-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please fix the image so that it does not store passwords in clear text #6
Comments
[1] is another link we came across on how to enable password hashing. The steps are quite different so we are not sure whether this is more correct or [2]. Is it possible that there is some module or something that needs to be enabled in the Dockerfile configuration for |
I'll have to take a look at this in a few days as I'm a bit a) under the weather b) have a few work related things on the go that are burning. I'm considering wrapping this into the image as a container startup routine based on an environment variable. I think that would be our best and easiest option to target most users. |
I just took a quick peek at my running configuration and it seems I have already had it set, likely a manual setting, which is perhaps why you are not seeing these hashed results. I import the ppolicy.schema from /etc/openldap/schema on container init but based on your link that would need to be added to the overlay in the config database. I can't say for sure as I wasn't involved in the heavy migration of our systems to this container, just involved in the building. To err on the side of caution, I'm thinking of if some var ie HASH is other than plaintext then apply it both to the olc config as per 2 and then also apply that as per 1. It'll be a few days as I mentioned above. |
Thanks Dave. The other thing I can think of is - did we add the where is the code that is importing the ppolicy.schema from /etc/openldap/schema on container init? when we looked at ppolicy.schema file, it looks like it just contains policies like password length, what characters it should have, when it should expire and so on. It doesn't contain anything pertaining to hashed passwords at all. |
I would be line 408 - 411 of 10-openldap which does that. But you are correct, that schema looks very strange. Since it's an overlay schema it simply provides the possibility of supporting those values, however doesn't create any ppolicies in itself. If you take a peek at your raw filesystem inside config you'll see where the entries actually reside.
|
this is what we get when we do a grep of Hash:
so I think we added the entry to the right file. we do not see any
this is what we have:
|
also we don't see any line 408 - 411 in 10-openldap. there is just one file in that directory - this and it has only 12 lines |
OK that would do it - Would need to setup Ppolicy. I think I know where my Ppolicy came from, which is from my openldap-fusiondirectory container which sets it up automatically. Lines 260 -274 of that repo has this:
And I'm adding it with this: |
Sorry with regards to the 10-openldap - I am meaning |
Thanks Dave. Lines 260 -274 fixed it. |
This image stores passwords as clear text. Could this be fixed please so that passwords are stored as {SSHA}?
fwiw we modified the config to add olcPasswordHash: {SSHA} per this but it does not have any effect.
before:
after:
but passwords continue to be stored in clear text (base64 encoded).
The text was updated successfully, but these errors were encountered: