]> pere.pagekite.me Git - homepage.git/blob - blog/tags/ldap/ldap.rss
0cd901e0e8fc218cf168466f67540b7cfd2f427f
[homepage.git] / blog / tags / ldap / ldap.rss
1 <?xml version="1.0" encoding="utf-8"?>
2 <rss version='2.0' xmlns:lj='http://www.livejournal.org/rss/lj/1.0/'>
3 <channel>
4 <title>Petter Reinholdtsen - Entries tagged ldap</title>
5 <description>Entries tagged ldap</description>
6 <link>http://people.skolelinux.org/pere/blog/</link>
7
8
9 <item>
10 <title>Time for new LDAP schemas replacing RFC 2307?</title>
11 <link>http://people.skolelinux.org/pere/blog/Time_for_new__LDAP_schemas_replacing_RFC_2307_.html</link>
12 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Time_for_new__LDAP_schemas_replacing_RFC_2307_.html</guid>
13 <pubDate>Sun, 29 Mar 2009 20:30:00 +0200</pubDate>
14 <description>
15 &lt;p&gt;The state of standardized LDAP schemas on Linux is far from
16 optimal. There is RFC 2307 documenting one way to store NIS maps in
17 LDAP, and a modified version of this normally called RFC 2307bis, with
18 some modifications to be compatible with Active Directory. The RFC
19 specification handle the content of a lot of system databases, but do
20 not handle DNS zones and DHCP configuration.&lt;/p&gt;
21
22 &lt;p&gt;In &lt;a href=&quot;http://www.skolelinux.org/&quot;&gt;Debian Edu/Skolelinux&lt;/a&gt;,
23 we would like to store information about users, SMB clients/hosts,
24 filegroups, netgroups (users and hosts), DHCP and DNS configuration,
25 and LTSP configuration in LDAP. These objects have a lot in common,
26 but with the current LDAP schemas it is not possible to have one
27 object per entity. For example, one need to have at least three LDAP
28 objects for a given computer, one with the SMB related stuff, one with
29 DNS information and another with DHCP information. The schemas
30 provided for DNS and DHCP are impossible to combine into one LDAP
31 object. In addition, it is impossible to implement quick queries for
32 netgroup membership, because of the way NIS triples are implemented.
33 It just do not scale. I believe it is time for a few RFC
34 specifications to cleam up this mess.&lt;/p&gt;
35
36 &lt;p&gt;I would like to have one LDAP object representing each computer in
37 the network, and this object can then keep the SMB (ie host key), DHCP
38 (mac address/name) and DNS (name/IP address) settings in one place.
39 It need to be efficently stored to make sure it scale well.&lt;/p&gt;
40
41 &lt;p&gt;I would also like to have a quick way to map from a user or
42 computer and to the net group this user or computer is a member.&lt;/p&gt;
43
44 &lt;p&gt;Active Directory have done a better job than unix heads like myself
45 in this regard, and the unix side need to catch up. Time to start a
46 new IETF work group?&lt;/p&gt;
47 </description>
48 </item>
49
50 <item>
51 <title>Idea for a change to LDAP schemas allowing DNS and DHCP info to be combined into one object</title>
52 <link>http://people.skolelinux.org/pere/blog/Idea_for_a_change_to_LDAP_schemas_allowing_DNS_and_DHCP_info_to_be_combined_into_one_object.html</link>
53 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Idea_for_a_change_to_LDAP_schemas_allowing_DNS_and_DHCP_info_to_be_combined_into_one_object.html</guid>
54 <pubDate>Thu, 24 Jun 2010 00:35:00 +0200</pubDate>
55 <description>
56 &lt;p&gt;A while back, I
57 &lt;a href=&quot;http://people.skolelinux.org/pere/blog/Time_for_new__LDAP_schemas_replacing_RFC_2307_.html&quot;&gt;complained
58 about the fact&lt;/a&gt; that it is not possible with the provided schemas
59 for storing DNS and DHCP information in LDAP to combine the two sets
60 of information into one LDAP object representing a computer.&lt;/p&gt;
61
62 &lt;p&gt;In the mean time, I discovered that a simple fix would be to make
63 the dhcpHost object class auxiliary, to allow it to be combined with
64 the dNSDomain object class, and thus forming one object for one
65 computer when storing both DHCP and DNS information in LDAP.&lt;/p&gt;
66
67 &lt;p&gt;If I understand this correctly, it is not safe to do this change
68 without also changing the assigned number for the object class, and I
69 do not know enough about LDAP schema design to do that properly for
70 Debian Edu.&lt;/p&gt;
71
72 &lt;p&gt;Anyway, for future reference, this is how I believe we could change
73 the
74 &lt;a href=&quot;http://tools.ietf.org/html/draft-ietf-dhc-ldap-schema-00&quot;&gt;DHCP
75 schema&lt;/a&gt; to solve at least part of the problem with the LDAP schemas
76 available today from IETF.&lt;/p&gt;
77
78 &lt;pre&gt;
79 --- dhcp.schema (revision 65192)
80 +++ dhcp.schema (working copy)
81 @@ -376,7 +376,7 @@
82 objectclass ( 2.16.840.1.113719.1.203.6.6
83 NAME &#39;dhcpHost&#39;
84 DESC &#39;This represents information about a particular client&#39;
85 - SUP top
86 + SUP top AUXILIARY
87 MUST cn
88 MAY (dhcpLeaseDN $ dhcpHWAddress $ dhcpOptionsDN $ dhcpStatements $ dhcpComments $ dhcpOption)
89 X-NDS_CONTAINMENT (&#39;dhcpService&#39; &#39;dhcpSubnet&#39; &#39;dhcpGroup&#39;) )
90 &lt;/pre&gt;
91
92 &lt;p&gt;I very much welcome clues on how to do this properly for Debian
93 Edu/Squeeze. We provide the DHCP schema in our debian-edu-config
94 package, and should thus be free to rewrite it as we see fit.&lt;/p&gt;
95
96 &lt;p&gt;If you want to help out with implementing this for Debian Edu,
97 please contact us on debian-edu@lists.debian.org.&lt;/p&gt;
98 </description>
99 </item>
100
101 <item>
102 <title>LUMA, a very nice LDAP GUI</title>
103 <link>http://people.skolelinux.org/pere/blog/LUMA__a_very_nice_LDAP_GUI.html</link>
104 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/LUMA__a_very_nice_LDAP_GUI.html</guid>
105 <pubDate>Mon, 28 Jun 2010 00:30:00 +0200</pubDate>
106 <description>
107 &lt;p&gt;The last few days I have been looking into the status of the LDAP
108 directory in Debian Edu, and in the process I started to miss a GUI
109 tool to browse the LDAP tree. The only one I was able to find in
110 Debian/Squeeze and Lenny is
111 &lt;a href=&quot;http://luma.sourceforge.net/&quot;&gt;LUMA&lt;/a&gt;, which has proved to
112 be a great tool to get a overview of the current LDAP directory
113 populated by default in Skolelinux. Thanks to it, I have been able to
114 find empty and obsolete subtrees, misplaced objects and duplicate
115 objects. It will be installed by default in Debian/Squeeze. If you
116 are working with LDAP, give it a go. :)&lt;/p&gt;
117
118 &lt;p&gt;I did notice one problem with it I have not had time to report to
119 the BTS yet. There is no .desktop file in the package, so the tool do
120 not show up in the Gnome and KDE menus, but only deep down in in the
121 Debian submenu in KDE. I hope that can be fixed before Squeeze is
122 released.&lt;/p&gt;
123
124 &lt;p&gt;I have not yet been able to get it to modify the tree yet. I would
125 like to move objects and remove subtrees directly in the GUI, but have
126 not found a way to do that with LUMA yet. So in the mean time, I use
127 &lt;a href=&quot;http://www.lichteblau.com/ldapvi/&quot;&gt;ldapvi&lt;/a&gt; for that.&lt;/p&gt;
128
129 &lt;p&gt;If you have tips on other GUI tools for LDAP that might be useful
130 in Debian Edu, please contact us on debian-edu@lists.debian.org.&lt;/p&gt;
131
132 &lt;p&gt;Update 2010-06-29: Ross Reedstrom tipped us about the
133 &lt;a href=&quot;http://packages.qa.debian.org/g/gq.html&quot;&gt;gq&lt;/a&gt; package as a
134 useful GUI alternative. It seem like a good tool, but is unmaintained
135 in Debian and got a RC bug keeping it out of Squeeze. Unless that
136 changes, it will not be an option for Debian Edu based on Squeeze.&lt;/p&gt;
137 </description>
138 </item>
139
140 <item>
141 <title>Caching password, user and group on a roaming Debian laptop</title>
142 <link>http://people.skolelinux.org/pere/blog/Caching_password__user_and_group_on_a_roaming_Debian_laptop.html</link>
143 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Caching_password__user_and_group_on_a_roaming_Debian_laptop.html</guid>
144 <pubDate>Thu, 1 Jul 2010 11:40:00 +0200</pubDate>
145 <description>
146 &lt;p&gt;For a laptop, centralized user directories and password checking is
147 a bit troubling. Laptops are typically used also when not connected
148 to the network, and it is vital for a user to be able to log in or
149 unlock the screen saver also when a central server is unavailable.
150 This is possible by caching passwords and directory information (user
151 and group attributes) locally, and the packages to do so are available
152 in Debian. Here follow two recipes to set this up in Debian/Squeeze.
153 It is also possible to set up in Debian/Lenny, but require more manual
154 setup there because pam-auth-update is missing in Lenny.&lt;/p&gt;
155
156 &lt;h2&gt;LDAP/Kerberos + nscd + libpam-ccreds + libpam-mklocaluser/pam_mkhomedir&lt;/h2&gt;
157
158 This is the traditional method with a twist. The password caching is
159 provided by libpam-ccreds (version 10-4 or later is needed on
160 Squeeze), and the directory caching is done by nscd. The directory
161 lookup and password checking is done using LDAP. If one want to use
162 Kerberos for password checking the libpam-ldapd package can be
163 replaced with libpam-krb5 or libpam-heimdal. If one is happy having a
164 local home directory with the path listed in LDAP, one can use the
165 pam_mkhomedir module from pam-modules to make this happen instead of
166 using libpam-mklocaluser. A setup for pam-auth-update to enable
167 pam_mkhomedir will have to be written until a fix for
168 &lt;a href=&quot;http://bugs.debian.org/568577&quot;&gt;bug #568577&lt;/a&gt; is in the
169 archive. Because I believe it is a bad idea to have local home
170 directories using misleading paths like /site/server/partition/, I
171 prefer to create a local user with the home directory in /home/. This
172 is done using the libpam-mklocaluser package.&lt;/p&gt;
173
174 &lt;p&gt;These packages need to be installed and configured&lt;/p&gt;
175
176 &lt;blockquote&gt;&lt;pre&gt;
177 libnss-ldapd libpam-ldapd nscd libpam-ccreds libpam-mklocaluser
178 &lt;/pre&gt;&lt;/blockquote&gt;
179
180 &lt;p&gt;The ldapd packages will ask for LDAP connection information, and
181 one have to fill in the values that fits ones own site. Make sure the
182 PAM part uses encrypted connections, to make sure the password is not
183 sent in clear text to the LDAP server. I&#39;ve been unable to get TLS
184 certificate checking for a self signed certificate working, which make
185 LDAP authentication unsafe for Debian Edu (nslcd is not checking if it
186 is talking to the correct LDAP server), and very much welcome feedback
187 on how to get this working.&lt;/p&gt;
188
189 &lt;p&gt;Because nscd do not have a default configuration fit for offline
190 caching until &lt;a href=&quot;http://bugs.debian.org/485282&quot;&gt;bug #485282&lt;/a&gt;
191 is fixed, this configuration should be used instead of the one
192 currently in /etc/nscd.conf. The changes are in the fields
193 reload-count and positive-time-to-live, and is based on the
194 instructions I found in the
195 &lt;a href=&quot;http://www.flyn.org/laptopldap/&quot;&gt;LDAP for Mobile Laptops&lt;/a&gt;
196 instructions by Flyn Computing.&lt;/p&gt;
197
198 &lt;blockquote&gt;&lt;pre&gt;
199 debug-level 0
200 reload-count unlimited
201 paranoia no
202
203 enable-cache passwd yes
204 positive-time-to-live passwd 2592000
205 negative-time-to-live passwd 20
206 suggested-size passwd 211
207 check-files passwd yes
208 persistent passwd yes
209 shared passwd yes
210 max-db-size passwd 33554432
211 auto-propagate passwd yes
212
213 enable-cache group yes
214 positive-time-to-live group 2592000
215 negative-time-to-live group 20
216 suggested-size group 211
217 check-files group yes
218 persistent group yes
219 shared group yes
220 max-db-size group 33554432
221 auto-propagate group yes
222
223 enable-cache hosts no
224 positive-time-to-live hosts 2592000
225 negative-time-to-live hosts 20
226 suggested-size hosts 211
227 check-files hosts yes
228 persistent hosts yes
229 shared hosts yes
230 max-db-size hosts 33554432
231
232 enable-cache services yes
233 positive-time-to-live services 2592000
234 negative-time-to-live services 20
235 suggested-size services 211
236 check-files services yes
237 persistent services yes
238 shared services yes
239 max-db-size services 33554432
240 &lt;/pre&gt;&lt;/blockquote&gt;
241
242 &lt;p&gt;While we wait for a mechanism to update /etc/nsswitch.conf
243 automatically like the one provided in
244 &lt;a href=&quot;http://bugs.debian.org/496915&quot;&gt;bug #496915&lt;/a&gt;, the file
245 content need to be manually replaced to ensure LDAP is used as the
246 directory service on the machine. /etc/nsswitch.conf should normally
247 look like this:&lt;/p&gt;
248
249 &lt;blockquote&gt;&lt;pre&gt;
250 passwd: files ldap
251 group: files ldap
252 shadow: files ldap
253 hosts: files mdns4_minimal [NOTFOUND=return] dns mdns4
254 networks: files
255 protocols: files
256 services: files
257 ethers: files
258 rpc: files
259 netgroup: files ldap
260 &lt;/pre&gt;&lt;/blockquote&gt;
261
262 &lt;p&gt;The important parts are that ldap is listed last for passwd, group,
263 shadow and netgroup.&lt;/p&gt;
264
265 &lt;p&gt;With these changes in place, any user in LDAP will be able to log
266 in locally on the machine using for example kdm, get a local home
267 directory created and have the password as well as user and group
268 attributes cached.
269
270 &lt;h2&gt;LDAP/Kerberos + nss-updatedb + libpam-ccreds +
271 libpam-mklocaluser/pam_mkhomedir&lt;/h2&gt;
272
273 &lt;p&gt;Because nscd have had its share of problems, and seem to have
274 problems doing proper caching, I&#39;ve seen suggestions and recipes to
275 use nss-updatedb to copy parts of the LDAP database locally when the
276 LDAP database is available. I have not tested such setup, because I
277 discovered sssd.&lt;/p&gt;
278
279 &lt;h2&gt;LDAP/Kerberos + sssd + libpam-mklocaluser&lt;/h2&gt;
280
281 &lt;p&gt;A more flexible and robust setup than the nscd combination
282 mentioned earlier that has shown up recently, is the
283 &lt;a href=&quot;https://fedorahosted.org/sssd/&quot;&gt;sssd&lt;/a&gt; package from Redhat.
284 It is part of the &lt;a href=&quot;http://www.freeipa.org/&quot;&gt;FreeIPA&lt;/A&gt; project
285 to provide a Active Directory like directory service for Linux
286 machines. The sssd system combines the caching of passwords and user
287 information into one package, and remove the need for nscd and
288 libpam-ccreds. It support LDAP and Kerberos, but not NIS. Version
289 1.2 do not support netgroups, but it is said that it will support this
290 in version 1.5 expected to show up later in 2010. Because the
291 &lt;a href=&quot;http://packages.qa.debian.org/s/sssd.html&quot;&gt;sssd package&lt;/a&gt;
292 was missing in Debian, I ended up co-maintaining it with Werner, and
293 version 1.2 is now in testing.
294
295 &lt;p&gt;These packages need to be installed and configured to get the
296 roaming setup I want&lt;/p&gt;
297
298 &lt;blockquote&gt;&lt;pre&gt;
299 libpam-sss libnss-sss libpam-mklocaluser
300 &lt;/pre&gt;&lt;/blockquote&gt;
301
302 The complete setup of sssd is done by editing/creating
303 &lt;tt&gt;/etc/sssd/sssd.conf&lt;/tt&gt;.
