[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: LDAP + RADIUS + SSL
No, I put this lines:
TLSCipherSuite HIGH:MEDIUM:+SSLv2
TLSCACertificateFile /tmp/ssl2/cacert.pem
TLSCertificateFile /tmp/ssl2/servercert.pem
TLSCertificateKeyFile /tmp/ssl2/serverkey.pem
On Fri, 14 Jan 2005, Samuel Tran wrote:
> Did you specify these two parameters in your ldap.conf file on the
> client side?:
>
> TLS_REQCERT demand
> TLS_CACERT /etc/openldap/certs/cacert.pem
>
> Sam
>
> On Fri, 2005-01-14 at 07:05, Anderson Alves de Albuquerque wrote:
> > I am listing my steps....
> >
> > - I am doing this steps:
> > % openssl req -newkey rsa:1024 -x509 -nodes -out server.pem -keyout server.pem -days 365
> >
> > % mkdir /var/myca
> > % cd /var/myca/
> > % /usr/share/ssl/misc/CA.sh -newca
> >
> > % openssl req -newkey rsa:1024 -nodes -keyout newreq.pem -out newreq.pem
> >
> > % /usr/share/ssl/misc/CA.sh -sign
> >
> > % cp demoCA/cacert.pem /usr/var/openldap-data/cacert.pem
> > % mv newcert.pem /usr/var/openldap-data/servercrt.pem
> > % mv newreq.pem /usr/var/openldap-data/serverkey.pem
> > % chmod 400 /usr/var/openldap-data/serverkey.pem
> >
> >
> >
> > - I created certs to my client:
> > % openssl req -newkey rsa:1024 -nodes -keyout newreq.pem -out newreq.pem
> > % /usr/share/ssl/misc/CA.sh -sign
> >
> > % cp demoCA/cacert.pem /usr/var/openldap-data/cacert.pem
> > % mv newcert.pem /usr/var/openldap-data/servercrt.pem
> > % mv newreq.pem /usr/var/openldap-data/serverkey.pem
> > % chmod 400 /usr/var/openldap-data/serverkey.pem
> >
> >
> > % mv newcert.pem /home/user/certs/ldap.client.pem
> > % mv newreq.pem /home/user/certs/keys/ldap.client.key.pem
> > % chmod 400 /home/user/certs/keys/ldap.client.key.pem
> >
> >
> >
> > - In my slapd.conf:
> > TLSCipherSuite HIGH:MEDIUM:+SSLv2
> > TLSCACertificateFile /tmp/ssl/SSL/cacert.pem
> > TLSCertificateFile /tmp/ssl/SSL/servercrt.pem
> > TLSCertificateKeyFile /tmp/ssl/SSL/serverkey.pem
> >
> >
> >
> > - Im my radiusd.conf:
> > start_tls=no
> > tls_cacertfile = /tmp/ssl/SSL/cacert.pem
> > tls_cacertdir = /tmp/ssl/SSL
> > port=636
> > #tls_certfile = /tmp/ssl/SSL/ldap.client.pem
> > #tls_keyfile = /tmp/ssl/SSL/ldap.client.key.pem
> >
> >
> >
> >
> > - I make a test with this config below:
> > start_tls=no
> > tls_cacertfile = /tmp/ssl/SSL/cacert.pem
> > tls_cacertdir = /tmp/ssl/SSL
> > port=636
> > tls_certfile = /tmp/ssl/SSL/ldap.client.pem
> > tls_keyfile = /tmp/ssl/SSL/ldap.client.key.pem
> >
> >
> >
> >
> >
> >
> >
> >
> > On Fri, 14 Jan 2005, Dieter Kluenter wrote:
> >
> > > Anderson Alves de Albuquerque <anderson@belem.voip.nce.ufrj.br> writes:
> > >
> > > > I use my RADIUS make authentication in LDAP server, but I have a
> > > > problema that I describe below.
> > > >
> > > > I created the certificates with
> > > > http://www.freeradius.org/radiusd/doc/rlm_ldap. And I put in my
> > > > radiusd.conf the configs below, but I have problems.
> > >
> > > [...]
> > > > tls_read: want=5, got=5
> > > > 0000: 15 03 01 00 02 .....
> > > > tls_read: want=2, got=2
> > > > 0000: 02 30 .0
> > > > TLS: can't accept.
> > > > TLS: error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert unknown ca
> > > > /usr/src/secure/lib/libssl/../../../crypto/openssl/ssl/s3_pkt.c:1052
> > > > ^Cslapd shutdown: waiting for 0 threads to terminate
> > > > slapd stopped.
> > >
> > > You did not describe how you created your certificates, but the log
> > > clearly says that the CA is unknown. This is a good document on
> > > creating certificates
> > > http://www.openldap.org/pub/ksoper/OpenLDAP_TLS_howto.html
> > >
> > > -Dieter
> > >
> > >
>
>