Re: simple ssl replication

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Susan wrote:

--- Richard Megginson <rmeggins@xxxxxxxxxx> wrote:

The SSL client (in this case, the replication supplier) still needs to verify the SSL server (in this case, the replication consumer) certificate in order for SSL to work. It should be sufficient for the supplier to have the certificate of the CA that issued the consumer's certificate in its cert db.

I understand.  Where is the cert db?

/opt/fedora-ds/alias/slapd-yourhost-cert8.db

Is that controled by /etc/openldap/ldap.conf?

No. It is completely different. The operating system ldap client code is OpenLDAP which uses OpenSSL for crypto. Fedora DS uses Mozilla NSS for crypto.

Because I
took *.db from the consumser's /opt/fedora-ds/alias, copied them over to the location specified by
TLS_CACERTDIR (/etc/openldap/cacerts) and still got the same error.
Right. OpenSSL doesn't use our NSS .db format. Fedora DS doesn't use /etc/ldap* or /etc/openldap* at all. However, OS clients, such as /usr/bin/ldapsearch, PAM, NSS, etc. use /etc/ldap* and /etc/openldap*

On the supplier:
[root@cnyldap01 cacerts]# ll
total 84
-rw-------  1 root root 65536 Jan 18 13:48 slapd-cnjldap01-cert8.db
-rw-------  1 root root 16384 Jan 18 13:48 slapd-cnjldap01-key3.db

On the consumer (cnjldap01) still:
[18/Jan/2006:13:50:21 -0500] conn=22 fd=65 slot=65 SSL connection from 149.85.70.110 to
149.85.86.65
[18/Jan/2006:13:50:21 -0500] conn=22 op=-1 fd=65 closed - SSL peer cannot verify your certificate.



What am I doing wrong?
You need to use certutil -L to export the CA certificate and certutil -A to import it where needed e.g.
# cd /opt/fedora-ds/alias
# ../shared/bin/certutil -L -d . -P slapd-supplier-
you should see something like
CA certificate                                               CT,,
then you can do
# ../shared/bin/certutil -L -d . -P slapd-supplier- -n "CA certificate" -a > cacert.asc
to export the CA certificate in ASCII (RFC 1113) encoding.
Next, import the CA cert into your consumer cert db:
# ../shared/bin/certutil -A -d . -P slapd-consumer- -n "CA certificate" -t "CT,," -a -i cacert.asc Note that it may prompt you for the password you used to protect the cert db.
You will need to restart your consumer.

You can also take this cacert.asc and use the openssl tool to convert this into a .pem file for use with those clients (or is .asc the same as .pem?).

Thank you for your help...

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux