mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 08:15:52 +03:00
[GH-ISSUE #1168] [FEATURE REQUEST] Store NTLM hashes for basic Samba integration #417
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#417
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @mitchins on GitHub (May 9, 2025).
Original GitHub issue: https://github.com/lldap/lldap/issues/1168
Motivation
I run LLDAP with multiple Samba instances in a home network. Need a way to keep passwords in sync between both systems without manual management.
Describe the solution you'd like
When passwords are set in LLDAP, automatically calculate and store NTLM hashes (sambaNTPassword attribute). This would allow me to periodically sync these hashes to my Samba servers for users in the samba group.
Describe alternatives you've considered
Currently maintaining separate password databases or manually running smbpasswd after password changes, which is error-prone and frustrating for users.
Additional context
This would be a minimal change that doesn't require full Samba schema support but still enables basic integration for home setups.
@nitnelave commented on GitHub (May 9, 2025):
Sadly this is both technically impossible and not something I want to do for this project. The passwords are set and stored from the web frontend using a zero knowledge proof, meaning that the server never receives the clear text or even hashed password. And this is not something that I want to change.
However, I do believe that it's possible to use Samba with sssd, where it would ask LLDAP to validate a password (using LLDAP as the single source of truth for the password)
@mitchins commented on GitHub (May 9, 2025):
Thanks for the good write up.
I’ve been exploring just any way to make the two work and will investigate
what you suggested via SSSD. lldap on the whole is much simpler then
openLDAP and does everything else I need besides samba.
I managed to get Linux bound and samba to query that but macOS and windows
fail authentication without a SambaDB entry.
On Fri, 9 May 2025 at 19:53, nitnelave @.***> wrote:
@languagegame commented on GitHub (May 18, 2025):
I also would like to use Samba file shares with LLDAP.
I found a related Github repository called AzureAD-LDAP-wrapper that might have some logic that could work for LLDAP for samba authentication. AzureAD-LDAP-wrapper addresses a different use case for authenticating a samba file server to Entra ID, but some of that logic could apply here as well.
Here is how AzureAD-LDAP-wrapper solved this:
While the NT4 hash methodology for "sambaNTPassword" is no longer cryptographically safe, LLDAP could force the Samba server to use LDAPS, which runs over SSL/TLS encryption. This would allow the user to share the NT4 password hash to the Samba server over a secure link.
Here is an example Samba file server configuration that uses the ldapsam password backend.
@nitnelave commented on GitHub (May 18, 2025):
I do not want, and often cannot, store password hashes.
When a user connects to the web frontend, the server doesn't receive the password but only a zero knowledge proof that they have the correct password.
@markus-seidl commented on GitHub (May 28, 2025):
@mitchins
I would be interested in your process, as I'm currently searching for a new auth stack.