[GH-ISSUE #340] Support Synology #128

Closed
opened 2026-02-27 08:15:24 +03:00 by kerem · 9 comments
Owner

Originally created by @Roemer on GitHub (Oct 18, 2022).
Original GitHub issue: https://github.com/lldap/lldap/issues/340

I suppose many home users / home labbers have a Synology and want to use LLDAP for authentication.

Now Synologys LDAP implementation is a bit different. Here are a lot of information:
https://kb.synology.com/en-uk/DSM/help/DSM/AdminCenter/file_directory_service_join?version=7

I think there are two main things missing:

Unique IDs (User ID and Group ID

This is not a very big deal, as Synology has a HASH method where pretty much any field can be converted to an int but maybe it is better if LLDAP provide such IDs.

Crypted Passwords

Synology needs crypted Passwords from LLDAP according to RFC 2027 (see userPassword in https://www.ietf.org/rfc/rfc2307.txt)

Originally created by @Roemer on GitHub (Oct 18, 2022). Original GitHub issue: https://github.com/lldap/lldap/issues/340 I suppose many home users / home labbers have a Synology and want to use LLDAP for authentication. Now Synologys LDAP implementation is a bit different. Here are a lot of information: https://kb.synology.com/en-uk/DSM/help/DSM/AdminCenter/file_directory_service_join?version=7 I think there are two main things missing: ### Unique IDs (User ID and Group ID This is not a very big deal, as Synology has a `HASH` method where pretty much any field can be converted to an int but maybe it is better if LLDAP provide such IDs. ### Crypted Passwords Synology needs crypted Passwords from LLDAP according to RFC 2027 (see `userPassword` in https://www.ietf.org/rfc/rfc2307.txt)
kerem 2026-02-27 08:15:24 +03:00
  • closed this issue
  • added the
    wontfix
    label
Author
Owner

@Roemer commented on GitHub (Oct 18, 2022):

For the IDs, I see some possible ways:

  1. Leave it as is and let Synology use HASH (however that makes sure they are unique)
  2. Hash a field on our own and return that
  3. Add an auto-increment field to User and Group and just return that
  4. Allow to manually specify the ids via UI with a simple check for uniqueness
<!-- gh-comment-id:1282867785 --> @Roemer commented on GitHub (Oct 18, 2022): For the IDs, I see some possible ways: 1. Leave it as is and let Synology use `HASH` (however that makes sure they are unique) 2. Hash a field on our own and return that 3. Add an auto-increment field to User and Group and just return that 4. Allow to manually specify the ids via UI with a simple check for uniqueness
Author
Owner

@kesuskim commented on GitHub (Oct 31, 2022):

Definitely look forward to it. What should possibly be done for it?

<!-- gh-comment-id:1296552051 --> @kesuskim commented on GitHub (Oct 31, 2022): Definitely look forward to it. What should possibly be done for it?
Author
Owner

@nitnelave commented on GitHub (Oct 31, 2022):

Before doing something like that, I'd like to have a confirmation from the synology devs that there's no way to make it work with the current system, i.e. no way to get synology to try to log in to the LDAP server every time, rather than store the hash themselves.

<!-- gh-comment-id:1296744212 --> @nitnelave commented on GitHub (Oct 31, 2022): Before doing something like that, I'd like to have a confirmation from the synology devs that there's no way to make it work with the current system, i.e. no way to get synology to try to log in to the LDAP server every time, rather than store the hash themselves.
Author
Owner

@Roemer commented on GitHub (Oct 31, 2022):

I've opened a ticket for the Synology Support. Let's see what they answer.

<!-- gh-comment-id:1296764870 --> @Roemer commented on GitHub (Oct 31, 2022): I've opened a ticket for the Synology Support. Let's see what they answer.
Author
Owner

@Roemer commented on GitHub (Nov 2, 2022):

Ok I got the following response in the end:

In this case, the NAS will not be able to join the LDAP server since the "userPassword" field is indeed a requirement.
<!-- gh-comment-id:1299758314 --> @Roemer commented on GitHub (Nov 2, 2022): Ok I got the following response in the end: ``` In this case, the NAS will not be able to join the LDAP server since the "userPassword" field is indeed a requirement. ```
Author
Owner

@nitnelave commented on GitHub (Nov 2, 2022):

That complicates things...

I'd like to avoid complicating the whole password management aspect of the
project, especially if it's going to lower security. I don't want to hash
the password on the client side, and I don't want to send the password in
clear over http if we can avoid it. If Synology needs the user password
field, then I'll have to declare it incompatible with LLDAP.

