Patrick Nelson wrote:
----------------->>>>
Putting ssl yes in ldap.conf doesn't really do (at least it doesn't seem to)
anything different.  The results were the same.

So just running authconfig and setting values for server, base DN, and
selecting Use TLS, should do this... OK cool a tool...

The moment of truth or at least committal

What happens if it doesn't work?  Single user mode and then turn off all the
settings in authconfig?
----------------->>>>

Committed myself on one system then did packet capture on the ldap server
during login and logout and looked at all the packet data and sure enough
it's encrypted, even though it is going across the 389 port (ldap) and not
the 636 port (ldaps).  I noticed that prior to a block of data being sent
(it is seen as an invalid ldap message by the sniffer) there seemed to be
the ssl cert which I could see because of some text in the packet which had
[EMAIL PROTECTED] in it which I don't have anywhere in the ldap data.

I then ran the previous test and examined the data:  Results matched the
above findings.  The only time ldap tools use port 636 is when specifically
told to by using -H ldaps://<ldap server>.  If -Z (or -ZZ) is used the
SSL/TLS is utilized on 389, but if -Z (-ZZ) is not used then everything is
clear text.

Just some good info.  Onto locking down permissions in slap.conf and then
maybe start moving out to production.



-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to