[prev in list] [next in list] [prev in thread] [next in thread]
List: apache-httpd-bugs
Subject: [Bug 64472] New: mod_auth_digest module's AuthDigestProvider directive does not sets 'ldap' as provi
From: bugzilla () apache ! org
Date: 2020-05-27 6:43:50
Message-ID: bug-64472-7868 () https ! bz ! apache ! org/bugzilla/
[Download RAW message or body]
https://bz.apache.org/bugzilla/show_bug.cgi?id=64472
Bug ID: 64472
Summary: mod_auth_digest module's AuthDigestProvider directive
does not sets 'ldap' as provider to authenticate users
from LDAP
Product: Apache httpd-2
Version: 2.4.43
Hardware: All
OS: All
Status: NEW
Severity: blocker
Priority: P2
Component: mod_auth_digest
Assignee: bugs@httpd.apache.org
Reporter: rohitgaikwad0907@gmail.com
Target Milestone: ---
1) The AuthnProviderAlias supports AuthBasicProvider of mod_auth_basic module
for authentication with "ldap".
Reference: https://httpd.apache.org/docs/2.4/mod/mod_authn_core.html
WhereAs, AuthnProviderAlias does not supports AuthDigestProvider of
mod_auth_digest module for authentication with "ldap".
The below configuration does not work with AuthDigestProvider for "ldap":
# Basic Authentication provider
<AuthnProviderAlias ldap MyEnterpriseLdap>
AuthLDAPURL
"ldap://machine1.abcd.com:389/CN=Users,DC=abcd,DC=com?sAMAccountName?sub?(objectClass=*)"
AuthLDAPBindDN "CN=rohit,CN=Users,DC=abcd,DC=com"
AuthLDAPBindPassword "abc123"
LDAPReferrals Off
</AuthnProviderAlias>
# Authenticated resources
<LocationMatch ^/+WebApp/+(;.*)?>
AuthName "WebApp"
AuthType Basic
AuthBasicProvider MyEnterpriseLdap
Require valid-user
</LocationMatch>
2) Moreover, are there any plans to implement "auth-int" for AuthDigestQop
Directive
https://httpd.apache.org/docs/2.4/mod/mod_auth_digest.html#page-header
3) There will be an blocking issue in second half of calendar year 2020, When
Microsoft addresses CVE-2017-8563
(https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8563)
a set of unsafe default configurations for LDAP channel binding and LDAP
signing which exist on Active Directory domain controllers that let LDAP
clients communicate with them without enforcing LDAP channel binding and LDAP
signing.
Thus the LDAP simple binds now needs to be converted into SASL like DIGEST-MD5
and add a support for signing through qop as a "auth-int".
Can someone please have a look into the issue? This will cause all LDAP
applications which uses AuthType as "Basic" to move to port 636 and switch to
SSL/TLS.
However, When SASL(DIGEST-MD5) with signing(auth-int) is used, LDAP Clients
that do enable or support signing can connect over port 389.
Thanks,
--Rohit
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic