-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Without bind_dn_template, any password is authenticated successfully! #44
Comments
This sounds like a bug. I'll check if I can reproduce to confirm... |
this is fact! |
If don't set ldapauthenticator/ldapauthenticator/ldapauthenticator.py Lines 315 to 335 in 718eb59
|
But we can take |
How do we set bind_dn_template? |
@AnirudhVyas - |
I can't reproduce and I can't follow the logic how this could be the case.
If
therefore
which then falls through to the ldapauthenticator/ldapauthenticator/ldapauthenticator.py Lines 377 to 381 in 718eb59
|
Poking around some more, it seems that if your |
- Fixes jupyterhub#44 Empty DN templates are now ignored - Fixes jupyterhub#93 search_filter and allowed_groups are no longer mutually exclusive
@dhirschfeld |
@ermakovpetr - yes, I think the functionality in #88 is orthogonal to that in #95 |
When initially configuring ldapauthenticator, I accidentally left bind_dn_template out of my config. When I tested it, I noticed it was authenticating me even with incorrect passwords!
This seems very dangerous. Although this parameter is required, authentication should probably always fail rather than always succeeding (or jupyter hub should simply refuse to start if required values are missing).
This happened when I had the following config vars set:
server_address, lookup_dn, user_search_base, user_attribute
.The text was updated successfully, but these errors were encountered: