From 1be510f9529cb082f802408b472a77d074b394c0 Mon Sep 17 00:00:00 2001 From: Nicolas Vigier Date: Sun, 14 Apr 2013 13:46:12 +0000 Subject: Add zarb MLs html archives --- zarb-ml/mageia-sysadm/2010-November/000900.html | 77 +++++++++++++++++++++++++ 1 file changed, 77 insertions(+) create mode 100644 zarb-ml/mageia-sysadm/2010-November/000900.html (limited to 'zarb-ml/mageia-sysadm/2010-November/000900.html') diff --git a/zarb-ml/mageia-sysadm/2010-November/000900.html b/zarb-ml/mageia-sysadm/2010-November/000900.html new file mode 100644 index 000000000..7bc81c84a --- /dev/null +++ b/zarb-ml/mageia-sysadm/2010-November/000900.html @@ -0,0 +1,77 @@ + + + + [Mageia-sysadm] [377] - add nssldap password handling + + + + + + + + + +

[Mageia-sysadm] [377] - add nssldap password handling

+ Guillaume Rousse + guillomovitch at zarb.org +
+ Wed Nov 24 21:04:51 CET 2010 +

+
+ +
Le 22/11/2010 12:56, Buchan Milne a écrit :
+> I would prefer if we can instead use:
+> -"rootbinddn" in /etc/ldap.conf, not binddn
+> -place password in /etc/ldap.secret
+> -use nscd, so all LDAP access is as root (so, no need to expose passwords in 
+> files that must be world-readable), as a side-effect also avoiding problems 
+> with file descriptors used by any process doing a user lookup etc.
+> 
+> Permissions on /etc/ldap.conf should be 0644, /etc/ldap.secret can be 0600.
+Even better, give ldap write access to individual admin accounts, and
+not to root user. No need to store any password, and you keep track of
+who's doing what.
+
+-- 
+BOFH excuse #70:
+
+nesting roaches shorted out the ether cable
+
+ + + + + + + +
+

+ +
+More information about the Mageia-sysadm +mailing list
+ -- cgit v1.2.1