25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“Internet Message Access Protocol (IMAP4)” on page 591), but has since<br />

evolved into a more general system for mediating between protocols <strong>and</strong><br />

authentication systems.<br />

In SASL, connection protocols, such as LDAP, IMAP, <strong>and</strong> so on, are represented<br />

by profiles; each profile is considered a protocol extension that allows the<br />

protocol <strong>and</strong> SASL to work together. A complete list of SASL profiles can be<br />

obtained from the Information Sciences Institute (ISI). Among these are IMAP,<br />

SMTP, POP, <strong>and</strong> LDAP. Each protocol that intends to use SASL needs to be<br />

extended with a comm<strong>and</strong> to identify an authentication mechanism <strong>and</strong> to carry<br />

out an authentication exchange. Optionally, a security layer can be negotiated to<br />

encrypt the data after authentication <strong>and</strong> ensure confidentiality. LDAPv3 includes<br />

such a comm<strong>and</strong> (ldap_sasl_bind() or ldap_sasl_bind_s()). The key<br />

parameters that influence the security method used are:<br />

dn This is the distinguished name of the entry which is to bind.<br />

This can be thought of as the user ID in a normal user ID <strong>and</strong><br />

password authentication.<br />

mechanism This is the name of the security method to use. Valid security<br />

mechanisms are, currently:<br />

OTP The One Time Password mechanism<br />

(defined in RFC 2444).<br />

GSSAPI The Generic Security Services Application<br />

Program Interface (defined in RFC 2743).<br />

CRAM-MD5 The Challenge/Response Authentication<br />

Mechanism (defined in RFC 2195), based<br />

on the HMAC-MD5 MAC algorithm.<br />

DIGEST-MD5 An HTTP Digest-compatible CRAM based<br />

on the HMAC -MD5 MAC algorithm.<br />

EXTERNAL An external mechanism. Usually this is<br />

TLS, discussed in “Transport Layer<br />

Security (TLS)” on page 474.<br />

ANONYMOUS Unauthenticated access.<br />

credentials This contains the arbitrary data that identifies the DN. The<br />

format <strong>and</strong> content of the parameter depends on the<br />

mechanism chosen. If it is, for example, the ANONYMOUS<br />

mechanism, it can be an arbitrary string or an e-mail address<br />

that identifies the user.<br />

SASL provides a high-level framework that lets the involved parties decide on the<br />

particular security mechanism to use. The SASL security mechanism negotiation<br />

between client <strong>and</strong> server is done in the clear. After the client <strong>and</strong> the server<br />

Chapter 12. Directory <strong>and</strong> naming protocols 473

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!