[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: ldapi without TLS and ldap with TLS?
- To: Patrick Lists <openldap-list@puzzled.xs4all.nl>
- Subject: Re: ldapi without TLS and ldap with TLS?
- From: Philip Guenther <guenther+ldaptech@sendmail.com>
- Date: Sun, 17 Feb 2013 22:16:48 -0800
- Cc: openldap-technical@openldap.org
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sendmail.com; s=tls.dkim; t=1361168244; bh=DYVBXTK5OHaKT9K7ZfpYyZu4Tcy/PyAuxESnQfYbMrM=; h=Date:From:To:cc:Subject:In-Reply-To:Message-ID:References: MIME-Version:Content-Type; b=BnbJyoNBSQhzrwAduzdSLgHUH2Ll+h/kiIHlj9LfYqGbZzIQEfS4vWHniw9Rr4as/ KeRGylqRnRD55BGmwmP+yglTQqwWHaQf50287915spKllQPQWJZt3dmb+oH8sjYd7d wIqe6n8pbvqVuIxr//37mQbpWU/AA1YFjakDAUog=
- In-reply-to: <5121A24B.40603@puzzled.xs4all.nl>
- References: <5121A24B.40603@puzzled.xs4all.nl>
- User-agent: Alpine 2.03 (BSO 1266 2009-07-14)
On Mon, 18 Feb 2013, Patrick Lists wrote:
> I'm tying achieve the following with OpenLDAP RE24 from last week:
>
> Connections on ldapi:/// are plain text and ldap connections require TLS
> with client cert auth.
Perhaps it would be help if you started by answering, at least for
yourself, what problem you're trying to solve. For example, "prevent
passwords from being sent on physical networks in the clear or under a
symmetric cipher of fewer than 256bits"
(I use that example because it's a plausible match for what you
describe...and it's impossible to achieve.)
Until you describe *why* you're doing something, you can't know whether
you're actually acheiving it.
> I thought I could do that with:
...
> olcLocalSSF: 0 <---
So, you've told slapd that ldapi:// connections are to be treated as
completely insecure, like ldap:// conections without TLS. That doesn't
seem to match your intention.
> olcSecurity: tls=256 <---
To quote slapd-config(5):
olcSecurity: <factors>
Specify a set of security strength factors (separated by white
space) to require (see olcSaslSecprops's minssf option for a
description of security strength factors). The directive may be
specified globally and/or per-database.
...
tls=<n> specifies the TLS security strength factor.
So, this tells slapd to require *ALL* connections, regardless of how they
connect, to use SSL/TLS with an SSF of at least 256. That clearly doesn't
match your intention.
My guess, not knowing your actual _purpose_, would be you want to require
a minssf of some 256, and give local (ldapi://) connetions that same SSF.
Of course, that doesn't stop a client from connecting and sending a BIND
request in cleartext. It won't succeed, but it'll still go out in
cleartext.
Philip Guenther