304
305 &lt;blockquote&gt;&lt;pre&gt;
306 [sssd]
307 config_file_version = 2
308 reconnection_retries = 3
309 sbus_timeout = 30
310 services = nss, pam
311 domains = INTERN
312
313 [nss]
314 filter_groups = root
315 filter_users = root
316 reconnection_retries = 3
317
318 [pam]
319 reconnection_retries = 3
320
321 [domain/INTERN]
322 enumerate = false
323 cache_credentials = true
324
325 id_provider = ldap
326 auth_provider = ldap
327 chpass_provider = ldap
328
329 ldap_uri = ldap://ldap
330 ldap_search_base = dc=skole,dc=skolelinux,dc=no
331 ldap_tls_reqcert = never
332 ldap_tls_cacert = /etc/ssl/certs/ca-certificates.crt
333 &lt;/pre&gt;&lt;/blockquote&gt;
334
335 &lt;p&gt;I got the same problem here with certificate checking. Had to set
336 &quot;ldap_tls_reqcert = never&quot; to get it working.&lt;/p&gt;
337
338 &lt;p&gt;With the libnss-sss package in testing at the moment, the
339 nsswitch.conf file is update automatically, so there is no need to
340 modify it manually.&lt;/p&gt;
341
342 &lt;p&gt;If you want to help out with implementing this for Debian Edu,
343 please contact us on debian-edu@lists.debian.org.&lt;/p&gt;
344 </description>
345 </item>
346
347 <item>
348 <title>jXplorer, a very nice LDAP GUI</title>
349 <link>http://people.skolelinux.org/pere/blog/jXplorer__a_very_nice_LDAP_GUI.html</link>
350 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/jXplorer__a_very_nice_LDAP_GUI.html</guid>
351 <pubDate>Fri, 9 Jul 2010 12:55:00 +0200</pubDate>
352 <description>
353 &lt;p&gt;Since
354 &lt;a href=&quot;http://people.skolelinux.org/pere/blog/LUMA__a_very_nice_LDAP_GUI.html&quot;&gt;my
355 last post&lt;/a&gt; about available LDAP tools in Debian, I was told about a
356 LDAP GUI that is even better than luma. The java application
357 &lt;a href=&quot;http://jxplorer.org/&quot;&gt;jXplorer&lt;/a&gt; is claimed to be capable of
358 moving LDAP objects and subtrees using drag-and-drop, and can
359 authenticate using Kerberos. I have only tested the Kerberos
360 authentication, but do not have a LDAP setup allowing me to rewrite
361 LDAP with my test user yet. It is
362 &lt;a href=&quot;http://packages.qa.debian.org/j/jxplorer.html&quot;&gt;available in
363 Debian&lt;/a&gt; testing and unstable at the moment. The only problem I
364 have with it is how it handle errors. If something go wrong, its
365 non-intuitive behaviour require me to go through some query work list
366 and remove the failing query. Nothing big, but very annoying.&lt;/p&gt;
367 </description>
368 </item>
369
370 <item>
371 <title>Idea for storing LTSP configuration in LDAP</title>
372 <link>http://people.skolelinux.org/pere/blog/Idea_for_storing_LTSP_configuration_in_LDAP.html</link>
373 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Idea_for_storing_LTSP_configuration_in_LDAP.html</guid>
374 <pubDate>Sun, 11 Jul 2010 22:00:00 +0200</pubDate>
375 <description>
376 &lt;p&gt;Vagrant mentioned on IRC today that ltsp_config now support
377 sourcing files from /usr/share/ltsp/ltsp_config.d/ on the thin
378 clients, and that this can be used to fetch configuration from LDAP if
379 Debian Edu choose to store configuration there.&lt;/p&gt;
380
381 &lt;p&gt;Armed with this information, I got inspired and wrote a test module
382 to get configuration from LDAP. The idea is to look up the MAC
383 address of the client in LDAP, and look for attributes on the form
384 ltspconfigsetting=value, and use this to export SETTING=value to the
385 LTSP clients.&lt;/p&gt;
386
387 &lt;p&gt;The goal is to be able to store the LTSP configuration attributes
388 in a &quot;computer&quot; LDAP object used by both DNS and DHCP, and thus
389 allowing us to store all information about a computer in one place.&lt;/p&gt;
390
391 &lt;p&gt;This is a untested draft implementation, and I welcome feedback on
392 this approach. A real LDAP schema for the ltspClientAux objectclass
393 need to be written. Comments, suggestions, etc?&lt;/p&gt;
394
395 &lt;blockquote&gt;&lt;pre&gt;
396 # Store in /opt/ltsp/$arch/usr/share/ltsp/ltsp_config.d/ldap-config
397 #
398 # Fetch LTSP client settings from LDAP based on MAC address
399 #
400 # Uses ethernet address as stored in the dhcpHost objectclass using
401 # the dhcpHWAddress attribute or ethernet address stored in the
402 # ieee802Device objectclass with the macAddress attribute.
403 #
404 # This module is written to be schema agnostic, and only depend on the
405 # existence of attribute names.
406 #
407 # The LTSP configuration variables are saved directly using a
408 # ltspConfig prefix and uppercasing the rest of the attribute name.
409 # To set the SERVER variable, set the ltspConfigServer attribute.
410 #
411 # Some LDAP schema should be created with all the relevant
412 # configuration settings. Something like this should work:
413 #
414 # objectclass ( 1.1.2.2 NAME &#39;ltspClientAux&#39;
415 # SUP top
416 # AUXILIARY
417 # MAY ( ltspConfigServer $ ltsConfigSound $ ... )
418
419 LDAPSERVER=$(debian-edu-ldapserver)
420 if [ &quot;$LDAPSERVER&quot; ] ; then
421 LDAPBASE=$(debian-edu-ldapserver -b)
422 for MAC in $(LANG=C ifconfig |grep -i hwaddr| awk &#39;{print $5}&#39;|sort -u) ; do
423 filter=&quot;(|(dhcpHWAddress=ethernet $MAC)(macAddress=$MAC))&quot;
424 ldapsearch -h &quot;$LDAPSERVER&quot; -b &quot;$LDAPBASE&quot; -v -x &quot;$filter&quot; | \
425 grep &#39;^ltspConfig&#39; | while read attr value ; do
426 # Remove prefix and convert to upper case
427 attr=$(echo $attr | sed &#39;s/^ltspConfig//i&#39; | tr a-z A-Z)
428 # bass value on to clients
429 eval &quot;$attr=$value; export $attr&quot;
430 done
431 done
432 fi
433 &lt;/pre&gt;&lt;/blockquote&gt;
434
435 &lt;p&gt;I&#39;m not sure this shell construction will work, because I suspect
436 the while block might end up in a subshell causing the variables set
437 there to not show up in ltsp-config, but if that is the case I am sure
438 the code can be restructured to make sure the variables are passed on.
