<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fripost-ansible/roles/common-LDAP/templates/etc/default, branch master</title>
<subtitle>Fripost ansible scripts</subtitle>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/'/>
<entry>
<title>typofix</title>
<updated>2024-09-08T00:27:38+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2024-09-08T00:27:38+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=b84b96b199f22c7b5332605072759c8f74f968bc'/>
<id>b84b96b199f22c7b5332605072759c8f74f968bc</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Port baseline to Debian 11 (codename Bullseye).</title>
<updated>2022-10-13T20:12:05+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2022-10-11T23:43:23+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=85347041a04d17f6803100dd2cec9b489c9db47d'/>
<id>85347041a04d17f6803100dd2cec9b489c9db47d</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>s/LDAP-provider/LDAP_provider/</title>
<updated>2020-05-19T04:07:43+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-05-19T04:04:47+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=c9ecd815b4b77a57589f3588eba6c7d8ddfac020'/>
<id>c9ecd815b4b77a57589f3588eba6c7d8ddfac020</id>
<content type='text'>
This was forgotten after a092bfd947773281a23419ee0ab62358371b7166.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This was forgotten after a092bfd947773281a23419ee0ab62358371b7166.
</pre>
</div>
</content>
</entry>
<entry>
<title>Don't let authenticated client use arbitrary sender addresses.</title>
<updated>2017-05-31T23:09:00+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2017-05-31T19:42:32+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=6e39bad3fbe75b88fca4c2e2aad8eb51af14b1be'/>
<id>6e39bad3fbe75b88fca4c2e2aad8eb51af14b1be</id>
<content type='text'>
The following policy is now implemented:

    * users can use their SASL login name as sender address;
    * alias and/or list owners can use the address as envelope sender;
    * domain postmasters can use arbitrary sender addresses under their
      domains;
    * domain owners can use arbitrary sender addresses under their domains,
      unless it is also an existing account name;
    * for known domains without owner or postmasters, other sender addresses
      are not allowed; and
    * arbitrary sender addresses under unknown domains are allowed.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The following policy is now implemented:

    * users can use their SASL login name as sender address;
    * alias and/or list owners can use the address as envelope sender;
    * domain postmasters can use arbitrary sender addresses under their
      domains;
    * domain owners can use arbitrary sender addresses under their domains,
      unless it is also an existing account name;
    * for known domains without owner or postmasters, other sender addresses
      are not allowed; and
    * arbitrary sender addresses under unknown domains are allowed.
</pre>
</div>
</content>
</entry>
<entry>
<title>Ensure Postfix's LDAP searchBase exists when doing a lookup.</title>
<updated>2015-06-07T00:52:48+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-08T23:08:02+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=368540caee8fff8aa90b1542897188e9f98ac585'/>
<id>368540caee8fff8aa90b1542897188e9f98ac585</id>
<content type='text'>
Postfix interprets Error Code 32 (No Such Object) as lookup failures,
but that's ugly...

Also, make Postfix simple bind against
cn=postfix,ou=services,dc=fripost,dc=org.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Postfix interprets Error Code 32 (No Such Object) as lookup failures,
but that's ugly...

Also, make Postfix simple bind against
cn=postfix,ou=services,dc=fripost,dc=org.
</pre>
</div>
</content>
</entry>
<entry>
<title>Configure SyncRepl (OpenLDAP replication) and related ACLs.</title>
<updated>2015-06-07T00:52:34+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2014-07-07T03:16:53+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=7c01a383fae4d84727d6a036d93117c761b98e10'/>
<id>7c01a383fae4d84727d6a036d93117c761b98e10</id>
<content type='text'>
The clients are identified using their certificate, and connect securely
to the SyncProv.

There are a few workarounds (XXX) in the ACLs due to Postfix not
supporting SASL binds in Wheezy.
Overview:
  - Authentication (XXX: strong authentication) is required prior to any DIT
    operation (see 'olcRequires').
  - We force a Security Strength Factor of 128 or above for all operations (see
    'olcSecurity'), meaning one must use either a local connection (eg,
    ldapi://, possible since we set the 'olcLocalSSF' to 128), or TLS with at
    least 128 bits of security.
  - XXX: Services may not simple bind other than locally on a ldapi:// socket.
    If no remote access is needed, they should use SASL/EXTERNAL on a ldapi://
    socket whenever possible (if the service itself supports SASL binds).
    If remote access is needed, they should use SASL/EXTERNAL on a ldaps://
    socket, and their identity should be derived from the CN of the client
    certificate only (hence services may not simple bind).
  - Admins have restrictions similar to that of the services.
  - User access is only restricted by our global 'olcSecurity' attribute.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The clients are identified using their certificate, and connect securely
to the SyncProv.

There are a few workarounds (XXX) in the ACLs due to Postfix not
supporting SASL binds in Wheezy.
Overview:
  - Authentication (XXX: strong authentication) is required prior to any DIT
    operation (see 'olcRequires').
  - We force a Security Strength Factor of 128 or above for all operations (see
    'olcSecurity'), meaning one must use either a local connection (eg,
    ldapi://, possible since we set the 'olcLocalSSF' to 128), or TLS with at
    least 128 bits of security.
  - XXX: Services may not simple bind other than locally on a ldapi:// socket.
    If no remote access is needed, they should use SASL/EXTERNAL on a ldapi://
    socket whenever possible (if the service itself supports SASL binds).
    If remote access is needed, they should use SASL/EXTERNAL on a ldaps://
    socket, and their identity should be derived from the CN of the client
    certificate only (hence services may not simple bind).
  - Admins have restrictions similar to that of the services.
  - User access is only restricted by our global 'olcSecurity' attribute.
</pre>
</div>
</content>
</entry>
<entry>
<title>LDAP Sync Replication.</title>
<updated>2015-06-07T00:51:05+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2013-12-02T02:42:57+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=5a7bec1a590e20e263d41eaf414cfe9b5ba48a75'/>
<id>5a7bec1a590e20e263d41eaf414cfe9b5ba48a75</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Provision /etc/default/slapd</title>
<updated>2015-06-07T00:51:02+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2013-12-01T21:21:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.fripost.org/fripost-ansible/commit/?id=0c99d9d1600c0fe2c494f9c59ba8ea7966dcd65f'/>
<id>0c99d9d1600c0fe2c494f9c59ba8ea7966dcd65f</id>
<content type='text'>
This is because the UNIX domain socket to connect to when performing
LDAP lookups needs to be in the chroot.

Also, don't open a INET socket unless we're a Sync Provider.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is because the UNIX domain socket to connect to when performing
LDAP lookups needs to be in the chroot.

Also, don't open a INET socket unless we're a Sync Provider.
</pre>
</div>
</content>
</entry>
</feed>
