Re: nslcd: passwords in clear text even if TLS is configured
[Date Prev][Date Next] [Thread Prev][Thread Next]Re: nslcd: passwords in clear text even if TLS is configured
- From: Andrea Sighinolfi <andrea.sighinolfi [at] sitti.it>
- To: nss-pam-ldapd-users [at] lists.arthurdejong.org
- Subject: Re: nslcd: passwords in clear text even if TLS is configured
- Date: Mon, 7 Mar 2022 12:04:56 +0100
Hi Arthur,
after a login, this is the complete output of the "nslcd -d" command:
sitti>~ #nslcd -d
nslcd: DEBUG: NSS_LDAP nss-pam-ldapd 0.9.12
nslcd: DEBUG: ldap_set_option(LDAP_OPT_X_TLS_REQUIRE_CERT,demand)
nslcd: DEBUG:
ldap_set_option(LDAP_OPT_X_TLS_CACERTFILE,"/rwfs/ca/ca.crt")
nslcd: DEBUG: CFG: threads 5
nslcd: DEBUG: CFG: uid root
nslcd: DEBUG: CFG: gid 0
nslcd: DEBUG: CFG: uri ldap://nodo-1.labsecurity.local
nslcd: DEBUG: CFG: ldap_version 3
nslcd: DEBUG: CFG: base dc=labsecurity,dc=local
nslcd: DEBUG: CFG: scope sub
nslcd: DEBUG: CFG: deref never
nslcd: DEBUG: CFG: referrals yes
nslcd: DEBUG: CFG: filter aliases (objectClass=nisMailAlias)
nslcd: DEBUG: CFG: filter ethers (objectClass=ieee802Device)
nslcd: DEBUG: CFG: filter group (objectClass=posixGroup)
nslcd: DEBUG: CFG: filter hosts (objectClass=ipHost)
nslcd: DEBUG: CFG: filter netgroup (objectClass=nisNetgroup)
nslcd: DEBUG: CFG: filter networks (objectClass=ipNetwork)
nslcd: DEBUG: CFG: filter passwd (objectClass=posixAccount)
nslcd: DEBUG: CFG: filter protocols (objectClass=ipProtocol)
nslcd: DEBUG: CFG: filter rpc (objectClass=oncRpc)
nslcd: DEBUG: CFG: filter services (objectClass=ipService)
nslcd: DEBUG: CFG: filter shadow (objectClass=shadowAccount)
nslcd: DEBUG: CFG: map group userPassword "*"
nslcd: DEBUG: CFG: map passwd gecos "${gecos:-$cn}"
nslcd: DEBUG: CFG: map shadow shadowLastChange
"${shadowLastChange:--1}"
nslcd: DEBUG: CFG: map shadow shadowMin "${shadowMin:--1}"
nslcd: DEBUG: CFG: map shadow shadowMax "${shadowMax:--1}"
nslcd: DEBUG: CFG: map shadow shadowWarning "${shadowWarning:--1}"
nslcd: DEBUG: CFG: map shadow shadowInactive
"${shadowInactive:--1}"
nslcd: DEBUG: CFG: map shadow shadowExpire "${shadowExpire:--1}"
nslcd: DEBUG: CFG: map shadow shadowFlag "${shadowFlag:-0}"
nslcd: DEBUG: CFG: pam_authc_ppolicy yes
nslcd: DEBUG: CFG: bind_timelimit 10
nslcd: DEBUG: CFG: timelimit 0
nslcd: DEBUG: CFG: idle_timelimit 0
nslcd: DEBUG: CFG: reconnect_sleeptime 1
nslcd: DEBUG: CFG: reconnect_retrytime 10
nslcd: DEBUG: CFG: ssl start_tls
nslcd: DEBUG: CFG: tls_reqcert demand
nslcd: DEBUG: CFG: tls_cacertfile /rwfs/ca/ca.crt
nslcd: DEBUG: CFG: tls_reqsan allow
nslcd: DEBUG: CFG: tls_crlcheck none
nslcd: DEBUG: CFG: pagesize 0
nslcd: DEBUG: CFG: nss_min_uid 0
nslcd: DEBUG: CFG: nss_uid_offset 0
nslcd: DEBUG: CFG: nss_gid_offset 0
nslcd: DEBUG: CFG: nss_nested_groups no
nslcd: DEBUG: CFG: nss_getgrent_skipmembers no
nslcd: DEBUG: CFG: nss_disable_enumeration no
nslcd: DEBUG: CFG: validnames /^[a-z0-9._@$()]([a-z0-9._@$()
\~-]*[a-z0-9._@$()~-])?$/i
nslcd: DEBUG: CFG: ignorecase no
nslcd: DEBUG: CFG: pam_authc_search BASE
nslcd: DEBUG: CFG: cache dn2uid 15m 15m
nslcd: version 0.9.12 starting
nslcd: DEBUG: initgroups("root",0) done
nslcd: DEBUG: setgid(0) done
nslcd: DEBUG: setuid(0) done
nslcd: DEBUG: unlink() of /var/run/nslcd/socket failed (ignored):
No such file or directory
nslcd: accepting connections
