summaryrefslogtreecommitdiffstats
path: root/zarb-ml/mageia-sysadm/2010-November/000750.html
diff options
context:
space:
mode:
Diffstat (limited to 'zarb-ml/mageia-sysadm/2010-November/000750.html')
-rw-r--r--zarb-ml/mageia-sysadm/2010-November/000750.html320
1 files changed, 320 insertions, 0 deletions
diff --git a/zarb-ml/mageia-sysadm/2010-November/000750.html b/zarb-ml/mageia-sysadm/2010-November/000750.html
new file mode 100644
index 000000000..e36b70cca
--- /dev/null
+++ b/zarb-ml/mageia-sysadm/2010-November/000750.html
@@ -0,0 +1,320 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<HTML>
+ <HEAD>
+ <TITLE> [Mageia-sysadm] [375] - do not hardcode mageia.org in acl
+ </TITLE>
+ <LINK REL="Index" HREF="index.html" >
+ <LINK REL="made" HREF="mailto:mageia-sysadm%40mageia.org?Subject=Re%3A%20%5BMageia-sysadm%5D%20%5B375%5D%20-%20do%20not%20hardcode%20mageia.org%20in%20acl&In-Reply-To=%3C20101122020402.A02B43FC6F%40valstar.mageia.org%3E">
+ <META NAME="robots" CONTENT="index,nofollow">
+ <META http-equiv="Content-Type" content="text/html; charset=us-ascii">
+ <LINK REL="Previous" HREF="000747.html">
+ <LINK REL="Next" HREF="000748.html">
+ </HEAD>
+ <BODY BGCOLOR="#ffffff">
+ <H1>[Mageia-sysadm] [375] - do not hardcode mageia.org in acl</H1>
+ <B>root at mageia.org</B>
+ <A HREF="mailto:mageia-sysadm%40mageia.org?Subject=Re%3A%20%5BMageia-sysadm%5D%20%5B375%5D%20-%20do%20not%20hardcode%20mageia.org%20in%20acl&In-Reply-To=%3C20101122020402.A02B43FC6F%40valstar.mageia.org%3E"
+ TITLE="[Mageia-sysadm] [375] - do not hardcode mageia.org in acl">root at mageia.org
+ </A><BR>
+ <I>Mon Nov 22 03:04:02 CET 2010</I>
+ <P><UL>
+ <LI>Previous message: <A HREF="000747.html">[Mageia-sysadm] [374] - ldaps is required ( ie no unencrypted connection )
+</A></li>
+ <LI>Next message: <A HREF="000748.html">[Mageia-sysadm] [376] - add proper access to nss_ldap user so pam_ldap auth can work
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#750">[ date ]</a>
+ <a href="thread.html#750">[ thread ]</a>
+ <a href="subject.html#750">[ subject ]</a>
+ <a href="author.html#750">[ author ]</a>
+ </LI>
+ </UL>
+ <HR>
+<!--beginarticle-->
+<PRE>Revision: 375
+Author: misc
+Date: 2010-11-22 03:04:02 +0100 (Mon, 22 Nov 2010)
+Log Message:
+-----------
+- do not hardcode mageia.org in acl
+
+Modified Paths:
+--------------
+ puppet/modules/openldap/templates/mandriva-dit-access.conf
+
+Modified: puppet/modules/openldap/templates/mandriva-dit-access.conf
+===================================================================
+--- puppet/modules/openldap/templates/mandriva-dit-access.conf 2010-11-22 02:03:58 UTC (rev 374)
++++ puppet/modules/openldap/templates/mandriva-dit-access.conf 2010-11-22 02:04:02 UTC (rev 375)
+@@ -1,184 +1,184 @@
+ # mandriva-dit-access.conf
+
+-limits group=&quot;cn=LDAP Replicators,ou=System Groups,dc=mageia,dc=org&quot;
++limits group=&quot;cn=LDAP Replicators,ou=System Groups,&lt;%= dc_suffix %&gt;&quot;
+ limit size=unlimited
+ limit time=unlimited
+
+-limits group=&quot;cn=LDAP Admins,ou=System Groups,dc=mageia,dc=org&quot;
++limits group=&quot;cn=LDAP Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot;
+ limit size=unlimited
+ limit time=unlimited
+
+-limits group=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot;
++limits group=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot;
+ limit size=unlimited
+ limit time=unlimited
+
+ # so we don't have to add these to every other acl down there
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot;
+- by group.exact=&quot;cn=LDAP Admins,ou=System Groups,dc=mageia,dc=org&quot; write
+- by group.exact=&quot;cn=LDAP Replicators,ou=System Groups,dc=mageia,dc=org&quot; read
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot;
++ by group.exact=&quot;cn=LDAP Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
++ by group.exact=&quot;cn=LDAP Replicators,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; read
+ by * break
+
+ # userPassword access
+ # Allow account registration to write userPassword of unprivileged users accounts
+-access to dn.subtree=&quot;ou=People,dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;ou=People,&lt;%= dc_suffix %&gt;&quot;
+ filter=&quot;(&amp;(objectclass=inetOrgPerson)(!(objectclass=posixAccount)))&quot;
+ attrs=userPassword,pwdReset
+- by group/groupOfNames/member.exact=&quot;cn=registrars,ou=system groups,dc=mageia,dc=org&quot; +a
++ by group/groupOfNames/member.exact=&quot;cn=registrars,ou=system groups,&lt;%= dc_suffix %&gt;&quot; +a
+ by * +0 break
+
+ # shadowLastChange is here because it needs to be writable by the user because
+ # of pam_ldap, which will update this attr whenever the password is changed.
+ # And this is done with the user's credentials
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot;
+ attrs=shadowLastChange
+ by self write
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot;
+ attrs=userPassword
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by self write
+ by anonymous auth
+ by * none
+
+ # kerberos key access
+ # &quot;by auth&quot; just in case...
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot;
+ attrs=krb5Key
+ by self write
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by anonymous auth
+ by * none
+
+ # password policies
+-access to dn.subtree=&quot;ou=Password Policies,dc=mageia,dc=org&quot;
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++access to dn.subtree=&quot;ou=Password Policies,&lt;%= dc_suffix %&gt;&quot;
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+
+ # samba password attributes
+ # by self not strictly necessary, because samba uses its own admin user to
+ # change the password on the user's behalf
+ # openldap also doesn't auth on these attributes, but maybe some day it will
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot;
+ attrs=sambaLMPassword,sambaNTPassword
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by anonymous auth
+ by self write
+ by * none
+ # password history attribute
+ # pwdHistory is read-only, but ACL is simplier with it here
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot;
+ attrs=sambaPasswordHistory,pwdHistory
+ by self read
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by * none
+
+ # pwdReset, so the admin can force an user to change a password
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot;
+ attrs=pwdReset,pwdAccountLockedTime
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by self read
+
+ # group owner can add/remove/edit members to groups
+-access to dn.regex=&quot;^cn=[^,]+,ou=(System Groups|Group),dc=mageia,dc=org$&quot;
++access to dn.regex=&quot;^cn=[^,]+,ou=(System Groups|Group),&lt;%= dc_suffix %&gt;$&quot;
+ attrs=member
+ by dnattr=owner write
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users +sx
+
+-access to dn.regex=&quot;^cn=[^,]+,ou=(System Groups|Group),dc=mageia,dc=org$&quot;
++access to dn.regex=&quot;^cn=[^,]+,ou=(System Groups|Group),&lt;%= dc_suffix %&gt;$&quot;
+ attrs=cn,description,objectClass,gidNumber
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+
