[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
RE: restrict rootdn binds by connection source IP address?
I believe you can just not create a rootdn (or not define a password for
it? Or maybe define a password like {crypt}*NOLOGIN* (or an
md5/sha/ssha equivalent) that can't be used (not a valid hash)?), so you
effectively disable the rootdn, but create a normal account that has
full access to everything (except for the restrictions you want to
implement) to do what you would otherwise have used the rootdn for. Not
*quite* the same, but it may fit your needs?
Is there anything the rootdn can do that you can't grant via acls to a
"normal" account (other than ignore acls)?
- Jeff
-----Original Message-----
From: openldap-software-bounces+jeff_clowser=fanniemae.com@openldap.org
[mailto:openldap-software-bounces+jeff_clowser=fanniemae.com@openldap.or
g] On Behalf Of Aaron Richton
Sent: Monday, November 19, 2007 11:48 AM
To: Aleksander Adamowski
Cc: openldap-software@openldap.org
Subject: Re: restrict rootdn binds by connection source IP address?
Only way to stop rootdn is to stop it from getting in in the first
place:
tcp wrappers/iptables/etc. Which of course do a lot more than rootdn,
though...
On Mon, 19 Nov 2007, Aleksander Adamowski wrote:
> Hi!
>
> Knowing that rootdn always bypasses ACLs, is there any other way to
restrict
> BIND operations that use rootdn to certain source IP addresses for
clients?
>
> --