Path: archiver1.google.com!newsfeed.google.com!newsfeed.stanford.edu!newsfeed.netscape.com!secnews.netscape.com!not-for-mail
From: Kartik Subbarao <kartik_subba...@hp.com>
Newsgroups: netscape.server.directory,netscape.dev.directory,netscape.public.mozilla.directory
Subject: NT pass-through plugin code released on SourceForge
Date: Mon, 20 Aug 2001 13:03:22 -0400
Organization: Another Netscape Collabra Server User
Lines: 60
Message-ID: <3B8142DA.8030105@hp.com>
NNTP-Posting-Host: cn595098-b.newcas1.de.home.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010803
X-Accept-Language: en-us

We're happy to announce version 1.0 of an NT authentication plugin for
iPlanet Directory Server running on Linux and HP-UX. This plugin allows
you to leverage an existing NT domain infrastructure for LDAP
pass-through authentication, saving you the trouble of managing or
synchronizing individual userPassword attributes for each user.

For more information on how the plugin works, see below. You can
download the plugin at:

http://prdownloads.sourceforge.net/dsntauth/ntauth-1.0.tar.gz

The main project page is:

http://sourceforge.net/projects/dsntauth

The code is licensed under the GPL.


We're eager to get feedback, and welcome anyone who is interested in
participating to join the project.

Cheers,

Neil Dunbar and Kartik Subbarao


How it works
============

To illustrate how the plugin works, take the following excerpts from two
entries in an LDAP Directory:

dn: uid=neil_dun...@hp.com, ou=Employees, o=hp.com
cn: Neil Dunbar
uid: neil_dun...@hp.com
ntUserDomainID: EUROPE1:nd

dn: uid=kartik_subba...@hp.com, ou=Employees, o=hp.com
cn: Kartik Subbarao
uid: kartik_subba...@hp.com
ntUserDomainID: ATLANTA2:kssu

When Neil Dunbar binds to the LDAP server with his distinguished name
and password, an authentication request is sent to a domain controller
for the EUROPE1 domain. This request attempts to authenticate the user
"nd" using the password in the LDAP bind request. If the domain
controller replies with a successful response, the bind is allowed,
otherwise it is rejected.

Similarly, when Kartik Subbarao binds to the LDAP server with his
distinguished name and password, a request is sent to a domain
controller for the ATLANTA2 domain to authenticate the user kssu in the
ATLANTA2 domain.

Currently, the plugin is written for iPlanet's Directory Server product.
We are looking at porting it to OpenLDAP as well. The plugin has been
tested extensively on Linux and HP-UX, and is likely to run on most
other Unix platforms as well. As a security measure, binds are only
accepted on port 636 (the standard LDAP/SSL port).

			  SCO's Case Against IBM

November 12, 2003 - Jed Boal from Eyewitness News KSL 5 TV provides an
overview on SCO's case against IBM. Darl McBride, SCO's president and CEO,
talks about the lawsuit's impact and attacks. Jason Holt, student and 
Linux user, talks about the benefits of code availability and the merits 
of the SCO vs IBM lawsuit. See SCO vs IBM.

Note: The materials and information included in these Web pages are not to
be used for any other purpose other than private study, research, review
or criticism.