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [7b23c6] DEBUG: connection from pid=1686 uid=0 gid=0
nslcd: [7b23c6] <passwd="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_initialize(ldap://nodo-1.labsecurity.local)
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_rebind_proc()
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,0)
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,10)
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,10)
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [7b23c6] <passwd="test"> DEBUG: ldap_start_tls_s()
nslcd: [7b23c6] <passwd="test"> DEBUG:
ldap_simple_bind_s(NULL,NULL)
(uri="ldap://nodo-1.labsecurity.local")
nslcd: [7b23c6] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [7b23c6] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [7b23c6] <passwd="test"> DEBUG: ldap_result(): end of
results (2 total)
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [3c9869] DEBUG: connection from pid=1686 uid=0 gid=0
nslcd: [3c9869] <passwd="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_initialize(ldap://nodo-1.labsecurity.local)
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_rebind_proc()
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,0)
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,10)
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,10)
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [3c9869] <passwd="test"> DEBUG: ldap_start_tls_s()
nslcd: [3c9869] <passwd="test"> DEBUG:
ldap_simple_bind_s(NULL,NULL)
(uri="ldap://nodo-1.labsecurity.local")
nslcd: [3c9869] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [3c9869] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [3c9869] <passwd="test"> DEBUG: ldap_result(): end of
results (2 total)
nslcd: [334873] DEBUG: connection from pid=1686 uid=0 gid=0
nslcd: [334873] <passwd="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [334873] <passwd="test"> DEBUG:
ldap_initialize(ldap://nodo-1.labsecurity.local)
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_rebind_proc()
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,0)
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,10)
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,10)
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [334873] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [334873] <passwd="test"> DEBUG: ldap_start_tls_s()
nslcd: [334873] <passwd="test"> DEBUG:
ldap_simple_bind_s(NULL,NULL)
(uri="ldap://nodo-1.labsecurity.local")
nslcd: [334873] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [334873] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [334873] <passwd="test"> DEBUG: ldap_result(): end of
results (2 total)
nslcd: [b0dc51] DEBUG: connection from pid=1686 uid=0 gid=0
nslcd: [b0dc51] <passwd="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_initialize(ldap://nodo-1.labsecurity.local)
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_rebind_proc()
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,3)
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_DEREF,0)
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMELIMIT,0)
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_TIMEOUT,10)
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,10)
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_REFERRALS,LDAP_OPT_ON)
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_set_option(LDAP_OPT_RESTART,LDAP_OPT_ON)