+ # registration - allow registrar group to create basic unprivileged accounts
+-access to dn.subtree=&quot;ou=People,dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;ou=People,&lt;%= dc_suffix %&gt;&quot;
+ attrs=&quot;objectClass&quot;
+ val=&quot;inetOrgperson&quot;
+- by group/groupOfNames/member.exact=&quot;cn=registrars,ou=system groups,dc=mageia,dc=org&quot; =asrx
++ by group/groupOfNames/member.exact=&quot;cn=registrars,ou=system groups,&lt;%= dc_suffix %&gt;&quot; =asrx
+ by * +0 break
+
+-access to dn.subtree=&quot;ou=People,dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;ou=People,&lt;%= dc_suffix %&gt;&quot;
+ filter=&quot;(!(objectclass=posixAccount))&quot;
+ attrs=cn,sn,gn,mail,entry,children,preferredLanguage
+- by group/groupOfNames/member.exact=&quot;cn=registrars,ou=system groups,dc=mageia,dc=org&quot; =asrx
++ by group/groupOfNames/member.exact=&quot;cn=registrars,ou=system groups,&lt;%= dc_suffix %&gt;&quot; =asrx
+ by * +0 break
+
+ # let the user change some of his/her attributes
+-access to dn.subtree=&quot;ou=People,dc=mageia,dc=org&quot;
++access to dn.subtree=&quot;ou=People,&lt;%= dc_suffix %&gt;&quot;
+ attrs=carLicense,homePhone,homePostalAddress,mobile,pager,telephoneNumber,mail,preferredLanguage
+ by self write
+ by users read
+
+ # create new accounts
+-access to dn.regex=&quot;^([^,]+,)?ou=(People|Group|Hosts),dc=mageia,dc=org$&quot;
++access to dn.regex=&quot;^([^,]+,)?ou=(People|Group|Hosts),&lt;%= dc_suffix %&gt;$&quot;
+ attrs=children,entry
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by * break
+ # access to existing entries
+-access to dn.regex=&quot;^[^,]+,ou=(People|Hosts|Group),dc=mageia,dc=org$&quot;
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++access to dn.regex=&quot;^[^,]+,ou=(People|Hosts|Group),&lt;%= dc_suffix %&gt;$&quot;
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by * break
+
+ # sambaDomainName entry
+-access to dn.regex=&quot;^(sambaDomainName=[^,]+,)?dc=mageia,dc=org$&quot;
++access to dn.regex=&quot;^(sambaDomainName=[^,]+,)?&lt;%= dc_suffix %&gt;$&quot;
+ attrs=<A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">children,entry, at sambaDomain</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at sambaUnixIdPool</A>
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+
+ # samba ID mapping
+-access to dn.regex=&quot;^(sambaSID=[^,]+,)?ou=Idmap,dc=mageia,dc=org$&quot;
++access to dn.regex=&quot;^(sambaSID=[^,]+,)?ou=Idmap,&lt;%= dc_suffix %&gt;$&quot;
+ attrs=<A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">children,entry, at sambaIdmapEntry</A>
+- by group.exact=&quot;cn=Account Admins,ou=System Groups,dc=mageia,dc=org&quot; write
+- by group.exact=&quot;cn=IDMAP Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Account Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
++ by group.exact=&quot;cn=IDMAP Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+
+ # global address book
+ # XXX - which class(es) to use?
+-access to dn.regex=&quot;^(.*,)?ou=Address Book,dc=mageia,dc=org&quot;
++access to dn.regex=&quot;^(.*,)?ou=Address Book,&lt;%= dc_suffix %&gt;&quot;
+ attrs=<A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">children,entry, at inetOrgPerson</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at evolutionPerson</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at evolutionPersonList</A>
+- by group.exact=&quot;cn=Address Book Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Address Book Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+
+ # dhcp entries
+ # XXX - open up read access to anybody?
+-access to dn.sub=&quot;ou=dhcp,dc=mageia,dc=org&quot;
++access to dn.sub=&quot;ou=dhcp,&lt;%= dc_suffix %&gt;&quot;
+ attrs=<A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">children,entry, at dhcpService</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpServer</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpSharedNetwork</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpSubnet</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpPool</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpGroup</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpHost</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpClass</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpSubClass</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpOptions</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpLeases</A><A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">, at dhcpLog</A>
+- by group.exact=&quot;cn=DHCP Admins,ou=System Groups,dc=mageia,dc=org&quot; write
+- by group.exact=&quot;cn=DHCP Readers,ou=System Groups,dc=mageia,dc=org&quot; read
++ by group.exact=&quot;cn=DHCP Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
++ by group.exact=&quot;cn=DHCP Readers,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; read
+ by * read
+
+ # sudoers
+-access to dn.regex=&quot;^([^,]+,)?ou=sudoers,dc=mageia,dc=org$&quot;
++access to dn.regex=&quot;^([^,]+,)?ou=sudoers,&lt;%= dc_suffix %&gt;$&quot;
+ attrs=<A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">children,entry, at sudoRole</A>
+- by group.exact=&quot;cn=Sudo Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=Sudo Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+
+ # dns
+-access to dn=&quot;ou=dns,dc=mageia,dc=org&quot;
++access to dn=&quot;ou=dns,&lt;%= dc_suffix %&gt;&quot;
+ attrs=<A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">entry, at extensibleObject</A>
+- by group.exact=&quot;cn=DNS Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=DNS Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+-access to dn.sub=&quot;ou=dns,dc=mageia,dc=org&quot;
++access to dn.sub=&quot;ou=dns,&lt;%= dc_suffix %&gt;&quot;
+ attrs=<A HREF="https://www.mageia.org/mailman/listinfo/mageia-sysadm">children,entry, at dNSZone</A>
+- by group.exact=&quot;cn=DNS Admins,ou=System Groups,dc=mageia,dc=org&quot; write
+- by group.exact=&quot;cn=DNS Readers,ou=System Groups,dc=mageia,dc=org&quot; read
++ by group.exact=&quot;cn=DNS Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
++ by group.exact=&quot;cn=DNS Readers,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; read
+ by * none
+
+
+ # MTA
+ # XXX - what else can we add here? Virtual Domains? With which schema?
+-access to dn.one=&quot;ou=People,dc=mageia,dc=org&quot;
++access to dn.one=&quot;ou=People,&lt;%= dc_suffix %&gt;&quot;
+ attrs=@inetLocalMailRecipient,mail
+- by group.exact=&quot;cn=MTA Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++ by group.exact=&quot;cn=MTA Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by users read
+
+ # KDE Configuration
+-access to dn.sub=&quot;ou=KDEConfig,dc=mageia,dc=org&quot;
+- by group.exact=&quot;cn=KDEConfig Admins,ou=System Groups,dc=mageia,dc=org&quot; write
++access to dn.sub=&quot;ou=KDEConfig,&lt;%= dc_suffix %&gt;&quot;
++ by group.exact=&quot;cn=KDEConfig Admins,ou=System Groups,&lt;%= dc_suffix %&gt;&quot; write
+ by * read
+
+ # last one
+-access to dn.subtree=&quot;dc=mageia,dc=org&quot; attrs=entry,uid,cn
++access to dn.subtree=&quot;&lt;%= dc_suffix %&gt;&quot; attrs=entry,uid,cn
+ by users read
+
+-------------- next part --------------
+An HTML attachment was scrubbed...
+URL: &lt;/pipermail/mageia-sysadm/attachments/20101122/87e3ed06/attachment-0001.html&gt;
+</PRE>
+
+
+
+
+
+
+<!--endarticle-->
+ <HR>
+ <P><UL>
+ <!--threads-->
+ <LI>Previous message: <A HREF="000747.html">[Mageia-sysadm] [374] - ldaps is required ( ie no unencrypted connection )
+</A></li>
+ <LI>Next message: <A HREF="000748.html">[Mageia-sysadm] [376] - add proper access to nss_ldap user so pam_ldap auth can work
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#750">[ date ]</a>
+ <a href="thread.html#750">[ thread ]</a>
+ <a href="subject.html#750">[ subject ]</a>
+ <a href="author.html#750">[ author ]</a>
+ </LI>
+ </UL>
+
+<hr>
+<a href="https://www.mageia.org/mailman/listinfo/mageia-sysadm">More information about the Mageia-sysadm
+mailing list</a><br>
+</body></html>