Fedora Directory Server 1.0 Released! 200
LnxAddct writes "NewsForge is reporting that the first official release of the Fedora Directory Server has been announced. This is good news for members of the open source community longing for an easy to use, enterprise class directory server. Fedora Directory Server is based off of Netscape Directory Server which Red Hat purchased a year ago and released as open source. Screenshots are available on their site." NewsForge is a Slashdot sister site.
command line (Score:5, Interesting)
A fancy GUI [redhat.com] is all very well, but does this come with some decent command line tools to scriptify adding and removing users and the like? One of the things that's kept my department on NIS for so long is that absolute hideous unfriendliness of the OpenLDAP tools vs useradd, usermod and friends.
Re:command line (Score:3, Insightful)
However, I find it interesting that you describe OpenLDAP as "absolute hideous unfriendliness" when it simply isn't that case. Granted that the ldif format isn't obvious or familiar, using the command lines tools is actually rather simple. You only need to understand how an LDAP Directory works, and how your schema of choice is laid out.
I have personall written a front end for managing userspace in OpenLDAP via bash scripts, and I can tell you that once I spen a hour reading up on ldif, it w
Re:command line (Score:3, Insightful)
Re:command line (Score:2)
Its age shows, it's software from "way back".
LDAP is one of the architectures that would really be worth reinventing.
Imho the main reason why we still don't have "easy" single-signon in unix-land is because
the only available route nowadays leads through LDAP- and kerberos-land which both do their particular
job well but are such a pain to setup, maintain and integrate with that only the bravest and most fearless
sysadmins dare to wa
Re:command line (Score:2)
http://phpldapadmin.sourceforge.net/ [sourceforge.net]
Re:command line (Score:5, Informative)
my @validsalt = ('a'
my $salt = $validsalt[rand(64)] . $validsalt[rand(64)];
my $test = crypt($cleartext, $salt);
Of course, you'd also want to do some basic validation of the inputs. Then just wrap the user inputs in an LDIF template and run. It sounds a lot more difficult than it actually is.
The schema can actually validate that userid is unique, but you should check anyway and also validate the groups and gids.
Re:command line (Score:2)
Every admin in the world must write his or her own script to add a user to the directory.
Why can't we have ready-made programs that perform such simple tasks?
Like useradd, for example.
Re:command line (Score:2)
Re:command line (Score:3, Informative)
Re:command line (Score:2)
There are so many distributions around and so many different approaches to the same thing at this level, that there is nothing you can do as an individual.
I have written and released free software. I have written dedicated scripts to use LDAP in the company where I work.
Comparing to the competition, I think the integration of LDAP into Linux is quite f
Re:command line (Score:2)
If you don't have time to administer your web server, what the hell are you doing all day at your web admin job?
Scripting languages and LDAP (Score:2)
So even if Fedora's directory server doesn't offer any console tools (i dont know if it does), it won't be any problem making scripts manipulating its data. Take a look at this example on howto remove a record, its from the python-ldap site, and it isn't exactly overly-complex to use from the looks of it
import ldap
try:
l
FANCY gui? (Score:2)
Re:FANCY gui? (Score:2)
Re:command line (Score:2)
Re:command line (Score:2)
Have you heard of ldapadd and ldapmodify? These tools are available from OpenLDAP or from pretty much any OS that is LDAP capable. I know you're probably just trolling but it's quite obvious you've never used LDAP o
Re:command line (Score:3, Informative)
Re:Hey, thanks for the code! (Score:2)
Maybe I'll go ahead and write that chage, then. I'm pretty sure it was in there when I wrote what I wrote, but like I said, I haven't really messed with LDAP for a while (and nss_ldap + pam_ldap took care of most of the orignal reason anyway). Either way, "fix LDAP stuff" is now on my to-do list.
wow (Score:5, Insightful)
Re: wow (Score:5, Informative)
Not the first time. (Score:5, Informative)
However, this story is just a bit more complicated.
RedHat open-sourced all of the code they could, which was quite a bit, but originally just the main directory daemon, ns-slapd, a few shared libraries and command-line tools were open source. The real news here is that the last of the "other" bits have finally been re-written under a new (open-source) license.
That's part of the motivation for resetting the release nubmer; note that this is verison "1.0" instead of (grumbles about memory) 8 or 9?
So now, it is a 100% open source solution, no more binary-only rpms.
Re:wow (Score:3, Informative)
Sun paid $88,000,000 for Star Office. (Score:2)
Re:wow (Score:5, Informative)
Regards,
Steve
Re:wow (Score:2)
Cygwin and eCos (and, I think the majority of GCC 2.0) were developed by Cygnus, which Red Hat subsequently bought.
Indeed. It's just their distributions that suck.
Re:wow (Score:2)
+ Kerberos ? (Score:5, Informative)
with Active Directory.
Does the Fedora DS intergrate those two neatly, single sign on is neat, but OSS provides
no turnkey solutions for this (yet).
Re:+ Kerberos ? (Score:4, Insightful)
Really, I'm not trying to troll here, I'm just really not seeing what this need to click a single button for every possible setup comes from. Rather than trying to provide every possible setup from the start, as Microsoft does (and which much of the complexity in Windows derives from), isn't it better to have a generic solution that can be tailored to one's specific need, instead?
Re:+ Kerberos ? (Score:2)
It's one possible measure for the amount of care that's put in the product. You can say this doesn't go for this particular product, but lots of times adoption of a product starts with someone who has 15 minutes of spare time.
If the product doesn't show a few nice things within those 15 minutes, it just might be possible it's not looked further into.
I'm not saying this is the correct procedure to evaluate an important piec
Re:+ Kerberos ? (Score:3, Insightful)
Yeah, because it's not like this is a well used 'feature' in Windows Domains in just about every large company...
Re:+ Kerberos ? (Score:5, Insightful)
Largely, I think it boils down to - 'because they don't understand the technology as we do'. Take a simple, high level requirement: identity management. You or I might see that in terms of the components: such as a directory, an authentication service, creation & removal scripts, some means of replication, monitoring scripts etc.
A $notnerd sees the requirement as a black box, they don't care about the internals. They've probably been told by some techie/salesman that it will address some problem they have. For this person turnkey seems perfect, $company sells $product which is billed as an 'identity managment solution'. A magic black box solution to a black box problem, their work is done - now it is IT's problem.
To you it isn't, but what happens when you leave? It's much easier to recruit someone to maintain a push button solution, than a partly bespoke ecology of components and scripts. Often the solution and the ecology are similar in complexity, but the solution hides that behind a GUI and glossy marketting material.
Purchasers often chose to spend their money on specialised software (solutions), hopefully saving time. We often choose to spend our time customising general purpose software, hopefully saving money.
Alex
Re:+ Kerberos ? (Score:3, Interesting)
I agree completely with that, but my main point is that I think that this "turnkey solution" should be a separate pro
Re:+ Kerberos ? (Score:2)
As you say, the turnkey solution should be a customisation of general parts, possibly tweaked to integrate with one another. The trick is getting a $notnerd to see this, marketting this solution so they choose it over Active Directory or ZENWorks. Consultants choosing and recommending it one good method.
I believe this identity solution should be delivered like any other opensource project. A source package which distributions can repackage and inte
Re:+ Kerberos ? (Score:4, Interesting)
Re:+ Kerberos ? (Score:2)
Sorry for my poor choice of phrase. What I meant was "person who at the time is uninterested in the technology, beyond how it can further their ends". I chose $notnerd because, in my experience, it's often the case when a monolithic solution-in-a-box is chosen.
I'm not arguing against turnkey, I'm arguing for technically sound solutions. In my eye that means both a strong GUI (for everyone doing one off tasks) and a strong scriptable interface (for automating repetitive tasks). Having a scriptabl
Re:+ Kerberos ? (Score:2)
Re:+ Kerberos ? (Score:3, Insightful)
Oh that's just egotistical rubbish! People like turnkey solutions mainly for two reasons:
1.) They're novices and they just want something that works
2.) They're not novices, but they're overloaded with work and they don't want to learn the complete ins and outs of yet another massive, complex software package (note I said package, not the protocols it uses, etc).
Re:+ Kerberos ? (Score:2)
I should have said 'because they don't understand or care about the technology as we do, only the results'.
Turnkey is sometimes a good choice, such as in the cases you give. Customised packages & bespoke are sometimes a good choice sometimes.
My argument (and I believe Dolda2000's argument), is that turnkey solutions should not be monolithic. They should be built on independant components, rather than being a take it or leave it lump.
Any solution (eg Active Direc
Re:+ Kerberos ? (Score:2)
Re: (Score:2)
Re:+ Kerberos ? (Score:2)
A non-techie most often gets the final decision about which solution to choose. They base their decision on advice from their in house techies, sales pitches and bids received etc.
One pitfall they wish to avoid, is a system that is more expensive to maintain and customise in the long term. A solution-in-a-box is commonly held to have lower staffing overhead, because less experienced (aka ch
Re:+ Kerberos ? (Score:3, Insightful)
Because it makes deploying them easier, quicker, cheaper and less dependant on a particular individual's (or individuals') knowledge.
Re: Who needs turnkey (Score:3)
I think it's because the domain of technical knowledge is so great that it's really quite difficult to grasp it all. If you're a small or medium sized company you may not have someone who really understands Kerberos and LDAP. Your sysadmins may know everything in the world about mailservers, webservers, DNS servers, DHCP servers and database servers but very little about AAA servers, Kerberos and LDAP. Look at the security community which is still farily young. People are already starting to specialize into
Re:+ Kerberos ? (Score:2)
Yes, yes it is. Now you can obviously do it. So can I - that's one of the many jobs I do, installing LDAP and Kerberos services for corporate and government clients - but it's not easy. If it was easy then these companies and agencies wouldn't need to hire me. They could do it themselves.
Let's face it. The t
Re:+ Kerberos ? (Score:2)
Common signon for Linux machines is all very well, but you've been able to do that with NIS for years.
Re:+ Kerberos ? (Score:2)
I would think that the important thing would be to raise the level of knowledge of the common admin, rather than to dumb down the technology to the point that it looks like Windows. Why is it that we expect our sysadmins to be unable to cope with decent technology?
That doesn't mean intentionally making the technology difficult to use. It means expecting that the masses sysadmins out there actually understand how to impl
Re:+ Kerberos ? (Score:1)
Re:+ Kerberos ? (Score:2)
Re:+ Kerberos ? (Score:2)
Re:+ Kerberos ? (Score:2)
This is sort of backwards.
The HOWTO discusses allowing authentication to Fedora Directory Server using Kerberos credentials from a Kerberos database. So this works like this: you want to use the LDAP service (Fedora Directory Server) to e.g. search for some users. You connect to it, and supply your Kerberos ticket, that's obtained from a Kerberos KDC (Key Distribution Server), based on authentication based on your Kerberos Server's database (probably some ordinary files). You get authenticated based on Ke
Get Carter. (Score:2)
Gentoo package? (Score:5, Interesting)
I've searched used such strings as "ldap", "nss", "directory" etc - but nothing comes up too interesting.
Re:Gentoo package? (Score:2)
More seriously, I will check out depencies. As I have rather big interest in this product, I will check out If I can't contribute an ebuild.
Re:Gentoo package? (Score:1)
Re:Gentoo package? (Score:2)
"Not yet, but after the release hit slashdot, ...
Of course, the second clause doesn't exactly parse correctly in that case, but...well..just a thought :P
Re:Gentoo package? (Score:1, Troll)
This isn't a toy, it's an actual useful enterprise software package people use on production servers.
Hence, probably not very high priority to Gentoo packagers.
Interesting, but is it Good Enough(tm)? (Score:2, Insightful)
The first problem is that Netscape probably didn'tadd much to their Directory Service towards the end, and it is unclear how much
Re:Interesting, but is it Good Enough(tm)? (Score:5, Interesting)
The first problem is that Netscape probably didn'tadd much to their Directory Service towards the end, and it is unclear how much Fedora has had to put resources into code cleanups and bug fixes, as opposed to adding the capabilities it is going to need.
Red Hat / Fedora Team spent about a year cleaning it up and porting it to linux, or didn't you bother to read the summary?
For this directory server to be of much interest to network administrators, this package absolutely must support two-way communication with Microsoft Active Directory's LDAP. It can support more - and it would be great if, for once, Open Source "embraced and extended" something from The Other Side...
Uh? What does it need? 3-way communication with AD? 4-way? Active Directory is just a bastardized for of LDAP, and even OpenLdap includes the bits needed to work with it. What you are saying here doesn't make any sense.
To be of interest to system admins, it needs to work with PAM and preferably one of the standard "unified" admin interfaces, like Webmin or (yes, it is still used) linuxconf, in addition to specialized tools.
