<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>FreeIPA &#8211; FU-BAR</title>
	<atom:link href="/tag/freeipa/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Fucked Up Beyond All Recognition</description>
	<lastBuildDate>Sat, 26 Oct 2019 21:55:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>/wp-content/uploads/2020/07/cropped-eu-header-20200715-2-32x32.png</url>
	<title>FreeIPA &#8211; FU-BAR</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>pam_ipahbac, the James Bond release</title>
		<link>/2019/10/26/pam_ipahbac-the-james-bond-release/</link>
		
		<dc:creator><![CDATA[Rui Seabra]]></dc:creator>
		<pubDate>Sat, 26 Oct 2019 21:55:52 +0000</pubDate>
				<category><![CDATA[Free Software]]></category>
		<category><![CDATA[PAM IPA HBAC]]></category>
		<category><![CDATA[AIX]]></category>
		<category><![CDATA[FreeIPA]]></category>
		<guid isPermaLink="false">/?p=2797</guid>

					<description><![CDATA[So we had another take into joining AIX servers against a FreeIPA / Red Hat Identity Management domain, this time with complete success since IBM has improved a lot certain aspects that allowed a much easier integration: IDSLDAP (at least 6.4) now configures properly aginst FreeIPA the rpm packages (aixtoolbox) are being maintained allowing for &#8230; <p class="link-more"><a href="/2019/10/26/pam_ipahbac-the-james-bond-release/" class="more-link">Continue reading<span class="screen-reader-text"> "pam_ipahbac, the James Bond release"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>So we had another take into joining AIX servers against a FreeIPA / Red Hat Identity Management domain, this time with complete success since IBM has improved a lot certain aspects that allowed a much easier integration:</p>



<ul><li>IDSLDAP (at least 6.4) now configures properly aginst FreeIPA</li><li>the rpm packages (aixtoolbox) are being maintained allowing for a much more recent sudo with ldap support (we couldn&#8217;t get sudo_ids to work, just go for normal sudo)</li><li>sshd is finally a version with support for AuthorizedKeysCommand</li></ul>



<p>So it was time for a new take on the HBAC front, and after not being successful with either <a href="https://github.com/jhrozek/pam_hbac">pam_hbac</a> or my own <a href="https://github.com/rseabra/pam_ipahbac">pam_ipahbac</a>, a new look at the code was needed.</p>



<p>Turns out the issue was OpenLDAP. The integration of pam, sshd, idsldap&#8230; basically you now <strong>need</strong> to use idsldap&#8217;s libraries so&#8230; time for a new release.</p>



<p>Being much simpler to change my code rather than adapt pam_hbac, that&#8217;s what I did and now configure detects that one is on AIX and no longer requires OpenLDAP. Still you need special compilation flags so it wa smuch easier for me to just let them be setup in the rpm spec.</p>



<p>Anyway, you can go to the <a href="https://github.com/rseabra/pam_ipahbac">website</a> and <a href="https://github.com/rseabra/pam_ipahbac/releases/tag/0.0.7">download shiny new binaries for 0.0.7 and tar ball</a> if you want, as well as <a href="https://github.com/rseabra/pam_ipahbac/wiki/AIX">read my definitive AIX/FreeIPA integration guide</a> (which is also quite relevant).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>pam_ipahbac (and why not pam_hbac)</title>
		<link>/2016/02/10/pam_ipahbac-and-why-not-pam_hbac/</link>
		
		<dc:creator><![CDATA[Rui Seabra]]></dc:creator>
		<pubDate>Wed, 10 Feb 2016 21:29:18 +0000</pubDate>
				<category><![CDATA[Free Software]]></category>
		<category><![CDATA[PAM IPA HBAC]]></category>
		<category><![CDATA[FreeIPA]]></category>
		<guid isPermaLink="false">/?p=2490</guid>

					<description><![CDATA[Those implementing FreeIPA (possibly in the enterprise ready version called Red Hat Identity Management) in a hybrid environment (meaning&#8230; not just recent GNU/Linux operating systems but particularly including AIX and Solaris) may have noticed the lack of support of an essential component in AIX and Solaris: Host Based Access Control (HBAC). Without HBAC support, when you &#8230; <p class="link-more"><a href="/2016/02/10/pam_ipahbac-and-why-not-pam_hbac/" class="more-link">Continue reading<span class="screen-reader-text"> "pam_ipahbac (and why not pam_hbac)"</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><a href="/category/pam-ipa-hbac" rel="attachment wp-att-2497"><img loading="lazy" class="alignright wp-image-2497" src="/wp-content/uploads/2016/02/ipahbac.png" alt="ipahbac" width="165" height="175" /></a>Those implementing <a href="https://www.freeipa.org/">FreeIPA</a> (possibly in the <em>enterprise ready</em> version called <a href="https://access.redhat.com/products/identity-management-and-infrastructure#getstarted">Red Hat Identity Management</a>) in a hybrid environment (meaning&#8230; not just recent GNU/Linux operating systems but particularly including AIX and Solaris) may have noticed the lack of support of an essential component in AIX and Solaris: Host Based Access Control (HBAC).</p>
<p>Without HBAC support, when you join a server to a real <strong>every single enabled user</strong> will be able to login into that server, which just <em>might not be</em> what you want, specially in more &#8220;&#8221;&#8221;&#8221;<em>enterprise</em>&#8220;&#8221;&#8221;&#8221; (please <strong>do notice the several quotes</strong>) environments with different servers having different access roles (developers can go into development servers but not into application life-cycle, operations people not having to logon to developement servers, system administration teams, security officers, etc&#8230;).</p>
<p>Some applications <em>sort of</em> implement HBAC by letting you restrict the users that can log into them, but that is definitely not elegant as it defeats the purpose of HBAC: a centralized place where one can define such access rules.</p>
<p>Being a PAM module it needed to have a few features:</p>
<ol>
<li>KISS: it doesn&#8217;t have to do much more than get the rules, give success on the first match or just deny for any other reason</li>
<li>be secure: be not fancy, worry not about UNICODE, do not worry about supporting the kitchen sink, etc. This means:
<ol>
<li>most AIX and Solaris environments <strong>do not have special characters</strong> like ç or ó or µ, and actually user logins are <strong>short</strong> in length, so a design strategy was to make this module extremely restrictive about the character set it allows, UNICODE is awesome but it&#8217;s also a sea of unexpected security issues;</li>
<li>do not over-engineer in libraries and sub-files, just implement the PAM groups it needs, do a simple ldap query, navigate through the results, reply to PAM with allowed or denied</li>
<li>I definitely do not mean to imply pam_hbac is not secure, only that it&#8217;s a critical focus on pam_ipahbac</li>
</ol>
</li>
</ol>
<p>If in the future such <em>fancy</em> use cases that need these things come up, then it can be re-evaluated. It&#8217;s not set in stone. Just not the focus. Priorities and such.</p>
<p>And this is why <a href="https://github.com/rseabra/pam_ipahbac">pam_ipahbac</a> was born rather than working with <a href="https://github.com/jhrozek/pam_hbac/">pam_hbac</a>.</p>
<p>I believe jhrozek&#8217;s module to be much more advanced, but I also believe in the above principles, and the primary focus of this module is to work in AIX and Solaris so those plagued with those systems can at least use the awesome Free Software that FreeIPA is.</p>
<p>Also, because it&#8217;s fun to father some code.</p>
<p>Happy hacking!</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
