Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jpmens/ppolicy-check-password
Password Checking Module for OpenLDAP
https://github.com/jpmens/ppolicy-check-password
Last synced: 1 day ago
JSON representation
Password Checking Module for OpenLDAP
- Host: GitHub
- URL: https://github.com/jpmens/ppolicy-check-password
- Owner: jpmens
- License: other
- Created: 2012-07-05T11:38:31.000Z (over 12 years ago)
- Default Branch: master
- Last Pushed: 2011-04-16T02:28:45.000Z (over 13 years ago)
- Last Synced: 2024-10-15T00:26:20.636Z (22 days ago)
- Language: C
- Homepage:
- Size: 77.1 KB
- Stars: 0
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README
- License: LICENSE
Awesome Lists containing this project
README
check_password.c - OpenLDAP pwdChecker library
2007-06-06 Michael Steinmann
2008-01-30 Pierre-Yves Bonnetain
2009 Clement Oudot - LTB-project
2009 Jerome HUET - LTB-project
2011 Trevor Vaughan - Onyx Point, Inc.check_password.c is an OpenLDAP pwdPolicyChecker module used to check the
strength and quality of user-provided passwords.This module is used as an extension of the OpenLDAP password policy controls,
see slapo-ppolicy(5) section pwdCheckModule.check_password.c will run a number of checks on the passwords to ensure minimum
strength and quality requirements are met. Passwords that do not meet these
requirements are rejected.This was originally packaged as
ltb-project-openldap-ppolicy-check-password-1.1. However, Onyx Point made a
great number of changes and improvements and has re-labeled it
ppolicy-check-password. All original license restrictions and user
privileges apply.The original code can be downloaded from https://ltb-project.org/wiki/download.
Password checks
---------------
- passwords shorter than 6 characters are rejected if cracklib is used (because
cracklib WILL reject them).- syntactic checks controls how many different character classes are used
(lower, upper, digit and punctuation characters). The minimum number of
classes is defined in a configuration file. You can set the minimum for each
class.- passwords are checked against cracklib if cracklib is enabled at compile
time. It can be disabled in configuration file.- password checking can optionally be set to ensure that no more than a given
number of characters from a character set can be used in a row.INSTALLATION
------------
Use the provided Makefile to build the module.Compilation constants :
CONFIG_FILE : Path to the configuration file.
Defaults to /etc/openldap/check_password.confDEBUG : If defined, check_password will syslog() its actions.
LDEBUG : If defined, check_password will print its actions to the console.
Build dependencies
cracklib header files (link with -lcrack). The Makefile does not look for
cracklib; you may need to provide the paths manually.Install into the slapd server module path. Change the installation
path to match with the OpenLDAP module path in the Makefile.The module may be defined with slapd.conf parameter "modulepath".
On Red Hat systems, you will need to download the openldap source RPM that you want to build against and perform the following steps:
- rpm -i
- rpmbuild -bc /SPECS/openldap.spec
- cd
- mkdir openldap-
- cd openldap-
- src_dir="/BUILD/openldap-/openldap-/"
- cp -r $src_dir/build-servers $src_dir/include \
$src_dir/libraries $src_dir/servers .Then, the Makefile should work properly.
TESTING
-------
An application is provided to build tests for check_password.c. The Makefile
will produce 'cpass' which will run the tests defined in check_password_test.c.
It is highly suggested that you use this if you are going to modify
check_password.c.You'll need to run cpass with: LD_LIBRARY_PATH=. ./cpass
USAGE
-----
To use this module you need to add objectClass pwdPolicyChecker with an
attribute 'pwdCheckModule: check_password.so' to a password policy entry.The module depends on a working cracklib installation including wordlist files.
If the wordlist files are not readable, the cracklib check will be skipped
silently.Note: pwdPolicyChecker modules are loaded on *every* password change operation.
Configuration
-------------
The configuration file (/etc/openldap/check_password.conf by default) contains
parameters for the module. If the file is not found, parameters are given their
default value.The syntax of the file is :
parameter value
with spaces being delimiters. Parameter names ARE case sensitive (this may
change in the future).Current parameters :
- use_cracklib: integer. Default value: 1. Set it to 0 to disable cracklib verification.
It has no effect if cracklib is not included at compile time.- min_points: integer. Default value: 3. Minimum number of quality points a new
password must have to be accepted. One quality point is awarded for each character
class used in the password.- min_upper: integer. Defaut value: 0. Minimum upper characters expected.
- min_lower: integer. Defaut value: 0. Minimum lower characters expected.
- min_digit: integer. Defaut value: 0. Minimum digit characters expected.
- min_punct: integer. Defaut value: 0. Minimum punctuation characters expected.
- max_consecutive_per_class: integer. Default value: 5. Maximum number of
characters that can appear consecutively from a given character class. 0
disables.Logs
----
If a user password is rejected by an OpenLDAP pwdChecker module, the user will
*not* get a detailed error message, this is by design.Typical user message from ldappasswd(5):
Result: Constraint violation (19)
Additional info: Password fails quality checking policyA more detailed message is written to the server log.
Server log:
check_password_quality: module error: (check_password.so)
Password for dn=".." does not pass required number of strength checks (2 of 3)Caveats
-------
Runtime errors with this module (such as cracklib configuration problems) may
bring down the slapd process.Use at your own risk.
TODO
----
* use proper malloc function, see ITS#4998
* get rid of GOTO'sHISTORY
-------
* 2011-01-28 - Trevor Vaughan - Onyx Point, Inc.
Version 1.2
- Ensure the the configuration file is only read once per run.
- Add max_consecutive_per_class.
- Add LDEBUG flag for local debugging.
- Add test code and update Makefile* 2009-10-30 Clement OUDOT - LTB-project
Version 1.1
- Apply patch from Jerome HUET for minUpper/minLower/minDigit/minPunct* 2009-02-05 Clement Oudot - LINAGORA Group
Version 1.0.3
- Add useCracklib parameter in config file (with help of Pascal Pejac)
- Prefix log messages with "check_password: "
- Log what character type is found for quality checking* 2008-01-31 Pierre-Yves Bonnetain
Version 1.0.2
- Several bug fixes.
- Add external config file* 2007-06-06 Michael Steinmann
Version 1.0.1
- add dn to error messages* 2007-06-02 Michael Steinmann
Version 1.0