nslcd: [b0dc51] <passwd="test"> DEBUG: ldap_start_tls_s()
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [b0dc51] <passwd="test"> DEBUG:
ldap_simple_bind_s(NULL,NULL)
(uri="ldap://nodo-1.labsecurity.local")
nslcd: [b0dc51] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [b0dc51] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [b0dc51] <passwd="test"> DEBUG: ldap_result(): end of
results (2 total)
nslcd: [495cff] DEBUG: connection from pid=1686 uid=0 gid=0
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [495cff] <passwd="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [495cff] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [495cff] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [495cff] <passwd="test"> DEBUG: ldap_result(): end of
results (2 total)
nslcd: [e8944a] DEBUG: connection from pid=1686 uid=0 gid=0
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [e8944a] <passwd="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [e8944a] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [e8944a] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [e8944a] <passwd="test"> DEBUG: ldap_result(): end of
results (2 total)
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [5558ec] DEBUG: connection from pid=1686 uid=0
gid=736400013
nslcd: [5558ec] <group/member="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [5558ec] <group/member="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [5558ec] <group/member="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixGroup)(|(memberUid=test)(member=uid=test,cn=users,cn=compat,dc=labsecurity,dc=local)))")
nslcd: [5558ec] <group/member="test"> DEBUG: ldap_result():
cn=admins,cn=groups,cn=compat,dc=labsecurity,dc=local
nslcd: [5558ec] <group/member="test"> DEBUG: ldap_result():
end of results (1 total)
nslcd: [8e1f29] DEBUG: connection from pid=1687 uid=736400013
gid=736400013
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [8e1f29] <passwd="test"> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uid=test))")
nslcd: [8e1f29] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [8e1f29] <passwd="test"> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [8e1f29] <passwd="test"> DEBUG: ldap_result(): end of
results (2 total)
nslcd: DEBUG: accept() failed (ignored): Resource temporarily
unavailable
nslcd: [e87ccd] DEBUG: connection from pid=1687 uid=736400013
gid=736400013
nslcd: [e87ccd] <passwd=736400013> DEBUG:
myldap_search(base="dc=labsecurity,dc=local",
filter="(&(objectClass=posixAccount)(uidNumber=736400013))")
nslcd: [e87ccd] <passwd=736400013> DEBUG: ldap_result():
uid=test,cn=users,cn=compat,dc=labsecurity,dc=local
nslcd: [e87ccd] <passwd=736400013> DEBUG: ldap_result():
uid=test,cn=users,cn=accounts,dc=labsecurity,dc=local
nslcd: [e87ccd] <passwd=736400013> DEBUG: ldap_result(): end
of results (2 total)
-------------------
I still can see the password in clear text.
Can you give a hint please?
Thank you in advance.
Andrea
Hi Artur,
the line
"ldap_start_tls_s()"is not prensent. The nslcd -d command gives the following output:
sitti>~ #nslcd -d
nslcd: DEBUG: NSS_LDAP nss-pam-ldapd 0.9.12
nslcd: DEBUG: ldap_set_option(LDAP_OPT_X_TLS_REQUIRE_CERT,demand)
nslcd: DEBUG: ldap_set_option(LDAP_OPT_X_TLS_CACERTFILE,"/rwfs/ca/ca.crt")
nslcd: DEBUG: CFG: threads 5
nslcd: DEBUG: CFG: uid root
nslcd: DEBUG: CFG: gid 0
