Susan wrote:
--- Richard Megginson <rmeggins@xxxxxxxxxx> wrote:The SSL client (in this case, the replication supplier) still needs to verify the SSL server (in this case, the replication consumer) certificate in order for SSL to work. It should be sufficient for the supplier to have the certificate of the CA that issued the consumer's certificate in its cert db.I understand. Where is the cert db?
/opt/fedora-ds/alias/slapd-yourhost-cert8.db
No. It is completely different. The operating system ldap client code is OpenLDAP which uses OpenSSL for crypto. Fedora DS uses Mozilla NSS for crypto.Is that controled by /etc/openldap/ldap.conf?
Right. OpenSSL doesn't use our NSS .db format. Fedora DS doesn't use /etc/ldap* or /etc/openldap* at all. However, OS clients, such as /usr/bin/ldapsearch, PAM, NSS, etc. use /etc/ldap* and /etc/openldap*Because I took *.db from the consumser's /opt/fedora-ds/alias, copied them over to the location specified by TLS_CACERTDIR (/etc/openldap/cacerts) and still got the same error.
You need to use certutil -L to export the CA certificate and certutil -A to import it where needed e.g.On the supplier: [root@cnyldap01 cacerts]# ll total 84 -rw------- 1 root root 65536 Jan 18 13:48 slapd-cnjldap01-cert8.db -rw------- 1 root root 16384 Jan 18 13:48 slapd-cnjldap01-key3.db On the consumer (cnjldap01) still: [18/Jan/2006:13:50:21 -0500] conn=22 fd=65 slot=65 SSL connection from 149.85.70.110 to 149.85.86.65 [18/Jan/2006:13:50:21 -0500] conn=22 op=-1 fd=65 closed - SSL peer cannot verify your certificate. What am I doing wrong?
# cd /opt/fedora-ds/alias # ../shared/bin/certutil -L -d . -P slapd-supplier- you should see something like CA certificate CT,, then you can do# ../shared/bin/certutil -L -d . -P slapd-supplier- -n "CA certificate" -a > cacert.asc
to export the CA certificate in ASCII (RFC 1113) encoding. Next, import the CA cert into your consumer cert db:# ../shared/bin/certutil -A -d . -P slapd-consumer- -n "CA certificate" -t "CT,," -a -i cacert.asc Note that it may prompt you for the password you used to protect the cert db.
You will need to restart your consumer.You can also take this cacert.asc and use the openssl tool to convert this into a .pem file for use with those clients (or is .asc the same as .pem?).
Thank you for your help... __________________________________________________ Do You Yahoo!?Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com-- Fedora-directory-users mailing list Fedora-directory-users@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-directory-users
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
-- Fedora-directory-users mailing list Fedora-directory-users@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-directory-users