xavier:

When say -> "so you can't use anything but plain or login as method
of authentication", explain further. For instance: what password
checking mechanism is specified in file -> "/etc/imapd.conf"?

Are you using "pam_ldap" to BIND to LDAP?

RB

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of xavier renaut
Sent: Wednesday, April 10, 2002 5:49 PM
To: [EMAIL PROTECTED]
Subject: Re: Storing user passwords, LDAP


On Wed, Apr 10, 2002 at 10:40:48PM +0200, Bart Janssens wrote:
> Hello
>
> I want to have all user info in an ldap server, but I am not sure on how
to store the passwords. Currently, I am in doubt between simply using
userPassword: {CRYPT}... or userPassword: {SASL}uid and storing the
passwords in sasldb. Which would be safer? I understand that if I use
DIGEST-MD5, gaining access to the sasldb file would give full access to the
attacker, so it seems to me that it would be safer to simply use {CRYPT} and
then protect the password with the usual ACL.
>

As I understand it,
one have choice between

 - storing the passwd in sasldb
(and if you put them in ldap too, you have to manage duplicates)

 - or in ldap.

(btw, it seems that {SSHA} hashing is the best secure way to crypt
a password)


If it's stored in ldap, cyrus is doing authentication
by BINDING to ldap as the user, not retrieving the passwd.
So ldap is doing the authentication. so you can't use anything
but plain or login as method of authentication...
because cyrus would need the clear passwd to do digest-md5
or cram-md5...

to summarize : sasldb permits (cram|digest)-md5
               ldap gives the centralization

Hope this helps, (and i hope i'm not doing any mistakes hear)

bye

xavier

Reply via email to