[Date Prev][Date Next] [Chronological] [Thread] [Top]

a problem with centralized authentication using openLDAP

Hi everyone,

I am trying to set up and openLDAP server for centralized
authentication. I used self-signed certificate and put the generated
server.pem file in the slapd.conf, then i checked it using the
following command:
$openssl s_client -connect localhost:636 -showcerts
and i got :
Verify return code: 18 (self signed certificate)
which, as i read, indicates that things fine with the server.
Next, i tired:
$ldapsearch -x "uid=user1"
and i got :
# extended LDIF
# LDAPv3
# base <> with scope subtree
# filter: uid=user1
# requesting: ALL

# search result
search: 2
result: 0 Success

# numResponses: 1
Even though there's an entry with that uid, so i ran slapd in the
debug mode 9 using this command:
$/usr/sbin/slapd -d9 -h "ldap:/// ldaps:///" 1>/var/log/ldaplog 2>&1
and i did the ldapsearch again and got this from the log:
TLS trace:SSL_accept:error in SSLv3 read client certificate A
commection_read(14): unable to get TLS client DN, error=49 id=6
connection_read(14): input error=-2 id=6, closing.

I thought the error seen in the log could be related to the fact that
i didn't do anything on the client side to give it a certificate, so i
assigned the same server.pem file to the client in the
/etc/openldap/ldap.conf file as follows:
TLS_CACERT  /etc/openldap/server.pem
and issued the ldapsearch command again, and i got this:
ldap_bind: Can't contact LDAP server (-1)
additional info: TLS: hostname does not match CN in peer certificate.

I am stuck here and don't know what to do, can any one help, please ?!