Zum Verständnis: Ich richte OpenLDAP zunächst mit einer slapd.conf ein und konvertiere diese dann später in eine online cn=config.
Hier mal der relevante Auszug aus slapd.conf
Code: Alles auswählen
# TLS
TLSCertificateFile /etc/ldap/TLS/foo.cert.pem
TLSCertificateKeyFile /etc/ldap/TLS/foo.ldap.key.pem
TLSCACertificateFile /etc/ldap/TLS/foo.pem
TLSVerifyClient allow
Code: Alles auswählen
TLS_CACERT /etc/ldap/TLS/cacert.pem
TLS_REQCERT allow
Code: Alles auswählen
foo:/etc/ldap$ldapsearch -xLLL -ZZ uid=dummy
dn: uid=dummy,ou=users,dc=foo,dc=local
uid: dummy
uidNumber: 1000
gidNumber: 1000
cn: dummy
sn: dummy
objectClass: top
objectClass: person
objectClass: posixAccount
objectClass: shadowAccount
loginShell: /bin/bash
homeDirectory: /home/dummy
Aber:
Code: Alles auswählen
foo:/etc/ldap$ldapsearch -Y EXTERNAL -LLL
SASL/EXTERNAL authentication started
ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-4): no mechanism available:
Code: Alles auswählen
TLS_CERT /home/dummy/certs/dummy.cert.pem
TLS_KEY /home/dummy/certs/dummy.ldap.key.pem
SASL_MECH EXTERNAL
Code: Alles auswählen
foo:/etc/ldap#saslpluginviewer
[...]
Plugin "EXTERNAL" [loaded], API version: 4
SASL mechanism: EXTERNAL, best SSF: 0
security flags: NO_ANONYMOUS|NO_PLAINTEXT|NO_DICTIONARY
features: WANT_CLIENT_FIRST|PROXY_AUTHENTICATION
Code: Alles auswählen
foo:/etc/ldap#ldapsearch -x -ZZ -LLL -s base -b "" supportedSASLMechanisms
dn:
supportedSASLMechanisms: NTLM
supportedSASLMechanisms: CRAM-MD5
supportedSASLMechanisms: PLAIN
supportedSASLMechanisms: LOGIN
supportedSASLMechanisms: DIGEST-MD5
Code: Alles auswählen
foo:/etc/ldap$ldapsearch -ZZ -Y EXTERNAL -LLL
ldap_start_tls: Connect error (-11)
additional info: (unknown error code)
Code: Alles auswählen
foo:/etc/ldap$ldapsearch -ZZ -Y EXTERNAL -LLL -d -1
TLS: peer cert untrusted or revoked (0x42)
TLS: can't connect: (unknown error code).
ldap_err2string
ldap_start_tls: Connect error (-11)
additional info: (unknown error code)