Bug 43425 - Disable simple_bind over unencrypted ldap://$HOST:[7]389
Disable simple_bind over unencrypted ldap://$HOST:[7]389
Status: REOPENED
Product: UCS
Classification: Unclassified
Component: LDAP
UCS 5.0
Other Linux
: P5 enhancement (vote)
: ---
Assigned To: UCS maintainers
UCS maintainers
http://www.openldap.org/doc/admin24/s...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-01-26 12:06 CET by Philipp Hahn
Modified: 2021-12-21 14:36 CET (History)
4 users (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number: 2017012521000238
Bug group (optional):
Max CVSS v3 score: 4.7 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Philipp Hahn univentionstaff 2017-01-26 12:06:59 CET
OpenLDAP still accepts Simple-BIND over unencrypted ldap://$HOST:[7]389 connections:

 ldapwhoami -H ldaps://$(hostname -f):7636 -D uid=Administrator,cn=users,$(ucr get ldap/base) -w univention
OKAY
 ldapwhoami -H ldap://$(hostname -f):7389 -D uid=Administrator,cn=users,$(ucr get ldap/base) -w univention
NOT OKAY
 ldapwhoami -H ldap://$(hostname -f):7389 -Z -D uid=Administrator,cn=users,$(ucr get ldap/base) -w univention
OKAY
 kinit Administrator
 ldapwhoami -H ldap://$(hostname -f):7389 -Y GSSAPI
OKAY


NAME='disable-unencrypted-simple-bind'
DIR='/etc/univention/templates'
CONF='/etc/ldap/slapd.conf'
SUB="${CONF#/}.d/35${NAME}"
INFO="${DIR}/info/${NAME}.info"
printf "security simple_bind=56\n\n" >"${DIR}/files/${SUB}"
printf "Type: subfile\nMultifile: ${CONF#/}\nSubfile: ${SUB#/}\n" >"$INFO"
ucr register "${NAME}"
service slapd restart
Comment 1 Philipp Hahn univentionstaff 2017-01-26 13:06:04 CET
There is no option for /etc/ldap/ldap.conf do enable STARTTLS by default; you always have to specify "-ZZ" on the command line.
Comment 2 Ingo Steuwer univentionstaff 2020-07-03 20:51:45 CEST
This issue has been filed against UCS 4.2.

UCS 4.2 is out of maintenance and many UCS components have changed in later releases. Thus, this issue is now being closed.

If this issue still occurs in newer UCS versions, please use "Clone this bug" or reopen it and update the UCS version. In this case please provide detailed information on how this issue is affecting you.
Comment 3 Philipp Hahn univentionstaff 2020-07-04 07:50:10 CEST
UCS still does have this vulnerability!