439 I expect that can be solved with some testing. :)&lt;/p&gt;
440
441 &lt;p&gt;If you want to help out with implementing this for Debian Edu,
442 please contact us on debian-edu@lists.debian.org.&lt;/p&gt;
443
444 &lt;p&gt;Update 2010-07-17: I am aware of another effort to store LTSP
445 configuration in LDAP that was created around year 2000 by
446 &lt;a href=&quot;http://www.pcxperience.com/thinclient/documentation/ldap.html&quot;&gt;PC
447 Xperience, Inc., 2000&lt;/a&gt;. I found its
448 &lt;a href=&quot;http://people.redhat.com/alikins/ltsp/ldap/&quot;&gt;files&lt;/a&gt; on a
449 personal home page over at redhat.com.&lt;/p&gt;
450 </description>
451 </item>
452
453 <item>
454 <title>Combining PowerDNS and ISC DHCP LDAP objects</title>
455 <link>http://people.skolelinux.org/pere/blog/Combining_PowerDNS_and_ISC_DHCP_LDAP_objects.html</link>
456 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Combining_PowerDNS_and_ISC_DHCP_LDAP_objects.html</guid>
457 <pubDate>Wed, 14 Jul 2010 23:45:00 +0200</pubDate>
458 <description>
459 &lt;p&gt;For a while now, I have wanted to find a way to change the DNS and
460 DHCP services in Debian Edu to use the same LDAP objects for a given
461 computer, to avoid the possibility of having a inconsistent state for
462 a computer in LDAP (as in DHCP but no DNS entry or the other way
463 around) and make it easier to add computers to LDAP.&lt;/p&gt;
464
465 &lt;p&gt;I&#39;ve looked at how powerdns and dhcpd is using LDAP, and using this
466 information finally found a solution that seem to work.&lt;/p&gt;
467
468 &lt;p&gt;The old setup required three LDAP objects for a given computer.
469 One forward DNS entry, one reverse DNS entry and one DHCP entry. If
470 we switch powerdns to use its strict LDAP method (ldap-method=strict
471 in pdns-debian-edu.conf), the forward and reverse DNS entries are
472 merged into one while making it impossible to transfer the reverse map
473 to a slave DNS server.&lt;/p&gt;
474
475 &lt;p&gt;If we also replace the object class used to get the DNS related
476 attributes to one allowing these attributes to be combined with the
477 dhcphost object class, we can merge the DNS and DHCP entries into one.
478 I&#39;ve written such object class in the dnsdomainaux.schema file (need
479 proper OIDs, but that is a minor issue), and tested the setup. It
480 seem to work.&lt;/p&gt;
481
482 &lt;p&gt;With this test setup in place, we can get away with one LDAP object
483 for both DNS and DHCP, and even the LTSP configuration I suggested in
484 an earlier email. The combined LDAP object will look something like
485 this:&lt;/p&gt;
486
487 &lt;blockquote&gt;&lt;pre&gt;
488 dn: cn=hostname,cn=group1,cn=THINCLIENTS,cn=DHCP Config,dc=skole,dc=skolelinux,dc=no
489 cn: hostname
490 objectClass: dhcphost
491 objectclass: domainrelatedobject
492 objectclass: dnsdomainaux
493 associateddomain: hostname.intern
494 arecord: 10.11.12.13
495 dhcphwaddress: ethernet 00:00:00:00:00:00
496 dhcpstatements: fixed-address hostname
497 ldapconfigsound: Y
498 &lt;/pre&gt;&lt;/blockquote&gt;
499
500 &lt;p&gt;The DNS server uses the associateddomain and arecord entries, while
501 the DHCP server uses the dhcphwaddress and dhcpstatements entries
502 before asking DNS to resolve the fixed-adddress. LTSP will use
503 dhcphwaddress or associateddomain and the ldapconfig* attributes.&lt;/p&gt;
504
505 &lt;p&gt;I am not yet sure if I can get the DHCP server to look for its
506 dhcphost in a different location, to allow us to put the objects
507 outside the &quot;DHCP Config&quot; subtree, but hope to figure out a way to do
508 that. If I can&#39;t figure out a way to do that, we can still get rid of
509 the hosts subtree and move all its content into the DHCP Config tree
510 (which probably should be renamed to be more related to the new
511 content. I suspect cn=dnsdhcp,ou=services or something like that
512 might be a good place to put it.&lt;/p&gt;
513
514 &lt;p&gt;If you want to help out with implementing this for Debian Edu,
515 please contact us on debian-edu@lists.debian.org.&lt;/p&gt;
516 </description>
517 </item>
518
519 <item>
520 <title>What are they searching for - PowerDNS and ISC DHCP in LDAP</title>
521 <link>http://people.skolelinux.org/pere/blog/What_are_they_searching_for___PowerDNS_and_ISC_DHCP_in_LDAP.html</link>
522 <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/What_are_they_searching_for___PowerDNS_and_ISC_DHCP_in_LDAP.html</guid>
523 <pubDate>Sat, 17 Jul 2010 21:00:00 +0200</pubDate>
524 <description>
525 &lt;p&gt;This is a
526 &lt;a href=&quot;http://people.skolelinux.org/pere/blog/Time_for_new__LDAP_schemas_replacing_RFC_2307_.html&quot;&gt;followup&lt;/a&gt;
527 on my
528 &lt;a href=&quot;http://people.skolelinux.org/pere/blog/Idea_for_a_change_to_LDAP_schemas_allowing_DNS_and_DHCP_info_to_be_combined_into_one_object.html&quot;&gt;previous
529 work&lt;/a&gt; on
530 &lt;a href=&quot;http://people.skolelinux.org/pere/blog/Combining_PowerDNS_and_ISC_DHCP_LDAP_objects.html&quot;&gt;merging
531 all&lt;/a&gt; the computer related LDAP objects in Debian Edu.&lt;/p&gt;
532
533 &lt;p&gt;As a step to try to see if it possible to merge the DNS and DHCP
534 LDAP objects, I have had a look at how the packages pdns-backend-ldap
535 and dhcp3-server-ldap in Debian use the LDAP server. The two
536 implementations are quite different in how they use LDAP.&lt;/p&gt;
537
538 To get this information, I started slapd with debugging enabled and
539 dumped the debug output to a file to get the LDAP searches performed
540 on a Debian Edu main-server. Here is a summary.
