[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: overlay chain [RESOLVED]



Emmanuel Dreyfus <manu@netbsd.org> wrote:

> overlay                 chain
> chain-uri               ldaps://ldapmaster.example.net
> chain-idassert-bind     bindmethod=sasl
>                         saslmech=EXTERNAL
>                         binddn="cn=foo"
>                         mode=self
> chain-idassert-authzFrom "*"
> chain-return-error TRUE

> It did work with 2.3 but seems broken in 2.4. The slave accepts the
> client's connexion, but when it attempts to do the modification:
> 
> modifying entry "uid=foo,o=example"
> ldap_modify: Authentication method not supported (7)
> 
> Any hint appreciated

Here is the answer: since 2.4, when slapd acts as a client, certificate
information (key, cert and CA) must be explicitely provided: the server
side settings from TLSCertificateFile, TLSCertificateKeyFile and
TLSCACertificateFile are never used.

So here is the overlay chain configuration that works using x509
certificates for authentication to the LDAP master (binddn is still both
mandatory and ignored)

overlay                 chain
chain-uri               ldaps://ldapmaster.example.net
chain-idassert-bind     bindmethod=sasl
                        saslmech=EXTERNAL
                        binddn="cn=dontcare"
                        tls_cert=/etc/openssl/certs/ldapslave1.crt
                        tls_key=/etc/openssl/private/ldapslave1.key
                        tls_cacert=/etc/openssl/certs/ca.crt
                        tls_reqcert=demand
                        mode=self
chain-idassert-authzFrom "*"
chain-return-error TRUE




-- 
Emmanuel Dreyfus
http://hcpnet.free.fr/pubz
manu@netbsd.org