[Bug 1984073] Re: autofs: regression on focal->jammy upgrade: SASL binds to Samba AD broken

rdratlos 1984073 at bugs.launchpad.net
Mon Sep 5 10:26:08 UTC 2022


Dear Sergio,
reproducing the issue requires a Samba AD DC and a domain workstation with autofs-ldap installed. AutoFS maps need not to be defined in Samba AD as this issues relates to SASL authentication to Samba AD only. But Samba AD needs to be prepared to allow Kerberos authentication of the domain workstation using service principals.

Are there any Test Plans available for setting up a test Samba AD DC and
join a test workstation to the domain? This would be a good basis for
adding the autofs required configuration changes.

The main area of possible regression is for connecting the autofs test
workstation to an OpenLDAP directory service instead of a Samba AD.
Using the proposed patches SASL authentication is now completely handled
by the OpenLDAP client. Before authentication was controlled by an own
SASL client implementation within autofs. Risk for regression is very
low as all OpenLDAP client tools (e. g. ldapsearch) use the same
mechanism.

No regression is expected for interworking with older Ubuntu releases.
We have still Ubuntu 18.04 Samba AD DC in the net and interworking has
been successfully tested to them.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to autofs in Ubuntu.
https://bugs.launchpad.net/bugs/1984073

Title:
   autofs: regression on focal->jammy upgrade: SASL binds to Samba AD
  broken

Status in autofs package in Ubuntu:
  Triaged

Bug description:
  automounter version 5.1.8 does not support SASL security layer
  encryption and only relies on TLS to protect (encrypt) LDAP traffic.

  Since version 4.4 Samba AD domain controllers' default settings only allow
  for simple SASL binds over TLS encrypted connections or SASL binds with
  sign or seal, i. e. data security layer encryption, over unencrypted
  connections. Therefore, current automounter cannot fetch autofs maps from
  Samba AD DCs using SASL anymore without setting Samba configuration
  parameter "ldap server require strong auth" to "no" or "allow_sasl_over_tls".

  Cyrus SASL supports data encryption in GSSAPI (with Kerberos V) mode using
  an SASL data security layer according to IETF RFC 2078. This security layer
  provides for traffic encryption during authentication and authorization
  towards an OpenLDAP based server and for subsequent encryption of data
  traffic for the LDAP session. OpenLDAP libldap and OpenLDAP clients support
  automatic installation of (Cyrus) SASL data security layer.

  automounter version 5.1.8 uses its own interface to Cyrus SASL API and does
  not rely on OpenLDAP libldap for SASL binds. This leads to security degradation
  when using Samba AD or OpenLDAP directory services to store automount maps.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autofs/+bug/1984073/+subscriptions




More information about the foundations-bugs mailing list