Package: slapd
Version: 2.4.23-7.2

[I still use the slapd.conf file, not cn=schema, but i think that it is
the same...]

The default configuration file slapd.conf (supplied/handled by debconf
on /etc/ldap/, or provided as example on 
/usr/share/doc/slapd/examples/slapd.conf)
usa an unoptimal ACL:

 access to attrs=userPassword,shadowLastChange
        by dn="@ADMIN@" write
        by anonymous auth
        by self write
        by * none

this ACL prevent the anonymous (read) access to 'shadowLastChange',
preventing nss (i've tested libnss-ldap and libnss-ldaps/nslcd, it is
the same), if configured to use anonymous bind, to correctly handle
password expiration saved on LDAP.
With libnss-ldap, you can set 'rootbinddn', with libnss-ldaps/nslcd you
are forced to bind with sufficient privileges.

I think that 'shadowLastChange' is an information that does't need more
privacy then others Shadow* ones, so i propose this new ACL:

 access to attrs=userPassword
        by dn="@ADMIN@" write
        by anonymous auth
        by self write
        by * none
 access to attrs=shadowLastChange
        by dn="@ADMIN@" write
        by self write
        by * read

Thanks.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to