RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 813942 - Documentation for disabling anonymous access should allow RootDSE access
Summary: Documentation for disabling anonymous access should allow RootDSE access
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: doc-Identity_Management_Guide
Version: 6.3
Hardware: Unspecified
OS: Linux
unspecified
medium
Target Milestone: rc
: ---
Assignee: Deon Ballard
QA Contact: ecs-bugs
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-04-18 19:59 UTC by Stephen Gallagher
Modified: 2012-06-21 23:12 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-06-21 23:12:39 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Stephen Gallagher 2012-04-18 19:59:30 UTC
Description of problem:
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/disabling-anon-binds.html 

Version-Release number of selected component (if applicable):
2.1.4


The documentation should be changed from
nsslapd-allow-anonymous-access: off
to
nsslapd-allow-anonymous-access: rootdse


and should be updated to explain that the meaning of this option is that anonymous users will have access to the rootdse (for reading the capabilities of the server for clients). Aside from the rootdse, anonymous users will be unable to read any part of the server's data.

This is much preferred to the current recommendation to disable all anonymous access, as there are many clients (SSSD included) that behave better (or in some cases, "at all") with access to the rootdse.

There is no known security exposure inherent in allowing RootDSE access.

Comment 2 Dmitri Pal 2012-04-18 21:45:24 UTC
It is probably worth noting that with the latest planned fix for SSSD the SSSD will read rootDSE after bind to get the information about server capabilities however other clients might have difficulties using IPA in an efficient way.

My point is that this not is probably not needed if the client is 6.3 SSSD.

Comment 3 Stephen Gallagher 2012-04-18 22:05:10 UTC
(In reply to comment #2)
> It is probably worth noting that with the latest planned fix for SSSD the SSSD
> will read rootDSE after bind to get the information about server capabilities
> however other clients might have difficulties using IPA in an efficient way.
> 
> My point is that this not is probably not needed if the client is 6.3 SSSD.

This is incorrect. SSSD is not the only client of IPA. This will have implications on ANY LDAP client (not just those used for system logins). Anyone attempting to use IPA as the identity store for applications (such as web apps) may have issues with this. The availability of the RootDSE is required by the LDAP specification as it may be the only way that a client can learn what settings are available to negotiate a connection (for example, supportedSASLMechanisms).

We are going to work around this issue in SSSD partially because of the FreeIPA issue but also to avoid issues with other directory servers that do not behave properly with the RootDSE.

It is still strongly recommended that we change this document as described above. There is no downside to this change and a great deal of upside.

Comment 4 Dmitri Pal 2012-04-18 22:14:20 UTC
Please read my comment more closely. I said exactly what you said. For no SSSD clients this is needed however for SSSD 6.3 it would not be needed since the SSSD would work it around. Where do you see incorrectness?

Comment 5 Stephen Gallagher 2012-04-18 22:57:54 UTC
(In reply to comment #2)
> My point is that this not is probably not needed if the client is 6.3 SSSD.

This is the part of your statement I was disagreeing with. There will probably *never* be a situation where 100% of IPA's clients will be SSSD for the entire life of the deployment. Failing to set this properly will inevitably lead to hard-to-identify issues with other software down the line. So my view is that we need to encourage people to set this correctly right from the start.

It may be that we agree and it's just the phrasing that's tripping us up. I just want to be clear here, so that we don't confuse the issue when editing the documentation.

Comment 6 Dmitri Pal 2012-04-19 16:22:34 UTC
Yes I mean if ALL your clients are SSSD 6.3 or later you do not need it. But you might need it (or might not need it) for the third partly LDAP client as you do not know whether it looks at rootDSE or not if would work incorrectly or not optimally if the rootDSE is inaccessible.

So the do note should say you need this setting with old SSSD and clients that try to access rootDSE. If your environment consists entirely of the clients that do not need access to the rootDSE before bind or with SSSD 6.3 or later you do not need this setting.

Hope it is clear now.

Comment 9 John Skeoch 2012-04-24 02:22:07 UTC
Based on Comment#8 moved to verified

Comment 11 Sigbjorn Lie 2012-06-10 19:32:33 UTC
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6-Beta/html/Identity_Management_Guide/disabling-anon-binds.html

Is step 2 (Restart the directory server) required? 

This change has taken immedieate effect when I have changed the nsslapd-allow-anonymous-access setting using an LDAP editor.

Comment 12 Deon Ballard 2012-06-21 23:12:39 UTC
Closing.


Note You need to log in before you can comment on or make changes to this bug.