541
542 &lt;p&gt;&lt;strong&gt;powerdns&lt;/strong&gt;&lt;/p&gt;
543
544 &lt;a href=&quot;http://www.linuxnetworks.de/doc/index.php/PowerDNS_LDAP_Backend&quot;&gt;Clues
545 on how to&lt;/a&gt; set up PowerDNS to use a LDAP backend is available on
546 the web.
547
548 &lt;p&gt;PowerDNS have two modes of operation using LDAP as its backend.
549 One &quot;strict&quot; mode where the forward and reverse DNS lookups are done
550 using the same LDAP objects, and a &quot;tree&quot; mode where the forward and
551 reverse entries are in two different subtrees in LDAP with a structure
552 based on the DNS names, as in tjener.intern and
553 2.2.0.10.in-addr.arpa.&lt;/p&gt;
554
555 &lt;p&gt;In tree mode, the server is set up to use a LDAP subtree as its
556 base, and uses a &quot;base&quot; scoped search for the DNS name by adding
557 &quot;dc=tjener,dc=intern,&quot; to the base with a filter for
558 &quot;(associateddomain=tjener.intern)&quot; for the forward entry and
559 &quot;dc=2,dc=2,dc=0,dc=10,dc=in-addr,dc=arpa,&quot; with a filter for
560 &quot;(associateddomain=2.2.0.10.in-addr.arpa)&quot; for the reverse entry. For
561 forward entries, it is looking for attributes named dnsttl, arecord,
562 nsrecord, cnamerecord, soarecord, ptrrecord, hinforecord, mxrecord,
563 txtrecord, rprecord, afsdbrecord, keyrecord, aaaarecord, locrecord,
564 srvrecord, naptrrecord, kxrecord, certrecord, dsrecord, sshfprecord,
565 ipseckeyrecord, rrsigrecord, nsecrecord, dnskeyrecord, dhcidrecord,
566 spfrecord and modifytimestamp. For reverse entries it is looking for
567 the attributes dnsttl, arecord, nsrecord, cnamerecord, soarecord,
568 ptrrecord, hinforecord, mxrecord, txtrecord, rprecord, aaaarecord,
569 locrecord, srvrecord, naptrrecord and modifytimestamp. The equivalent
570 ldapsearch commands could look like this:&lt;/p&gt;
571
572 &lt;blockquote&gt;&lt;pre&gt;
573 ldapsearch -h ldap \
574 -b dc=tjener,dc=intern,ou=hosts,dc=skole,dc=skolelinux,dc=no \
575 -s base -x &#39;(associateddomain=tjener.intern)&#39; dNSTTL aRecord nSRecord \
576 cNAMERecord sOARecord pTRRecord hInfoRecord mXRecord tXTRecord \
577 rPRecord aFSDBRecord KeyRecord aAAARecord lOCRecord sRVRecord \
578 nAPTRRecord kXRecord certRecord dSRecord sSHFPRecord iPSecKeyRecord \
579 rRSIGRecord nSECRecord dNSKeyRecord dHCIDRecord sPFRecord modifyTimestamp
580
581 ldapsearch -h ldap \
582 -b dc=2,dc=2,dc=0,dc=10,dc=in-addr,dc=arpa,ou=hosts,dc=skole,dc=skolelinux,dc=no \
583 -s base -x &#39;(associateddomain=2.2.0.10.in-addr.arpa)&#39;
584 dnsttl, arecord, nsrecord, cnamerecord soarecord ptrrecord \
585 hinforecord mxrecord txtrecord rprecord aaaarecord locrecord \
586 srvrecord naptrrecord modifytimestamp
587 &lt;/pre&gt;&lt;/blockquote&gt;
588
589 &lt;p&gt;In Debian Edu/Lenny, the PowerDNS tree mode is used with
590 ou=hosts,dc=skole,dc=skolelinux,dc=no as the base, and these are two
591 example LDAP objects used there. In addition to these objects, the
592 parent objects all th way up to ou=hosts,dc=skole,dc=skolelinux,dc=no
593 also exist.&lt;/p&gt;
594
595 &lt;blockquote&gt;&lt;pre&gt;
596 dn: dc=tjener,dc=intern,ou=hosts,dc=skole,dc=skolelinux,dc=no
597 objectclass: top
598 objectclass: dnsdomain
599 objectclass: domainrelatedobject
600 dc: tjener
601 arecord: 10.0.2.2
602 associateddomain: tjener.intern
603
604 dn: dc=2,dc=2,dc=0,dc=10,dc=in-addr,dc=arpa,ou=hosts,dc=skole,dc=skolelinux,dc=no
605 objectclass: top
606 objectclass: dnsdomain2
607 objectclass: domainrelatedobject
608 dc: 2
609 ptrrecord: tjener.intern
610 associateddomain: 2.2.0.10.in-addr.arpa
611 &lt;/pre&gt;&lt;/blockquote&gt;
612
613 &lt;p&gt;In strict mode, the server behaves differently. When looking for
614 forward DNS entries, it is doing a &quot;subtree&quot; scoped search with the
615 same base as in the tree mode for a object with filter
616 &quot;(associateddomain=tjener.intern)&quot; and requests the attributes dnsttl,
617 arecord, nsrecord, cnamerecord, soarecord, ptrrecord, hinforecord,
618 mxrecord, txtrecord, rprecord, aaaarecord, locrecord, srvrecord,
619 naptrrecord and modifytimestamp. For reverse entires it also do a
620 subtree scoped search but this time the filter is &quot;(arecord=10.0.2.2)&quot;
621 and the requested attributes are associateddomain, dnsttl and
622 modifytimestamp. In short, in strict mode the objects with ptrrecord
623 go away, and the arecord attribute in the forward object is used
624 instead.&lt;/p&gt;
625
626 &lt;p&gt;The forward and reverse searches can be simulated using ldapsearch
627 like this:&lt;/p&gt;
628
629 &lt;blockquote&gt;&lt;pre&gt;
630 ldapsearch -h ldap -b ou=hosts,dc=skole,dc=skolelinux,dc=no -s sub -x \
631 &#39;(associateddomain=tjener.intern)&#39; dNSTTL aRecord nSRecord \
632 cNAMERecord sOARecord pTRRecord hInfoRecord mXRecord tXTRecord \
633 rPRecord aFSDBRecord KeyRecord aAAARecord lOCRecord sRVRecord \
