On 12/13/2011 02:59 PM, rey sebastien wrote:
There's a different between the default config from debian and the OpenLDAP configuration (in .conf or .ldif format). The default config, located in /etc/default/slapd, contains just "daemon start" related options an has nothing to do with the OpenLDAP configuration. If you download OpenLDAP from the debian sources with apt-src, you will get a directory named debian. There are a slapd.conf (OpenLDAP Example Configuration) and a file named slapd.default (Debian start parameters, copy it to /etc/default/slapd), and last: slapd.init copy it to /etc/init.d/slapdLe mar. 13 dÃc. 2011 13:00:16 CET, Raffael Sahli a Ãcrit :On 12/13/2011 12:14 PM, rey sebastien wrote:/home is not really the directory to install an application. Better you use the default path located in /usr/local. And of course you have to create a user named openldap or take your exists openldap user. Start your daemon with this user (@see /etc/default/slapd on debian for the init script, (you have to copy this file from your openldap source installed per apt-src, or use the file from the installed deb package.)) And your ok with the default permissions set by "make install". Only your ssl certificates should be owned by "openldap" and mod 0400.Le mar. 13 dÃc. 2011 11:08:43 CET, Raffael Sahli a Ãcrit :On 12/13/2011 10:12 AM, rey sebastien wrote:After what, you are right, you and other to point the old debian package, so i try to recompile the last release with open-ssl. This is the best solution, i agree.If you load the sources with apt-src, there's a debian init script available in the openldap sources (debian folder, just copy the script into you init.d folder and create the symlinks with update-rc.d). That's the simplest way, or find the script online or extract it from the deb package....I try to compile with this option :./configure --with-tls=openssl --with-threads --with-cyrus-sasl --enable-crypt --enable-debug --enable-cleartext --enable-spasswd --enable-dynacl --enable-aci --enable-modules --enable-wrappers --enable-rewrite --enable-rlookupsAfter configure, i make-depend, make, make install; all execution are ok, after that, how can i install ldap as a service ? like debian style => service slapd start | stop | restart ?Thanks again, Sr Le 12/12/2011 22:17, Raffael Sahli a Ãcrit :On 12.12.2011 21:55, rey sebastien wrote:On Debian: You should compile OpenLDAP with OpenSSL Support and don't use the dpkg package from the debian apt repos...Le 12/12/2011 21:07, Howard Chu a Ãcrit :IMHO i know this problem but i think this is better than nothing, and actually i have nothing. I wait for valid certificate... And sorry but your RTFM answer doesn't help me to resolve this problem with gnutls and debian, i take many hours to find a valid solution in my use case, and the manual doesn't help me particulary on this point.rey sebastien wrote:Le 12/12/2011 19:24, Howard Chu a Ãcrit :It true and false, with debian and openLdap compiled with GnuTLS (my case), ireyman wrote:You have a self signed certificate,Correct.so you don't need to verify your certificate.When you activate the tls on ldap, you only need this two lines, and you don't need the line with certificate verification*olcTLSCACertificateFile : *Wrong.read this documentation : http://wiki.debian.org/LDAP/OpenLDAPSetup and they said :Pure garbage.Procedure: You're going to need the gnutls certificate generator: certtool<http://www.gnu.org/software/gnutls/manual/html_node/Invoking-certtool.html>.Run these two commands to generate a new self-signed key (into the currentworking directory): certtool --generate-privkey --outfile ca-key.pemcerttool --generate-self-signed --load-privkey ca-key.pem --outfile ca-cert.pemThen, update your certificate locations in /etc/ldap/slapd.conf(TLSCertificateFile points to ca-cert.pem and TLSCertificateKeyFile points to ca-key.pem), *comment out TLSCACertificateFile*, and change *TLSVerifyClientto never.*In /etc/ldap/ldap.conf, comment out TLS_CACERT and change TLS_REQCERT to never.This is utterly bogus. Turning off these checks disables any spoofing detection; you might as well run without TLS at all.>In /etc/ldap/ldap.conf, comment out TLS_CACERT and change TLS_REQCERT to never.Like Howard Chu said, bad idea, just for testing or what else.....OpenLdap is a great software, but documentation it's a little "cryptic" for beginner like me, so i think it's easy to be rude with beginner on many points.Best regards, SR.Since the certificate is self-signed, we can't have gnutls trying to verify it(hence the never), otherwise it will never run.And RTFM is a little violent, i try to help with my little experience, i'm notan expert for sure.RTFM is exactly the correct response.Best regards, SR.RTFM. http://www.openldap.org/doc/admin24/tls.htmlOn Mon, Dec 12, 2011 at 12:31 PM, Jayavant Patil <email@example.com<mailto:firstname.lastname@example.org>> wrote: Hi, >On Mon, Dec 12, 2011 at 4:19 PM, reyman <email@example.com <mailto:firstname.lastname@example.org>> wrote: >With the option -ZZ i think, try this |>ldapsearch -x -LLL -ZZ -d 150|Yeah, It shows output containing ber_dump, ldap_write,ldap_read,tls_write, tls_read etc. But at the end is shows the following: TLS certificate verification: Error, self signed certificateTLS: can't connect: error:14090086:SSL routines:SSL3_GET_SERVER_ CERTIFICATE:certificate verify failed (self signed certificate).ldap_start_tls: Connect error (-11) additional info: error:14090086:SSLroutines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed (selfsigned certificate) Why it shows an error ? and how to resolve this? and when I do ldapsearch with -ZZ option it gives error $ldapsearch -x -v -D "cn=root,dc=abc,dc=com" -w cluster -b "ou=People,dc=abc,dc=com" "uid=ldap_6" -h n0 -ZZ ldap_initialize( ldap://n0 ) ldap_start_tls: Connect error (-11) additional info: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed >On Mon, Dec 12, 2011 at 11:21 AM, Jayavant Patil<email@example.com <mailto:firstname.lastname@example.org>> wrote:>>Hi, >> I am using openldap-2.4.19-4.x86_64 on fedora 12 machine. I have enabled openldap SSL/TLS. How do I know >>(test) that I am using SSL/TLS connections instead of normal ldap:///?OK thanks, i find the script and re-configure the script,I search another information to make a good fresh install. After removing the debian package, i have an openldap user and group, Do you think i can delete this user, or it's better to reuse it for better security, for example can i install all files for ldap into /home/openldap user ( with --prefix option equal to /home/openldap ) ? Do you have a list/tutorial which indicate the files which need an openldap:openldap user to execute ?Thanks, Best regards, SR.There is some modification between the old version i use and the last release, i don't find the slapd file which contain information like :SLAPD_SERVICES, etc.Replacement for this file is slapd.ldif ? This file is an example of configuration, or the default loaded configuration when slapd daemon start ?
i have no man for slapd.d, it's a bug, or it doesn't exist ? Thanks, SR.
-- Raffael Sahli email@example.com Switzerland