Why kdb5_ldap_util create does not need -H but kdb5_ldap_util list needs -H
Greg Hudson
ghudson at mit.edu
Tue Sep 10 01:34:54 EDT 2019
On 9/6/19 11:43 AM, Дилян Палаузов wrote:
> Alright. While “kdb5_ldap_util create -r Y.EXAMPLE” does take the ldap address from the ldap_servers setting for the
> realm/domain, so no -H parameter is necessary, how is “kdb5_ldap_util list” supposed to obtain the address of the
> ldap_server to connect to? Does it use, if -H is missing, the ldap_server of the default domain?
Yes.
> Is there any way that MIT Kerberos withLDAP can use the
> user passwords stored in inetorgperson:userPassword attribute, instead from the krbPrincipalKey: attribute? The use
> case is to reuse an existing infrastructure, where passwords are already hashed in userPassword.
No, a Kerberos database cannot use hashed LDAP passwords. Kerberos uses
an enctype-specific string-to-key conversion on passwords, and that
conversion doesn't resemble the password hashing used in LDAP.
> admin/conf_ldap.html proposes these access rigths:
These and some of the other rights can be removed from the
documentation, as far as I can tell. They may date back to the Novell
eDirectory origins of the LDAP KDB module.
I filed https://github.com/krb5/krb5/pull/974 to update the
documentation, and will merge it after review. Thanks for the detailed
feedback. (Also, per the ticket you filed a week ago, I will look into
adding epub versions of the documentation.)
More information about the krbdev
mailing list