What you are saying here demostrates a complete ignorance of PAM, LDAP, and directory services in general. PAM has long supported LDAP, as has the NSS libraries. Webmin and Linuxconf are two interfaces the people have added as a layer on top of existing services. Nothing NEEDS to work with them, they support whatever they want. FDS has a great GUI and that is the point. Otherwise, an LDAP service is a usefull as the schema you load and how you implement it.
I like Fedora's distro, it is simply that if they are neglectful of something they can do in a script and a makefile, and of mere patches they had already made public, then how confident can I be of their ability to maintain a very complex piece of software?
Ok, seriously, get a clue. If you are looking for assurance, pony up some cash and buy the fully supported Red Hat Directory Server. Frankly, I think the entire Fedora effort is great, but I wouldn't run any substatinal business on it. For that I pay for Red Hat.
Re:Interesting, but is it Good Enough(tm)? (Score:1)
Re:Interesting, but is it Good Enough(tm)? (Score:2)
Re:Interesting, but is it Good Enough(tm)? (Score:2)
AD is not just a bastardised LDAP. AD is LDAP+Kerberos+Extensions
Right. It's Bastardized LDAP + Bastardized KERBEROS + thoroughly proprietary extensions.
I'm assuming this DS supports AD otherwise it's just going to get nowhere in the corporate space.
Sad as it is, you may just be right.
Re:Interesting, but is it Good Enough(tm)? (Score:2)
Re:Interesting, but is it Good Enough(tm)? (Score:4, Interesting)
Red Hat / Fedora Team spent about a year cleaning it up and porting it to linux, or didn't you bother to read the summary?
"Porting to Linux" is and of itself a mindless statement, since this is Netscape DS, aka iPlanet DS, which is an antique fork of Sun's current SJES DS, all of which have been running on Linux for better part of a decade.
It will be interesting to compare Fedora DS to Sun's current offering. Sun even provides an open source tool for this called SLAMD [slamd.com].
Re:Interesting, but is it Good Enough(tm)? (Score:2, Informative)
Re:Interesting, but is it Good Enough(tm)? (Score:2)
Re:Interesting, but is it Good Enough(tm)? (Score:3, Interesting)
To really understand this move by Redhat, it has to be taken into context with last weeks news about Sun open sourcing their enterprise applications, one of which is iPlanet Directory Server. iPlanet Directory Server and Redhat's both forked from the same N
Re:Interesting, but is it Good Enough(tm)? (Score:2)
My main fears were largely concerning how well they tracked highly non-standard variants that are built into key products that the corporate market simply won't do without. Because things like AD are
Re:Interesting, but is it Good Enough(tm)? (Score:2)
RPC? DCE? You are -way- behind the times, there, and no sane person alive is going to use protocols with such horrible latency. Have you seen how many layers RPC needs to go through? It was great when it was about the only thing out there, but
Re:Interesting, but is it Good Enough(tm)? (Score:2)
About the console (Score:2, Interesting)
Its like you press a button, then you have to wait for 10 seconds before anything is happening. On Enterprise 4, everything is about 50 times faster, maybe even more.
The main difference here should be 2.4 kernel versus 2.6 kernel, but what makes the console that much faster on 2.6?
Re:About the console (Score:1)
Re:About the console (Score:2, Informative)
It is probably trying to do some kind of lookup, ipv6 or your nameservice, you did configure your
Re:About the console (Score:2)
Hmm... my airmchair diagnosis is that you may be suffering from a PEBKAC issue.
I keed! I keed!
ldap schmel-dap (Score:3, Interesting)
There are so few standards around LDAP authentication that it is impossible to support "LDAP" - you have to support MS Active Directory, Oracle Info Server, Novell eDir, etc..
For example, there is no standard way to handle password expiration. Every directory does it differently. There is no standard location or hashing algorithm for user passwords, nor is there any sort of standard password policy (password complexity rules, maximum retries until lockout, etc)
So we basically had to rewrite support for all these things that we already had in a modular fashion so now administrators are stuck configuring "the AD plugin", or "the OIS plugin"..
Re:ldap schmel-dap (Score:2, Insightful)
RFC 2307 - using LDAP to provide a Network Information Service.
Almost everything you touched on is covered in that RFC. So the standards exist, but Microsoft/Oracle/etc chose not to adhere to them by creating their ow
Re:ldap schmel-dap (Score:2, Insightful)
Additionally, who cares if it's not an official standard? The original poster said that LDAP is flawed because Microsoft AD, Oracle, and Novell all use different schemas within their directory products. That has nothing to do with LDAP (the protocol), and everything to do with the design choices those companies made.
Re:ldap schmel-dap (Score:2)
Re:ldap schmel-dap (Score:2)
First you bind as a read-only user to grab the user's DN from whatever they pass in (if they type an email address, you query that field to return their DN). Failure of this query means they entered an incorrect username/alias.
Second, you take that DN and the password the user provided and attempt a second bind against LDAP. Failure to bind means they entered the wrong password.
Was there a particular reason you couldn't use this method?
Re:ldap schmel-dap (Score:2)
Maybe you had quite specific requirements, and I WILL agree that password stuff is NOT handled uniformly in LDAP, which is why I use the bind method.
Sam Carter (Score:3, Funny)
Re:Sam Carter (Score:2)
Kind regards
John Doe
I a n00b with a question (Score:2)
Re:I a n00b with a question (Score:2)
Re:I a n00b with a question (Score:2)
In general directory servers are based around the OSI X.500 model and DAP.
A good bit of info is here:
http://www.kingsmountain.com/ldapRoadmap.shtml [kingsmountain.com]
FYI you can thank the amazing team at University of Michigan for LDAP. Go Blue!
Open Bottom? (Score:2)
Older Java Enterprise System Directory Server (Score:2)
Remember that Java Enterprise System is concurrently developed for Solaris SPARC, Solaris x86, and generic Linux ( and sometimes gets RPMS for the latest stable RH Enterprise). DS 5.1 and before had horrible problems with replication and the Java console was dog sl
Re:Older Java Enterprise System Directory Server (Score:2)
A few months ago, I went to a UUASC-OC meeting about directory services (which happens to be at the Sun office in Irvine, CA) and the main feature that DS 5.2 adds over 5.1 is "push" based updating when there is a change, instead of updating on a fixed schedule.
BSD ? (Score:2)
MacOS Port? (Score:2)
I am currently using OpenLDAP, which is fine if you're willing to make the effort to learn the details and differences of OpenLDAP. Fedora DS would be much easier to manage, extend the schema, etc.
Hey, its iPlanet 5.1 rebranded! (Score:2)
Re:Hey, its iPlanet 5.1 rebranded! (Score:2)
RedHat bought the source from AOL, and actually made some changes. It runs on AS3.0, and multiple master is up to 4 nodes. We're switching from iPlanet to FS 1.0, we have it in Dev now.
I'd like to see this in SuSE (Score:2, Interesting)
good! 1 step closer to an Active Directory killer (Score:2, Insightful)
This project is to LDAP what the Dublin Core is to Zope. It's a common standard that a larger system can be built on (for example, providing complex functionality like Active Directory). Yes, OpenLDAP conforms to the LDAP standard, but a common, standardized LDAP schema that provides a basis for an Active Directory Killer is an even more important standard that everyb
Re:Great (Score:1, Interesting)
You can most likely, I do not see why not!
After all, this is just another example of you Linux people have duplicated/imitated/copied yet another concept from the Windows world so you can do something already doable in Windows!
(This goes on from both sides though - e.g. -> Windows via Terminal Services (ala watered-down licensed technology from Citrix) does what X has been doing for year on UNIX, whi
Re:Great (Score:2)
After all, this is just another example of you Linux people have duplicated/imitated/copied yet another concept from the Windows world so you can do something already doable in Windows!
Not quite. We haven't actually duplicated, as far as I can tell, Active Directory service yet. Samba 4 is trying to do that, I think. I may be wrong about AD not being duplicated yet though.
Either way, Microsoft took LDAP (an established standard which Sun was already gearing up to use for authentication due to the
Re:Java Enterprise System from Sun is better produ (Score:2, Informative)
But does anyone really want an older version that's likely been untouched for years?
Re:Java Enterprise System from Sun is better produ (Score:2)
I think that the Fedora directory Server is late, and it is based on old versions of Netscape Directory Server.
Yes, it is late. Plus I find it disturbing some parts of it have special licensing concerns. And being version 1.0.... hopefully they will write this code out in time.
But it's strengths are that being based on the Netscape server gives it a boost in functionality over Open LDAP. I often wondered why Open LDAP seemed to almost stall in it's development.
So I will still be using Sun One Directo
Re:Java Enterprise System from Sun is better produ (Score:2)
Re:Nice to see (Score:3, Interesting)
Re:Why would anyone want to suffer like this? (Score:2, Interesting)