mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 00:05:50 +03:00
[GH-ISSUE #340] Support Synology #128
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#128
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Roemer on GitHub (Oct 18, 2022).
Original GitHub issue: https://github.com/lldap/lldap/issues/340
I suppose many home users / home labbers have a Synology and want to use LLDAP for authentication.
Now Synologys LDAP implementation is a bit different. Here are a lot of information:
https://kb.synology.com/en-uk/DSM/help/DSM/AdminCenter/file_directory_service_join?version=7
I think there are two main things missing:
Unique IDs (User ID and Group ID
This is not a very big deal, as Synology has a
HASHmethod where pretty much any field can be converted to an int but maybe it is better if LLDAP provide such IDs.Crypted Passwords
Synology needs crypted Passwords from LLDAP according to RFC 2027 (see
userPasswordin https://www.ietf.org/rfc/rfc2307.txt)@Roemer commented on GitHub (Oct 18, 2022):
For the IDs, I see some possible ways:
HASH(however that makes sure they are unique)@kesuskim commented on GitHub (Oct 31, 2022):
Definitely look forward to it. What should possibly be done for it?
@nitnelave commented on GitHub (Oct 31, 2022):
Before doing something like that, I'd like to have a confirmation from the synology devs that there's no way to make it work with the current system, i.e. no way to get synology to try to log in to the LDAP server every time, rather than store the hash themselves.
@Roemer commented on GitHub (Oct 31, 2022):
I've opened a ticket for the Synology Support. Let's see what they answer.
@Roemer commented on GitHub (Nov 2, 2022):
Ok I got the following response in the end:
@nitnelave commented on GitHub (Nov 2, 2022):
That complicates things...
I'd like to avoid complicating the whole password management aspect of the
project, especially if it's going to lower security. I don't want to hash
the password on the client side, and I don't want to send the password in
clear over http if we can avoid it. If Synology needs the user password
field, then I'll have to declare it incompatible with LLDAP.
On Wed, 2 Nov 2022, 09:07 Roman, @.***> wrote:
@Roemer commented on GitHub (Nov 2, 2022):
How about if we could enable this feature with an environment flag? So by default it would be as before but if someone really wants, he can enable that flag to get synology support on the cost of lower security.
@nitnelave commented on GitHub (Nov 2, 2022):
The problem I have with this solution (I thought about it too) is that it
complicates the code a fair bit.
I don't know much about it, but is there a way to implement a Synology
plugin to provide LDAP authentication compatible with LLDAP?
On Wed, 2 Nov 2022, 09:21 Roman, @.***> wrote:
@Roemer commented on GitHub (Nov 2, 2022):
Hmm I haven't seen a package with a custom authentication mechanism for Synology yet. I have the feeling that this won't be possible.