|Emmanuel Dreyfus||Jul 23, 2007 6:50 am|
|Quanah Gibson-Mount||Jul 23, 2007 11:01 am|
|Emmanuel Dreyfus||Jul 23, 2007 1:09 pm|
|Quanah Gibson-Mount||Jul 23, 2007 1:18 pm|
|Russ Allbery||Jul 23, 2007 4:35 pm|
|Christopher Cowart||Jul 23, 2007 7:40 pm|
|Howard Chu||Jul 23, 2007 9:58 pm|
|Emmanuel Dreyfus||Jul 24, 2007 1:02 am|
|Howard Chu||Jul 24, 2007 1:54 am|
|Emmanuel Dreyfus||Jul 24, 2007 12:18 pm|
|Quanah Gibson-Mount||Jul 25, 2007 8:52 am|
|Emmanuel Dreyfus||Jul 25, 2007 9:06 am|
|Quanah Gibson-Mount||Jul 25, 2007 9:47 am|
|Michael Ströder||Jul 25, 2007 9:53 am|
|Emmanuel Dreyfus||Jul 25, 2007 10:36 am|
|Quanah Gibson-Mount||Jul 25, 2007 10:46 am|
|Howard Chu||Jul 25, 2007 2:31 pm|
|Michael Ströder||Jul 25, 2007 2:38 pm|
|Howard Chu||Jul 25, 2007 2:44 pm|
|Russ Allbery||Jul 25, 2007 2:45 pm|
|Norman Gaywood||Jul 25, 2007 3:04 pm|
|Emmanuel Dreyfus||Jul 25, 2007 8:30 pm|
|Emmanuel Dreyfus||Jul 25, 2007 8:31 pm|
|Howard Chu||Jul 25, 2007 11:17 pm|
|Ralf Haferkamp||Jul 26, 2007 1:27 am|
|Emmanuel Dreyfus||Jul 26, 2007 4:04 am|
|Emmanuel Dreyfus||Jul 26, 2007 4:04 am|
|Donn Cave||Jul 26, 2007 9:38 am|
|Ralf Haferkamp||Jul 26, 2007 11:46 am|
|Howard Chu||Jul 27, 2007 2:13 am|
|Subject:||Re: failover config: servers with same DNS address and TLS, subjectAltName extension|
|From:||Howard Chu (hy...@symas.com)|
|Date:||Jul 24, 2007 1:54:00 am|
Emmanuel Dreyfus wrote:
On Mon, Jul 23, 2007 at 09:58:37PM -0700, Howard Chu wrote:
# Cannot get this working! #TLS_CRLCHECK peer
This only works with recent OpenSSL 0.9.8 releases. You didn't mention which version of OpenSSL you're using. And since this entire subject is purely an OpenSSL matter and not an LDAP matter, that's a pretty key piece of information.
I used 0.9.7d. That information (a minimal version of OpenSSL is required for it to work) is quite important. Where was I supposed to find it? I've lost a few hours trying to get CRLworking, I'd have been better reading the right document.
When you run OpenLDAP's configure script you will see:
checking OpenSSL library version (CRL checking capability)... no
indicating that your OpenSSL library doesn't support it. Otherwise I suppose you would see in your OpenSSL release notes/docs.
Install ca.crt and srv1.crt (srv2.crt) on srv1 (srv2), and configure slapd, with this in slapd.conf: TLSCertificateFile /etc/openssl/certs/srv1.crt TLSCertificateKeyFile /etc/openssl/private/srv1.key TLSCACertificateFile /etc/openssl/certs/ca.crt TLSVerifyClient allow sasl-secprops none
Setting "sasl-secprops none" is never a good idea. Why did you put this here?
I have users using plaintext login/password through TLS. Those are validated through SASL. As I understood, using plaintext password requires "sasl-secprops none", is that wrong?
No, that's not what it does. It turns off all security requirements in the SASL layer, allowing all insecure mechanisms to be used. A rather big mistake, after you've gone to the trouble of enabling secure authentication with certificates.
In my setup, the syncrepl consumer uses certificate and gets sensitive information such as userPassword. Users can use plaintext password over TLS and cannot get password hashes. Is it that odd?
You posted your email as if it was a general solution for anybody trying to solve the aliased server name problem for TLS certificates. This part of your config is not part of that general solution, it is specific to your deployment. In particular, the sasl-secprops setting is a global option and affects all connections, whether they use TLS or not. As such, you are allowing users to use login/plain over cleartext connections as well as TLS connections. You might have taken precautions against this in the other parts of your slapd.conf (using the security directive) but you didn't indicate those precautions anywhere in what you posted. So you will mislead anyone following your advice into leaving their servers quite vulnerable.
If you've actually got information in your directory that you've gone to the trouble of protecting with TLS, you should never allow plaintext authentication mechanisms. Use CRAM-MD5 at least.