nslcd: DEBUG: CFG: uri ldap://nodo-1.labsecurity.local
nslcd: DEBUG: CFG: ldap_version 3
nslcd: DEBUG: CFG: base dc=labsecurity,dc=local
nslcd: DEBUG: CFG: scope sub
nslcd: DEBUG: CFG: deref never
nslcd: DEBUG: CFG: referrals yes
nslcd: DEBUG: CFG: filter aliases (objectClass=nisMailAlias)
nslcd: DEBUG: CFG: filter ethers (objectClass=ieee802Device)
nslcd: DEBUG: CFG: filter group (objectClass=posixGroup)
nslcd: DEBUG: CFG: filter hosts (objectClass=ipHost)
nslcd: DEBUG: CFG: filter netgroup (objectClass=nisNetgroup)
nslcd: DEBUG: CFG: filter networks (objectClass=ipNetwork)
nslcd: DEBUG: CFG: filter passwd (objectClass=posixAccount)
nslcd: DEBUG: CFG: filter protocols (objectClass=ipProtocol)
nslcd: DEBUG: CFG: filter rpc (objectClass=oncRpc)
nslcd: DEBUG: CFG: filter services (objectClass=ipService)
nslcd: DEBUG: CFG: filter shadow (objectClass=shadowAccount)
nslcd: DEBUG: CFG: map group userPassword "*"
nslcd: DEBUG: CFG: map passwd gecos "${gecos:-$cn}"
nslcd: DEBUG: CFG: map shadow shadowLastChange "${shadowLastChange:--1}"
nslcd: DEBUG: CFG: map shadow shadowMin "${shadowMin:--1}"
nslcd: DEBUG: CFG: map shadow shadowMax "${shadowMax:--1}"
nslcd: DEBUG: CFG: map shadow shadowWarning "${shadowWarning:--1}"
nslcd: DEBUG: CFG: map shadow shadowInactive "${shadowInactive:--1}"
nslcd: DEBUG: CFG: map shadow shadowExpire "${shadowExpire:--1}"
nslcd: DEBUG: CFG: map shadow shadowFlag "${shadowFlag:-0}"
nslcd: DEBUG: CFG: pam_authc_ppolicy yes
nslcd: DEBUG: CFG: bind_timelimit 10
nslcd: DEBUG: CFG: timelimit 0
nslcd: DEBUG: CFG: idle_timelimit 0
nslcd: DEBUG: CFG: reconnect_sleeptime 1
nslcd: DEBUG: CFG: reconnect_retrytime 10
nslcd: DEBUG: CFG: ssl start_tls
nslcd: DEBUG: CFG: tls_reqcert demand
nslcd: DEBUG: CFG: tls_cacertfile /rwfs/ca/ca.crt
nslcd: DEBUG: CFG: tls_reqsan allow
nslcd: DEBUG: CFG: tls_crlcheck none
nslcd: DEBUG: CFG: pagesize 0
nslcd: DEBUG: CFG: nss_min_uid 0
nslcd: DEBUG: CFG: nss_uid_offset 0
nslcd: DEBUG: CFG: nss_gid_offset 0
nslcd: DEBUG: CFG: nss_nested_groups no
nslcd: DEBUG: CFG: nss_getgrent_skipmembers no
nslcd: DEBUG: CFG: nss_disable_enumeration no
nslcd: DEBUG: CFG: validnames /^[a-z0-9._@$()]([a-z0-9._@$() \~-]*[a-z0-9._@$()~-])?$/i
nslcd: DEBUG: CFG: ignorecase no
nslcd: DEBUG: CFG: pam_authc_search BASE
nslcd: DEBUG: CFG: cache dn2uid 15m 15m
nslcd: version 0.9.12 starting
nslcd: DEBUG: initgroups("root",0) done
nslcd: DEBUG: setgid(0) done
nslcd: DEBUG: setuid(0) done
nslcd: DEBUG: unlink() of /var/run/nslcd/socket failed (ignored): No such file or directory
nslcd: accepting connections
As I wrote before, in the nslcd.conf file I set the following parameters:
ssl start_tls
tls_reqcert demand
tls_cacertfile /rwfs/ca/ca.crt
Can you please help me to point in the right direction?
Thank you.
Andrea
Il 05/03/2022 13:36, Arthur de Jong ha scritto:
Hi Andrea, Thanks for reporting this. On Thu, 2022-03-03 at 12:39 +0100, Andrea Sighinolfi wrote:The problem is that if I monitor the packet with a packet sniffer (Wireshark), I can see a simple bindRequest with the user password in clear text is performed before starting to communicate with TLS.Can you start nslcd manually as "nslcd -d" and report the authentication part of the output? I would expect a "ldap_start_tls_s()" line to be present in the output. Can you also report the fist bit that dumps the config? Kind regards,--
Ing. Andrea Sighinolfi
R&D
SITTI S.p.A.
