[Bug 212538] [net/nss-pam-ldapd] [security] shadowExpire is not propagated to pw_expire
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Fri Sep 9 20:32:59 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=212538
Bug ID: 212538
Summary: [net/nss-pam-ldapd] [security] shadowExpire is not
propagated to pw_expire
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Some People
Priority: ---
Component: Individual Port(s)
Assignee: zi at FreeBSD.org
Reporter: wollman at FreeBSD.org
Flags: maintainer-feedback?(zi at FreeBSD.org)
Assignee: zi at FreeBSD.org
The standard way for handling account expiration when using LDAP for "password
database" purposes is to define a shadowExpire attribute on the user. On Linux
and Solaris, this is implemented by the goofy bag-on-the-side "shadow"
mechanism, which is treated as a separate database in NSS, and the architecture
of nss-pam-ldapd reflects this. Account expiration in FreeBSD is implemented
in the standard password database, but the nslcd stubs in nss-pam-ldapd's
nsswitch module do not do the extra RPC to look up the expiration information
via the "shadow" stuff and merge it into the passwd entry.
As a result, you cannot use nss-pam-ldapd in a FreeBSD environment if your
directory operator uses shadowExpire to disable logins.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list