<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenLdap - TSL-SSL in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747404#M43501</link>
    <description>thanks a lot Matti&lt;BR /&gt;&lt;BR /&gt;well that means I'm OK or protected with TLS and my clients connections are encrypted...</description>
    <pubDate>Mon, 14 Feb 2011 15:49:22 GMT</pubDate>
    <dc:creator>KarloChacon</dc:creator>
    <dc:date>2011-02-14T15:49:22Z</dc:date>
    <item>
      <title>OpenLdap - TSL-SSL</title>
      <link>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747400#M43497</link>
      <description>hi guys&lt;BR /&gt;&lt;BR /&gt;I configured OpenLdap and now I want to configure it using TLS-SSL&lt;BR /&gt;&lt;BR /&gt;but I cannot get it working with the Linux clients. Enviroment: Centos 5.5&lt;BR /&gt;&lt;BR /&gt;Openldap Server configuration: &lt;BR /&gt;1. &lt;BR /&gt;cd /etc/openldap/cacerts&lt;BR /&gt;openssl req -x509 -nodes -newkey rsa:1024 -days 730 -out slapd.crt -keyout slapd.key&lt;BR /&gt;chown ldap.ldap slapd.*&lt;BR /&gt;chmod 400 slapd.*&lt;BR /&gt;&lt;BR /&gt;2. &lt;BR /&gt;Add lines below to&lt;BR /&gt;/etc/openldap/slapd.conf&lt;BR /&gt;&lt;BR /&gt;TLSCACertificateFile  /etc/openldap/cacerts/slapd.crt&lt;BR /&gt;TLSCertificateFile    /etc/openldap/cacerts/slapd.crt&lt;BR /&gt;TLSCertificateKeyFile /etc/openldap/cacerts/slapd.key&lt;BR /&gt;&lt;BR /&gt;and that's it&lt;BR /&gt;I see it works (or I think since JXplorer connects using SSL-636 port) see attachment&lt;BR /&gt;&lt;BR /&gt;but Centos 5.5 clients don't want to connect&lt;BR /&gt;&lt;BR /&gt;When there is no SSL users can connect normally&lt;BR /&gt;but when SSL configure the username is typed but prompt for password never comes up... users just get a session timeout&lt;BR /&gt;by the way nothing on messages neither openldap server or client&lt;BR /&gt;&lt;BR /&gt;Client configuration is done via authconfig-tui (included in the attachment)&lt;BR /&gt;&lt;BR /&gt;any idea why is not working guys?&lt;BR /&gt;Am I missing something?&lt;BR /&gt;&lt;BR /&gt;thanks a lot</description>
      <pubDate>Wed, 02 Feb 2011 13:23:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747400#M43497</guid>
      <dc:creator>KarloChacon</dc:creator>
      <dc:date>2011-02-02T13:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: OpenLdap - TSL-SSL</title>
      <link>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747401#M43498</link>
      <description>Hi Karlo,&lt;BR /&gt;&lt;BR /&gt;What is your openldap's loglevel?&lt;BR /&gt;Can you set full debugging and drop any logs into this thread?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;M.&lt;BR /&gt;</description>
      <pubDate>Thu, 03 Feb 2011 09:16:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747401#M43498</guid>
      <dc:creator>Marcin  Bartoszek</dc:creator>
      <dc:date>2011-02-03T09:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: OpenLdap - TSL-SSL</title>
      <link>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747402#M43499</link>
      <description>it looks like I got it working.....&lt;BR /&gt;&lt;BR /&gt;Now when I configured Centos clients with authconfig-tui to use TLS they connect with an OpenLdap user but in logs says 389... not 636&lt;BR /&gt;can be TLS enanbled and still using port 389?&lt;BR /&gt;I'm going to include both logs:&lt;BR /&gt;Scenario.&lt;BR /&gt;Openldap TLS Configured and enabled. OK. In both scenarios client connect with an LDAP user.&lt;BR /&gt;1. Client without TLS logs: &lt;BR /&gt;[code]Feb 13 08:42:50 masterdns slapd[3911]: conn=2 fd=16 ACCEPT from IP=192.168.2.73:45037 (IP=0.0.0.0:389)&lt;BR /&gt;Feb 13 08:42:50 masterdns slapd[3911]: conn=2 op=0 BIND dn="" method=128&lt;BR /&gt;Feb 13 08:42:50 masterdns slapd[3911]: conn=2 op=0 RESULT tag=97 err=0 text=&lt;BR /&gt;Feb 13 08:42:50 masterdns slapd[3911]: conn=2 op=1 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=posixAccount)(uid=adri))"&lt;BR /&gt;Feb 13 08:42:50 masterdns slapd[3911]: conn=2 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass&lt;BR /&gt;Feb 13 08:42:50 masterdns slapd[3911]: conn=2 op=1 SEARCH RESULT tag=101 err=0 nentries=1 text=&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=2 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=posixAccount)(uid=adri))"&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=2 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=3 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=shadowAccount)(uid=adri))"&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=3 SRCH attr=uid userPassword shadowLastChange shadowMax shadowMin shadowWarning