634 nAPTRRecord kXRecord certRecord dSRecord sSHFPRecord iPSecKeyRecord \
635 rRSIGRecord nSECRecord dNSKeyRecord dHCIDRecord sPFRecord modifyTimestamp
636
637 ldapsearch -h ldap -b ou=hosts,dc=skole,dc=skolelinux,dc=no -s sub -x \
638 &#39;(arecord=10.0.2.2)&#39; associateddomain dnsttl modifytimestamp
639 &lt;/pre&gt;&lt;/blockquote&gt;
640
641 &lt;p&gt;In addition to the forward and reverse searches , there is also a
642 search for SOA records, which behave similar to the forward and
643 reverse lookups.&lt;/p&gt;
644
645 &lt;p&gt;A thing to note with the PowerDNS behaviour is that it do not
646 specify any objectclass names, and instead look for the attributes it
647 need to generate a DNS reply. This make it able to work with any
648 objectclass that provide the needed attributes.&lt;/p&gt;
649
650 &lt;p&gt;The attributes are normally provided in the cosine (RFC 1274) and
651 dnsdomain2 schemas. The latter is used for reverse entries like
652 ptrrecord and recent DNS additions like aaaarecord and srvrecord.&lt;/p&gt;
653
654 &lt;p&gt;In Debian Edu, we have created DNS objects using the object classes
655 dcobject (for dc), dnsdomain or dnsdomain2 (structural, for the DNS
656 attributes) and domainrelatedobject (for associatedDomain). The use
657 of structural object classes make it impossible to combine these
658 classes with the object classes used by DHCP.&lt;/p&gt;
659
660 &lt;p&gt;There are other schemas that could be used too, for example the
661 dnszone structural object class used by Gosa and bind-sdb for the DNS
662 attributes combined with the domainrelatedobject object class, but in
663 this case some unused attributes would have to be included as well
664 (zonename and relativedomainname).&lt;/p&gt;
665
666 &lt;p&gt;My proposal for Debian Edu would be to switch PowerDNS to strict
667 mode and not use any of the existing objectclasses (dnsdomain,
668 dnsdomain2 and dnszone) when one want to combine the DNS information
669 with DHCP information, and instead create a auxiliary object class
670 defined something like this (using the attributes defined for
671 dnsdomain and dnsdomain2 or dnszone):&lt;/p&gt;
672
673 &lt;blockquote&gt;&lt;pre&gt;
674 objectclass ( some-oid NAME &#39;dnsDomainAux&#39;
675 SUP top
676 AUXILIARY
677 MAY ( ARecord $ MDRecord $ MXRecord $ NSRecord $ SOARecord $ CNAMERecord $
678 DNSTTL $ DNSClass $ PTRRecord $ HINFORecord $ MINFORecord $
679 TXTRecord $ SIGRecord $ KEYRecord $ AAAARecord $ LOCRecord $
680 NXTRecord $ SRVRecord $ NAPTRRecord $ KXRecord $ CERTRecord $
681 A6Record $ DNAMERecord
682 ))
683 &lt;/pre&gt;&lt;/blockquote&gt;
684
685 &lt;p&gt;This will allow any object to become a DNS entry when combined with
686 the domainrelatedobject object class, and allow any entity to include
687 all the attributes PowerDNS wants. I&#39;ve sent an email to the PowerDNS
688 developers asking for their view on this schema and if they are
689 interested in providing such schema with PowerDNS, and I hope my
690 message will be accepted into their mailing list soon.&lt;/p&gt;
691
692 &lt;p&gt;&lt;strong&gt;ISC dhcp&lt;/strong&gt;&lt;/p&gt;
693
694 &lt;p&gt;The DHCP server searches for specific objectclass and requests all
695 the object attributes, and then uses the attributes it want. This
696 make it harder to figure out exactly what attributes are used, but
697 thanks to the working example in Debian Edu I can at least get an idea
698 what is needed without having to read the source code.&lt;/p&gt;
699
700 &lt;p&gt;In the DHCP server configuration, the LDAP base to use and the
701 search filter to use to locate the correct dhcpServer entity is
702 stored. These are the relevant entries from
703 /etc/dhcp3/dhcpd.conf:&lt;/p&gt;
704
705 &lt;blockquote&gt;&lt;pre&gt;
706 ldap-base-dn &quot;dc=skole,dc=skolelinux,dc=no&quot;;
707 ldap-dhcp-server-cn &quot;dhcp&quot;;
708 &lt;/pre&gt;&lt;/blockquote&gt;
709
710 &lt;p&gt;The DHCP server uses this information to nest all the DHCP
711 configuration it need. The cn &quot;dhcp&quot; is located using the given LDAP
712 base and the filter &quot;(&amp;(objectClass=dhcpServer)(cn=dhcp))&quot;. The
713 search result is this entry:&lt;/p&gt;
714
715 &lt;blockquote&gt;&lt;pre&gt;
716 dn: cn=dhcp,dc=skole,dc=skolelinux,dc=no
717 cn: dhcp
718 objectClass: top
719 objectClass: dhcpServer
720 dhcpServiceDN: cn=DHCP Config,dc=skole,dc=skolelinux,dc=no
721 &lt;/pre&gt;&lt;/blockquote&gt;
722
723 &lt;p&gt;The content of the dhcpServiceDN attribute is next used to locate the
724 subtree with DHCP configuration. The DHCP configuration subtree base
725 is located using a base scope search with base &quot;cn=DHCP
726 Config,dc=skole,dc=skolelinux,dc=no&quot; and filter
727 &quot;(&amp;(objectClass=dhcpService)(|(dhcpPrimaryDN=cn=dhcp,dc=skole,dc=skolelinux,dc=no)(dhcpSecondaryDN=cn=dhcp,dc=skole,dc=skolelinux,dc=no)))&quot;.