On Wed, 2 Nov 2022, 09:07 Roman, @.***> wrote:

Ok I got the following response in the end:

In this case, the NAS will not be able to join the LDAP server since the "userPassword" field is indeed a requirement.


Reply to this email directly, view it on GitHub
https://github.com/nitnelave/lldap/issues/340#issuecomment-1299758314,
or unsubscribe
https://github.com/notifications/unsubscribe-auth/AAGCPWMD7HNSBBEDCJKEKNTWGIOLDANCNFSM6AAAAAARIL7SEQ
.
You are receiving this because you commented.Message ID:
@.***>

<!-- gh-comment-id:1299774981 --> @nitnelave commented on GitHub (Nov 2, 2022): That complicates things... I'd like to avoid complicating the whole password management aspect of the project, especially if it's going to lower security. I don't want to hash the password on the client side, and I don't want to send the password in clear over http if we can avoid it. If Synology needs the user password field, then I'll have to declare it incompatible with LLDAP. On Wed, 2 Nov 2022, 09:07 Roman, ***@***.***> wrote: > Ok I got the following response in the end: > > In this case, the NAS will not be able to join the LDAP server since the "userPassword" field is indeed a requirement. > > — > Reply to this email directly, view it on GitHub > <https://github.com/nitnelave/lldap/issues/340#issuecomment-1299758314>, > or unsubscribe > <https://github.com/notifications/unsubscribe-auth/AAGCPWMD7HNSBBEDCJKEKNTWGIOLDANCNFSM6AAAAAARIL7SEQ> > . > You are receiving this because you commented.Message ID: > ***@***.***> >
Author
Owner

@Roemer commented on GitHub (Nov 2, 2022):

How about if we could enable this feature with an environment flag? So by default it would be as before but if someone really wants, he can enable that flag to get synology support on the cost of lower security.

<!-- gh-comment-id:1299789713 --> @Roemer commented on GitHub (Nov 2, 2022): How about if we could enable this feature with an environment flag? So by default it would be as before but if someone really wants, he can enable that flag to get synology support on the cost of lower security.
Author
Owner

@nitnelave commented on GitHub (Nov 2, 2022):

The problem I have with this solution (I thought about it too) is that it
complicates the code a fair bit.

I don't know much about it, but is there a way to implement a Synology
plugin to provide LDAP authentication compatible with LLDAP?

On Wed, 2 Nov 2022, 09:21 Roman, @.***> wrote:

How about if we could enable this feature with an environment flag? So by
default it would be as before but if someone really wants, he can enable
that flag to get synology support on the cost of lower security.


Reply to this email directly, view it on GitHub
https://github.com/nitnelave/lldap/issues/340#issuecomment-1299789713,
or unsubscribe
https://github.com/notifications/unsubscribe-auth/AAGCPWOARXWIBC4OUZ5XPCTWGIP73ANCNFSM6AAAAAARIL7SEQ
.
You are receiving this because you commented.Message ID:
@.***>

<!-- gh-comment-id:1299827840 --> @nitnelave commented on GitHub (Nov 2, 2022): The problem I have with this solution (I thought about it too) is that it complicates the code a fair bit. I don't know much about it, but is there a way to implement a Synology plugin to provide LDAP authentication compatible with LLDAP? On Wed, 2 Nov 2022, 09:21 Roman, ***@***.***> wrote: > How about if we could enable this feature with an environment flag? So by > default it would be as before but if someone really wants, he can enable > that flag to get synology support on the cost of lower security. > > — > Reply to this email directly, view it on GitHub > <https://github.com/nitnelave/lldap/issues/340#issuecomment-1299789713>, > or unsubscribe > <https://github.com/notifications/unsubscribe-auth/AAGCPWOARXWIBC4OUZ5XPCTWGIP73ANCNFSM6AAAAAARIL7SEQ> > . > You are receiving this because you commented.Message ID: > ***@***.***> >
Author
Owner

@Roemer commented on GitHub (Nov 2, 2022):

Hmm I haven't seen a package with a custom authentication mechanism for Synology yet. I have the feeling that this won't be possible.

<!-- gh-comment-id:1300251951 --> @Roemer commented on GitHub (Nov 2, 2022): Hmm I haven't seen a package with a custom authentication mechanism for Synology yet. I have the feeling that this won't be possible.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/lldap-lldap#128
No description provided.