You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@directory.apache.org by "Andreas Oberritter (JIRA)" <ji...@apache.org> on 2010/08/13 21:31:18 UTC

[jira] Created: (DIRKRB-29) Using randomKey creates a valid LDAP login

Using randomKey creates a valid LDAP login
------------------------------------------

                 Key: DIRKRB-29
                 URL: https://issues.apache.org/jira/browse/DIRKRB-29
             Project: Directory Kerberos
          Issue Type: Bug
    Affects Versions: 2.0.0
            Reporter: Andreas Oberritter
            Assignee: Emmanuel Lecharny
             Fix For: 2.0.0


Setting userPassword to "randomKey" triggers the generation of Kerberos keys. However, "randomKey" also gets stored as the real LDAP users password. This creates accounts with easily guessable DNs like uid=krbtgt,ou=people,dc=example,dc=com, which can be used to access the LDAP server.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


[jira] Commented: (DIRKRB-29) Using randomKey creates a valid LDAP login

Posted by "Kiran Ayyagari (JIRA)" <ji...@apache.org>.
    [ https://issues.apache.org/jira/browse/DIRKRB-29?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12898848#action_12898848 ] 

Kiran Ayyagari commented on DIRKRB-29:
--------------------------------------

We don't have much time to fix this now, kerberos will be our next priority after releasing ApacheDS 2.0.

> Using randomKey creates a valid LDAP login
> ------------------------------------------
>
>                 Key: DIRKRB-29
>                 URL: https://issues.apache.org/jira/browse/DIRKRB-29
>             Project: Directory Kerberos
>          Issue Type: Bug
>    Affects Versions: 2.0.0
>            Reporter: Andreas Oberritter
>            Assignee: Emmanuel Lecharny
>             Fix For: 2.0.0
>
>
> Setting userPassword to "randomKey" triggers the generation of Kerberos keys. However, "randomKey" also gets stored as the real LDAP users password. This creates accounts with easily guessable DNs like uid=krbtgt,ou=people,dc=example,dc=com, which can be used to access the LDAP server.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.