mirror of
https://git.openldap.org/openldap/openldap.git
synced 2025-03-07 14:18:15 +08:00
Add some basic network security information
This commit is contained in:
parent
cf61e03cb8
commit
a50f336032
@ -6,6 +6,59 @@ H1: Security Considerations
|
||||
OpenLDAP Software is designed to run in a wide variety of computing
|
||||
environments from tightly-controlled closed networks to the global
|
||||
Internet. Hence, OpenLDAP Software provides many different security
|
||||
mechanisms. This chapter discusses security considerations for
|
||||
using OpenLDAP Software.
|
||||
mechanisms. This chapter describes these mechanisms and discusses
|
||||
security considerations for using OpenLDAP Software.
|
||||
|
||||
H2: Host Security
|
||||
|
||||
H2: Network Security
|
||||
|
||||
H3: Selective Hearing
|
||||
|
||||
By default, {{slapd}}(8) will listen on both the IPv4 and IPv6 "any"
|
||||
addresses. It is often desirable to have {{slapd}} listen on select
|
||||
address/port pairs. For example, listening only on the IPv4 address
|
||||
127.0.0.1 will disallow remote access to the directory server.
|
||||
|
||||
While the server can be configured to listen on a particular interface
|
||||
address, this doesn't necessarily restrict access to the server to
|
||||
only those networks accessible via that interface. To selective
|
||||
restrict remote access, it is recommend that an IP Firewall be
|
||||
used to restrict access.
|
||||
|
||||
See {{SECT:Command-line Options}} and {{slapd}}(8) for more
|
||||
information.
|
||||
|
||||
|
||||
H3: IP Firewall
|
||||
|
||||
IP firewall capabilities of the server system can be used to restrict
|
||||
access based upon the client's IP address and/or network interface
|
||||
used to communicate with the client.
|
||||
|
||||
Generally, slapd(8) listens on port 389/tcp for LDAP over TCP (e.g.
|
||||
ldap://) and port 636/tcp for LDAP over SSL (e.g. ldaps://).
|
||||
|
||||
As specifics of how to configure IP firewall are dependent on the
|
||||
particular kind of IP firewall used, no examples are provided here.
|
||||
See the document associated with your IP firewall.
|
||||
|
||||
|
||||
H3: TCP Wrappers
|
||||
|
||||
OpenLDAP supports TCP wrappers. TCP wrappers provide a rule-based
|
||||
access control system for controlling TCP/IP access to the server.
|
||||
For example, the {{host_options}}(5) rule:
|
||||
|
||||
> slapd: 10.0.0.0/255.0.0.0 127.0.0.1 : ALLOW
|
||||
> slapd: ALL : DENY
|
||||
|
||||
allows only incoming connections from the private network 10 and
|
||||
localhost (127.0.0.1) to access the directory service.
|
||||
|
||||
It is noted that TCP wrappers require the connection to be accepted.
|
||||
As significant processing is required just to deny a connection,
|
||||
it is generally advised that IP firewall protection be
|
||||
used instead of TCP wrappers.
|
||||
|
||||
See {{hosts_access}}(5) for more information on TCP wrapper rules.
|
||||
|
Loading…
Reference in New Issue
Block a user