728 The search result is this entry:&lt;/p&gt;
729
730 &lt;blockquote&gt;&lt;pre&gt;
731 dn: cn=DHCP Config,dc=skole,dc=skolelinux,dc=no
732 cn: DHCP Config
733 objectClass: top
734 objectClass: dhcpService
735 objectClass: dhcpOptions
736 dhcpPrimaryDN: cn=dhcp, dc=skole,dc=skolelinux,dc=no
737 dhcpStatements: ddns-update-style none
738 dhcpStatements: authoritative
739 dhcpOption: smtp-server code 69 = array of ip-address
740 dhcpOption: www-server code 72 = array of ip-address
741 dhcpOption: wpad-url code 252 = text
742 &lt;/pre&gt;&lt;/blockquote&gt;
743
744 &lt;p&gt;Next, the entire subtree is processed, one level at the time. When
745 all the DHCP configuration is loaded, it is ready to receive requests.
746 The subtree in Debian Edu contain objects with object classes
747 top/dhcpService/dhcpOptions, top/dhcpSharedNetwork/dhcpOptions,
748 top/dhcpSubnet, top/dhcpGroup and top/dhcpHost. These provide options
749 and information about netmasks, dynamic range etc. Leaving out the
750 details here because it is not relevant for the focus of my
751 investigation, which is to see if it is possible to merge dns and dhcp
752 related computer objects.&lt;/p&gt;
753
754 &lt;p&gt;When a DHCP request come in, LDAP is searched for the MAC address
755 of the client (00:00:00:00:00:00 in this example), using a subtree
756 scoped search with &quot;cn=DHCP Config,dc=skole,dc=skolelinux,dc=no&quot; as
757 the base and &quot;(&amp;(objectClass=dhcpHost)(dhcpHWAddress=ethernet
758 00:00:00:00:00:00))&quot; as the filter. This is what a host object look
759 like:&lt;/p&gt;
760
761 &lt;blockquote&gt;&lt;pre&gt;
762 dn: cn=hostname,cn=group1,cn=THINCLIENTS,cn=DHCP Config,dc=skole,dc=skolelinux,dc=no
763 cn: hostname
764 objectClass: top
765 objectClass: dhcpHost
766 dhcpHWAddress: ethernet 00:00:00:00:00:00
767 dhcpStatements: fixed-address hostname
768 &lt;/pre&gt;&lt;/blockquote&gt;
769
770 &lt;p&gt;There is less flexiblity in the way LDAP searches are done here.
771 The object classes need to have fixed names, and the configuration
772 need to be stored in a fairly specific LDAP structure. On the
773 positive side, the invidiual dhcpHost entires can be anywhere without
774 the DN pointed to by the dhcpServer entries. The latter should make
775 it possible to group all host entries in a subtree next to the
776 configuration entries, and this subtree can also be shared with the
777 DNS server if the schema proposed above is combined with the dhcpHost
778 structural object class.
779
780 &lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
781
782 &lt;p&gt;The PowerDNS implementation seem to be very flexible when it come
783 to which LDAP schemas to use. While its &quot;tree&quot; mode is rigid when it
784 come to the the LDAP structure, the &quot;strict&quot; mode is very flexible,
785 allowing DNS objects to be stored anywhere under the base cn specified
786 in the configuration.&lt;/p&gt;
787
788 &lt;p&gt;The DHCP implementation on the other hand is very inflexible, both
789 regarding which LDAP schemas to use and which LDAP structure to use.
790 I guess one could implement ones own schema, as long as the
791 objectclasses and attributes have the names used, but this do not
792 really help when the DHCP subtree need to have a fairly fixed
793 structure.&lt;/p&gt;
794
795 &lt;p&gt;Based on the observed behaviour, I suspect a LDAP structure like
796 this might work for Debian Edu:&lt;/p&gt;
797
798 &lt;blockquote&gt;&lt;pre&gt;
799 ou=services
800 cn=machine-info (dhcpService) - dhcpServiceDN points here
801 cn=dhcp (dhcpServer)
802 cn=dhcp-internal (dhcpSharedNetwork/dhcpOptions)
803 cn=10.0.2.0 (dhcpSubnet)
804 cn=group1 (dhcpGroup/dhcpOptions)
805 cn=dhcp-thinclients (dhcpSharedNetwork/dhcpOptions)
806 cn=192.168.0.0 (dhcpSubnet)
807 cn=group1 (dhcpGroup/dhcpOptions)
808 ou=machines - PowerDNS base points here
809 cn=hostname (dhcpHost/domainrelatedobject/dnsDomainAux)
810 &lt;/pre&gt;&lt;/blockquote&gt;
811
812 &lt;P&gt;This is not tested yet. If the DHCP server require the dhcpHost
813 entries to be in the dhcpGroup subtrees, the entries can be stored
814 there instead of a common machines subtree, and the PowerDNS base
815 would have to be moved one level up to the machine-info subtree.&lt;/p&gt;
816
817 &lt;p&gt;The combined object under the machines subtree would look something
818 like this:&lt;/p&gt;
819
820 &lt;blockquote&gt;&lt;pre&gt;
821 dn: dc=hostname,ou=machines,cn=machine-info,dc=skole,dc=skolelinux,dc=no
822 dc: hostname
823 objectClass: top
824 objectClass: dhcpHost
825 objectclass: domainrelatedobject
826 objectclass: dnsDomainAux
827 associateddomain: hostname.intern
828 arecord: 10.11.12.13
829 dhcpHWAddress: ethernet 00:00:00:00:00:00
830 dhcpStatements: fixed-address hostname.intern
831 &lt;/pre&gt;&lt;/blockquote&gt;
832
833 &lt;/p&gt;One could even add the LTSP configuration associated with a given
834 machine, as long as the required attributes are available in a
835 auxiliary object class.&lt;/p&gt;
836 </description>
837 </item>
838
839 </channel>
840 </rss>