shadowInactive shadowExpire shadowFlag&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=4 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=posixAccount)(uid=adri))"&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=4 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass&lt;BR /&gt;Feb 13 08:42:52 masterdns slapd[3911]: conn=2 op=4 SEARCH RESULT tag=101 err=0 nentries=1 text=[/code]&lt;BR /&gt;&lt;BR /&gt;2. Client with TLS enabled Logs&lt;BR /&gt;[code]Feb 13 09:41:35 masterdns slapd[4096]: conn=5 fd=15 ACCEPT from IP=192.168.2.74:35441 (IP=0.0.0.0:389)&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 op=0 STARTTLS&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 op=0 RESULT oid= err=0 text=&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 fd=15 TLS established tls_ssf=256 ssf=256&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 op=1 BIND dn="" method=128&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 op=1 RESULT tag=97 err=0 text=&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 op=2 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=posixAccount)(uid=adri))"&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 op=2 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass&lt;BR /&gt;Feb 13 09:41:35 masterdns slapd[4096]: conn=5 op=2 SEARCH RESULT tag=101 err=0 nentries=1 text=&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=3 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=posixAccount)(uid=adri))"&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=3 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=4 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=shadowAccount)(uid=adri))"&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=4 SRCH attr=uid userPassword shadowLastChange shadowMax shadowMin shadowWarning shadowInactive shadowExpire shadowFlag&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=4 SEARCH RESULT tag=101 err=0 nentries=1 text=&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=5 SRCH base="dc=training,dc=com" scope=2 deref=0 filter="(&amp;amp;(objectClass=posixAccount)(uid=adri))"&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=5 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass&lt;BR /&gt;Feb 13 09:41:38 masterdns slapd[4096]: conn=5 op=5 SEARCH RESULT tag=101 err=0 nentries=1 text=[/code]&lt;BR /&gt;&lt;BR /&gt;Can be TLS been enabled and TLS configured clients use 389 port? or I am still configuring this TLS incorrectly.&lt;BR /&gt;&lt;BR /&gt;Thanks a lot</description>
      <pubDate>Sun, 13 Feb 2011 16:07:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747402#M43499</guid>
      <dc:creator>KarloChacon</dc:creator>
      <dc:date>2011-02-13T16:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: OpenLdap - TSL-SSL</title>
      <link>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747403#M43500</link>
      <description>Yes, it can.&lt;BR /&gt;&lt;BR /&gt;When you're using TLS with LDAP, LDAP client can open a connection using a regular LDAP port, and then perform a StartTLS operation - essentially saying "start encryption now, please." &lt;BR /&gt;&lt;BR /&gt;If the client does not request a StartTLS operation, the connection remains unencrypted. The server can be configured to reject unencrypted connections, or to accept them.&lt;BR /&gt;&lt;BR /&gt;With SSL, the server port is configured to expect a SSL handshake immediately after opening the port. This requires a separate port for SSL traffic only for each service.&lt;BR /&gt;&lt;BR /&gt;TLS is a successor of SSL, and removes the requirement of using a separate port for SSL-secured connections. Of course, most TLS-capable applications can use a different port and connect SSL-style too. This is typically indicated by adding a "s" to the URL scheme name, i.e. "ldaps:" instead of "ldap:".&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Mon, 14 Feb 2011 12:20:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747403#M43500</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2011-02-14T12:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: OpenLdap - TSL-SSL</title>
      <link>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747404#M43501</link>
      <description>thanks a lot Matti&lt;BR /&gt;&lt;BR /&gt;well that means I'm OK or protected with TLS and my clients connections are encrypted...</description>
      <pubDate>Mon, 14 Feb 2011 15:49:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/openldap-tsl-ssl/m-p/4747404#M43501</guid>
      <dc:creator>KarloChacon</dc:creator>
      <dc:date>2011-02-14T15:49:22Z</dc:date>
    </item>
  </channel>
</rss>

