<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fripost-ansible/roles/LDAP-provider, branch master</title>
<subtitle>Fripost ansible scripts</subtitle>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/'/>
<entry>
<title>LDAP: Load dynlist overlay.</title>
<updated>2025-02-01T12:56:14+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2025-01-29T23:58:13+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=f647dd2265bf4c5a2903325f628774eace2011ce'/>
<id>f647dd2265bf4c5a2903325f628774eace2011ce</id>
<content type='text'>
Looks like nextcloud 26-29 broke something in the handling of dynamic
groups via memberURL attribute (and keeps repopulating the group —
possibly due to paging — thereby spamming members with “An administrator
removed you from group medlemmar” mails), so we expand on the slapd via
slapo-dynlist(5) instead.

This commit also fixes an issue with the openldap module where the index
of the leftmost attribute of the DN is not necessary {0}.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Looks like nextcloud 26-29 broke something in the handling of dynamic
groups via memberURL attribute (and keeps repopulating the group —
possibly due to paging — thereby spamming members with “An administrator
removed you from group medlemmar” mails), so we expand on the slapd via
slapo-dynlist(5) instead.

This commit also fixes an issue with the openldap module where the index
of the leftmost attribute of the DN is not necessary {0}.
</pre>
</div>
</content>
</entry>
<entry>
<title>LDAP: Update role to Debian Buster.</title>
<updated>2020-05-19T04:36:36+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-05-19T04:11:29+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=7249ebbf9237afe6cccb6069d8c910b4a5975cdf'/>
<id>7249ebbf9237afe6cccb6069d8c910b4a5975cdf</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>LDAP: Expose part of the database to Nextcloud.</title>
<updated>2018-04-04T14:07:53+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2018-04-04T14:07:53+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=779fc904868bb2bc3f5f73cfd225ec7655ba14cf'/>
<id>779fc904868bb2bc3f5f73cfd225ec7655ba14cf</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Upgrade playbooks to Ansible 2.0.</title>
<updated>2016-02-12T19:06:22+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2016-02-12T14:25:31+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=fa8d2b668550259e6f78d16fc209c4da1a20b842'/>
<id>fa8d2b668550259e6f78d16fc209c4da1a20b842</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Upgrade the LDAP config to Jessie.</title>
<updated>2015-06-07T00:53:26+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2015-05-14T19:53:14+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=334b7604727810c02ecb8942f3753dee15466691'/>
<id>334b7604727810c02ecb8942f3753dee15466691</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Make the Ansible LDAP plugin able to delete entries and attributes.</title>
<updated>2015-06-07T00:52:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-07T21:02:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=9198e7f8096e9f1b0d5f474cf2345913a357f864'/>
<id>9198e7f8096e9f1b0d5f474cf2345913a357f864</id>
<content type='text'>
Use it to delete cn=admin,dc=fripost,dc=org, and to remove the rootDN on
the 'config' database.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Use it to delete cn=admin,dc=fripost,dc=org, and to remove the rootDN on
the 'config' database.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix race condition when generating cerificates for slapd.</title>
<updated>2015-06-07T00:52:40+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-07T18:12:28+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=3e38718677b10faca8970d9b1cc8edc215cce798'/>
<id>3e38718677b10faca8970d9b1cc8edc215cce798</id>
<content type='text'>
The SyncProv won't start if the file olcTLSCACertificateFile points to
doesn't exist.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The SyncProv won't start if the file olcTLSCACertificateFile points to
doesn't exist.
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove o=mailHosting from the LDAP directory suffix.</title>
<updated>2015-06-07T00:52:39+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-07T16:37:30+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=2dfe29dfcd35fae7160178e329fb0647cc896e3b'/>
<id>2dfe29dfcd35fae7160178e329fb0647cc896e3b</id>
<content type='text'>
So our suffix is now a mere 'dc=fripost,dc=org'.  We're also using the
default '/var/lib/ldap' as olcDbDirectory (hence we don't clear it
before hand).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
So our suffix is now a mere 'dc=fripost,dc=org'.  We're also using the
default '/var/lib/ldap' as olcDbDirectory (hence we don't clear it
before hand).
</pre>
</div>
</content>
</entry>
<entry>
<title>Configure SyncRepl (OpenLDAP replication) and related ACLs.</title>
<updated>2015-06-07T00:52:34+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-07T03:16:53+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=7c01a383fae4d84727d6a036d93117c761b98e10'/>
<id>7c01a383fae4d84727d6a036d93117c761b98e10</id>
<content type='text'>
The clients are identified using their certificate, and connect securely
to the SyncProv.

There are a few workarounds (XXX) in the ACLs due to Postfix not
supporting SASL binds in Wheezy.
Overview:
  - Authentication (XXX: strong authentication) is required prior to any DIT
    operation (see 'olcRequires').
  - We force a Security Strength Factor of 128 or above for all operations (see
    'olcSecurity'), meaning one must use either a local connection (eg,
    ldapi://, possible since we set the 'olcLocalSSF' to 128), or TLS with at
    least 128 bits of security.
  - XXX: Services may not simple bind other than locally on a ldapi:// socket.
    If no remote access is needed, they should use SASL/EXTERNAL on a ldapi://
    socket whenever possible (if the service itself supports SASL binds).
    If remote access is needed, they should use SASL/EXTERNAL on a ldaps://
    socket, and their identity should be derived from the CN of the client
    certificate only (hence services may not simple bind).
  - Admins have restrictions similar to that of the services.
  - User access is only restricted by our global 'olcSecurity' attribute.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The clients are identified using their certificate, and connect securely
to the SyncProv.

There are a few workarounds (XXX) in the ACLs due to Postfix not
supporting SASL binds in Wheezy.
Overview:
  - Authentication (XXX: strong authentication) is required prior to any DIT
    operation (see 'olcRequires').
  - We force a Security Strength Factor of 128 or above for all operations (see
    'olcSecurity'), meaning one must use either a local connection (eg,
    ldapi://, possible since we set the 'olcLocalSSF' to 128), or TLS with at
    least 128 bits of security.
  - XXX: Services may not simple bind other than locally on a ldapi:// socket.
    If no remote access is needed, they should use SASL/EXTERNAL on a ldapi://
    socket whenever possible (if the service itself supports SASL binds).
    If remote access is needed, they should use SASL/EXTERNAL on a ldaps://
    socket, and their identity should be derived from the CN of the client
    certificate only (hence services may not simple bind).
  - Admins have restrictions similar to that of the services.
  - User access is only restricted by our global 'olcSecurity' attribute.
</pre>
</div>
</content>
</entry>
<entry>
<title>Enable zero-copy updates to the LDAP directory.</title>
<updated>2015-06-07T00:52:32+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-06T17:55:58+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=1e68d980a0587bb1afea3685d0a46fce86135cb9'/>
<id>1e68d980a0587bb1afea3685d0a46fce86135cb9</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