Via Cadorna, 73
20055 Vimodrone (MI) - ITALY
Phone +39.02.2507121
Mobile +39.xxxxxxxxxEmail: andrea.sighinolfi [at] sitti.it
Website: www.sitti.it
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
IT: Questo messaggio viene inviato in osservanza al Reg. UE 2016/679. Le ricordiamo che in qualunque momento potrà esercitare i diritti ivi previsti, tra i quali il diritto di conoscere e/o accedere ai dati personali, chiederne la rettifica e l’aggiornamento, chiederne la cancellazione qualora la raccolta sia avvenuta in violazione di legge o regolamento, nonché il diritto di opporsi al trattamento per motivi legittimi e specifici. Potrà inoltre chiedere la trasformazione in forma anonima dei dati personali ed il blocco dell’uso degli stessi ai fini di invio di materiale pubblicitario o vendita diretta o per il compimento di ricerche di mercato o comunicazione commerciale. Per esercitare tali diritti, contattare il titolare del trattamento dei dati: S.I.T.T.I. SpA - Via Cadorna 73 - 20090 Vimodrone (MI) - tel.022507121 - email sitti [at] sitti.it EN: This message is sent in compliance with EU Reg. 2016/679. We remind you that at any time you can exercise your rights therein, including the right to know and/or access personal data, to request their rectification and updating, to request their cancellation if the collection occurred in violation of the law or regulation , as well as the right to oppose the processing for legitimate and specific reasons. You may also request the transformation of personal data into anonymous form and the blocking of sending advertising material or direct sales or for carrying out market research or commercial communication. To exercise these rights, contact S.I.T.T.I. SpA - Via Cadorna 73 - 20090 Vimodrone (MI) - tel.022507121 - email sitti [at] sitti.it
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ing. Andrea Sighinolfi
R&D
SITTI
S.p.A.
Via Cadorna, 73
20055 Vimodrone (MI) - ITALY
Phone +39.02.2507121
Mobile +39.xxxxxxxxx
Email: andrea.sighinolfi [at] sitti.it
Website: www.sitti.it
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
IT: Questo messaggio viene inviato in osservanza al Reg. UE 2016/679. Le ricordiamo che in qualunque momento potrà esercitare i diritti ivi previsti, tra i quali il diritto di conoscere e/o accedere ai dati personali, chiederne la rettifica e l’aggiornamento, chiederne la cancellazione qualora la raccolta sia avvenuta in violazione di legge o regolamento, nonché il diritto di opporsi al trattamento per motivi legittimi e specifici. Potrà inoltre chiedere la trasformazione in forma anonima dei dati personali ed il blocco dell’uso degli stessi ai fini di invio di materiale pubblicitario o vendita diretta o per il compimento di ricerche di mercato o comunicazione commerciale. Per esercitare tali diritti, contattare il titolare del trattamento dei dati: S.I.T.T.I. SpA - Via Cadorna 73 - 20090 Vimodrone (MI) - tel.022507121 - email sitti [at] sitti.it EN: This message is sent in compliance with EU Reg. 2016/679. We remind you that at any time you can exercise your rights therein, including the right to know and/or access personal data, to request their rectification and updating, to request their cancellation if the collection occurred in violation of the law or regulation , as well as the right to oppose the processing for legitimate and specific reasons. You may also request the transformation of personal data into anonymous form and the blocking of sending advertising material or direct sales or for carrying out market research or commercial communication. To exercise these rights, contact S.I.T.T.I. SpA - Via Cadorna 73 - 20090 Vimodrone (MI) - tel.022507121 - email sitti [at] sitti.it
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
- nslcd: passwords in clear text even if TLS is configured,
Andrea Sighinolfi
- Re: nslcd: passwords in clear text even if TLS is configured,
Arthur de Jong
- Re: nslcd: passwords in clear text even if TLS is configured,
Andrea Sighinolfi
- Re: nslcd: passwords in clear text even if TLS is configured, Andrea Sighinolfi
- Re: nslcd: passwords in clear text even if TLS is configured,
Arthur de Jong
- Re: nslcd: passwords in clear text even if TLS is configured,
Andrea Sighinolfi
- nslcd.conf: bindpw not in clear text?, Andrea Sighinolfi
- Re: nslcd.conf: bindpw not in clear text?, Arthur de Jong
- Re: nslcd: passwords in clear text even if TLS is configured,
Andrea Sighinolfi
- Re: nslcd: passwords in clear text even if TLS is configured,
Andrea Sighinolfi
- Re: nslcd: passwords in clear text even if TLS is configured,
Arthur de Jong
- Prev by Date: Re: nslcd: passwords in clear text even if TLS is configured
- Next by Date: Re: nslcd: passwords in clear text even if TLS is configured
- Previous by thread: Re: nslcd: passwords in clear text even if TLS is configured
- Next by thread: Re: nslcd: passwords in clear text even if TLS is configured