On Sun, 2010-02-28 at 10:07 -0700, Paul R. Ganci wrote: > On Sun, 2010-02-21 at 23:23 -0700, Craig White wrote: > > Note that ldap 'client' applications like ldapsearch > > use /etc/openldap/ldap.conf so I would suspect that the 'certificates' > > used by the 2 machines are different. > > I thought I would follow up on this problem. I did finally get the > ldapsearch to function properly on the remote machine. However, I am > puzzled as to what I had to do to get it to work. I originally never > setup a certificate for the client as I did not think they were needed. > In my /etc/openldap/slapd.conf file I had to set up the LDAP server with > the following: > > TLSVerifyClient never > > I had the initial setup with > > TLSVerifyClient allow > > According to man slapd.conf: > > TLSVerifyClient <level> > Specifies what checks to perform on client certificates in an > incoming > TLS session, if any. The <level> can be specified as one of > the > following keywords: > > never This is the default. slapd will not ask the client for > a > certificate. > > allow The client certificate is requested. If no certificate > is > provided, the session proceeds normally. If a bad certificate > is > provided, it will be ignored and the session proceeds normally. > > try The client certificate is requested. If no certificate > is > provided, the session proceeds normally. If a bad certificate > is > provided, the session is immediately terminated. > > demand | hard | true > These keywords are all equivalent, for compatibility > reasons. > The client certificate is requested. If no certificate > is > provided, or a bad certificate is provided, the session > is > immediately terminated. > > Note that a valid client certificate is required in order to > use > the SASL EXTERNAL authentication mechanism with a TLS > session. > As such, a non-default TLSVerifyClient setting must be chosen > to > enable SASL EXTERNAL authentication. > > Note that according to the documentation the original setup should have > worked properly. Why doesn't "allow" work? ---- do you mean other than the fact that this simply talks about TLS Client and that SSL is deprecated and generally ignored in the documentation?
SSL communication is different than TLS. Craig -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos