
Two comments:
1) The issue is that Chris (and others, it turns out) could
really use a way to assign SSFs to sessions over specific
transports or connections to/from specific peers - and do
it at startup time from the slapd.conf file
2) The scenario you outline above solves this problem very
indirectly; it would be better if there were a direct
solution
3) Correct me if I'm wrong, but in your scenario we're still
only talking about access to objects, not about operations
like doing a bind; again, it's at best an indirect way of
getting what Chris wants (and therefore a lot more complex
than it needs to be, and I'm not entirely sure it will
always block the initial bind; rather it will block the
object access)
This isn't a critique, by the way. I'm just pointing out that
there's an unfulfilled need here that could be translated into
a feature request of some kind.
Please let me know if I've misunderstood anything or made any
mistakes!
--
Richard Goerwitz richard@Goerwitz.COM
tel: 507 645 7015