* Damyan Ivanov ([EMAIL PROTECTED]) wrote:
> Right now, if I put password in /etc/libnss-ldap.conf (and therefore
> protect the file with 0600 permissions), only root can access ldap via
> nss. Others get assertions. This makes the password-along-everything
> setup highly unusable (to me).
> 
> It is my belief that the default configuration makes exactly the right
> thing - stores the password in a separate (and protected) file. Why then
> fiddle with libnss-ldap.conf's permissions at all and break things?

The seperate file is only for when *you* are running as root and
bind'ing with the rootdn.  Regular users *must* be able to connect to
LDAP to do NSS lookups.  If your LDAP server requires a password then
you need to provide it somewhere the user can get it.  If you don't want
that then allow anonymous binds in the server.

A workaround is to run nscd to proxy user requests through a root-owned
process, and that works just fine if libnss-ldap.conf is 600.

        Thanks,

                Stephen

Attachment: signature.asc
Description: Digital signature

Reply via email to