On Fri, 15 Mar 2013, Mik J wrote:
> Sorry if my question seem to be simple but I've read the ldap.conf 
> manpage and I would like to clarify what I understood
> 
> ldap.conf is the configuration file read by the ldap client.
> 
> TLS_REQCERT never
> means that the client doesn't ask the server for a certificate. 
> Therefore the server will not sent its certificate. Even for LDAPS (LDAP 
> over SSL)

The text of the manpage is misleading: in TLS/SSL, the client does not 
'request' a server certificate.  Whether the server sends its certificate 
is not under the client control, but rather is a property of the 
cipher-suite that was selected.  For example, with AES256-SHA the server 
cert is always sent.  (And no, TLS_REQCERT has no effect on the 
cipher-suite selection.)

So, setting it to "never" just tells the client to do no checking of the 
server certificate, if any, that is received.

(Note also: at least when using OpenSSL, the 'try' setting behaves exactly 
the same as 'demand' and 'hard'.)


...
> I have a few questions though
> 1) The statements TLS_CACERT and TLS_CACERTDIR seem to be a bit 
>    redundant. Why use the TLS_CACERT statement, we can have multiple CA 
>    cert right ?

Sometimes it's easier to administer a single file of multiple certs 
instead of a directory of hashed certificate names.


(On the server side, the certs in the olcTLSCACertificateFile file are 
also used to generate the optional list of CA subjects included in the 
client cert request, though many (most?) client ignore that list.)


> 2) I read that some people tell to have both "TLS_REQCERT never" and 
> "TLS_CACERTDIR" or "TLS_CACERT". Why would you specify a CA cert if our 
> client doesn't request and certificate from the LDAP server ?

It's probably pointless.  I suppose it's possible to use "TLS_REQCERT 
never" but also use client certs, in which case the client might need to 
send certs for intermediate CA...but that would be a bizarre use-case.


> 3) I will use "TLS_CACERT" and "TLS_KEY" on my client, if I want my 
>    client to be authenticated by the LDAP server

If you want to use TLS/SSL client certificate authentication, yes.  That 
doesn't directly affect the identity it binds as, of course.


> 4) All these statements are also valid for LDAP over SSL. Correct ?

Yes.


Philip Guenther

Reply via email to