[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: SSL/TLS testing

On 12/13/2011 10:12 AM, rey sebastien wrote:
After what, you are right, you and other to point the old debian package, so i try to recompile the last release with open-ssl. This is the best solution, i agree.

I try to compile with this option :
./configure --with-tls=openssl --with-threads --with-cyrus-sasl --enable-crypt --enable-debug --enable-cleartext --enable-spasswd --enable-dynacl --enable-aci --enable-modules --enable-wrappers --enable-rewrite --enable-rlookups

After configure, i make-depend, make, make install; all execution are ok,
after that, how can i install ldap as a service ? like debian style => service slapd start | stop | restart ?

If you load the sources with apt-src, there's a debian init script available in the openldap sources (debian folder, just copy the script into you init.d folder and create the symlinks with update-rc.d). That's the simplest way, or find the script online or extract it from the deb package....

Thanks again,

Le 12/12/2011 22:17, Raffael Sahli a écrit :
On 12.12.2011 21:55, rey sebastien wrote:
Le 12/12/2011 21:07, Howard Chu a écrit :
rey sebastien wrote:
Le 12/12/2011 19:24, Howard Chu a écrit :
reyman wrote:
You have a self signed certificate,


so you don't need to verify your certificate.
When you activate the tls on ldap, you only need this two lines, and you don't need the line with certificate verification*olcTLSCACertificateFile : *

It true and false, with debian and openLdap compiled with GnuTLS (my case), i
read this documentation :
http://wiki.debian.org/LDAP/OpenLDAPSetup and they said :

Pure garbage.


You're going to need the gnutls certificate generator: certtool

Run these two commands to generate a new self-signed key (into the current
working directory):

certtool --generate-privkey --outfile ca-key.pem
certtool --generate-self-signed --load-privkey ca-key.pem --outfile ca-cert.pem

Then, update your certificate locations in /etc/ldap/slapd.conf
(TLSCertificateFile points to ca-cert.pem and TLSCertificateKeyFile points to ca-key.pem), *comment out TLSCACertificateFile*, and change *TLSVerifyClient
to never.*

In /etc/ldap/ldap.conf, comment out TLS_CACERT and change TLS_REQCERT to never.

This is utterly bogus. Turning off these checks disables any spoofing detection; you might as well run without TLS at all.

IMHO i know this problem but i think this is better than nothing, and actually i have nothing. I wait for valid certificate... And sorry but your RTFM answer doesn't help me to resolve this problem with gnutls and debian, i take many hours to find a valid solution in my use case, and the manual doesn't help me particulary on this point.

On Debian: You should compile OpenLDAP with OpenSSL Support and don't use the dpkg package from the debian apt repos...

>In /etc/ldap/ldap.conf, comment out TLS_CACERT and change TLS_REQCERT to never.
Like Howard Chu said, bad idea, just for testing or what else.....

OpenLdap is a great software, but documentation it's a little "cryptic" for beginner like me, so i think it's easy to be rude with beginner on many points.

Best regards,
Since the certificate is self-signed, we can't have gnutls trying to verify it
(hence the never), otherwise it will never run.

And RTFM is a little violent, i try to help with my little experience, i'm not
an expert for sure.

RTFM is exactly the correct response.

Best regards,



On Mon, Dec 12, 2011 at 12:31 PM, Jayavant Patil <jayavant.patil82@gmail.com
<mailto:jayavant.patil82@gmail.com>> wrote:


>On Mon, Dec 12, 2011 at 4:19 PM, reyman <reyman64@gmail.com
<mailto:reyman64@gmail.com>> wrote:

>With the option -ZZ i think, try this

|>ldapsearch -x -LLL -ZZ -d 150|

Yeah, It shows output containing ber_dump, ldap_write,ldap_read,
tls_write, tls_read etc. But at the end is shows the following:

TLS certificate verification: Error, self signed certificate
TLS: can't connect: error:14090086:SSL routines:SSL3_GET_SERVER_
CERTIFICATE:certificate verify failed (self signed certificate).
ldap_start_tls: Connect error (-11)
additional info: error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed (self
signed certificate)

Why it shows an error ? and how to resolve this?

and when I do ldapsearch with -ZZ option it gives error

$ldapsearch -x -v -D "cn=root,dc=abc,dc=com" -w cluster -b
"ou=People,dc=abc,dc=com" "uid=ldap_6" -h n0 -ZZ
ldap_initialize( ldap://n0 )
ldap_start_tls: Connect error (-11)
additional info: error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed

>On Mon, Dec 12, 2011 at 11:21 AM, Jayavant Patil
<jayavant.patil82@gmail.com <mailto:jayavant.patil82@gmail.com>> wrote:


>> I am using openldap-2.4.19-4.x86_64 on fedora 12 machine. I
have enabled openldap SSL/TLS. How do I know >>(test) that I am
using SSL/TLS connections instead of normal ldap:///?

Raffael Sahli