Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Server SASL support (or not) #83

Open
not-known opened this issue Aug 28, 2024 · 2 comments
Open

Server SASL support (or not) #83

not-known opened this issue Aug 28, 2024 · 2 comments

Comments

@not-known
Copy link

The server component doesn't support SASL. That's not a direct issue for me, a full implementation might require lots of work. It would be nice though that the server component doesn't close the connection because it doesn't recognize a SASL bind. The bind now closes with "The client sent a malformed request. Terminating their connection." and the client thinks the server refuses to answer so it stops connecting. Better is to (RFC correct) reject the SASL bind so the client could fallback to a simple bind. Is something like that possible to build?

@ChadSikorra
Copy link
Contributor

Hello! This is very likely not too hard to implement (in terms of failing in a more reasonable way). Actual server SASL support is quite complex, unfortunately. And it's probably better to just enforce TLS.

I'll see if I can look into it. I've had a hard time finding time for open source projects lately with lots going on personally / and at work.

@not-known
Copy link
Author

Hi there! Thank you for your quick response although you're quite busy. If you find the time to create a fix for this case it would be awesome. I'm not that much into LDAP as you are so creating a PR is a little too complex for me. FYI I'm trying to create a small LDAP to RADIUS proxy for a major vendor storage device which doesn't support RADIUS auth. Sadly it always starts a bind on SASL, if that doesn't work a normal bind and as a last resort anonymous. That's not configurable.
I hope it works out!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants