On Tue, 15 Apr 2008, Buchan Milne wrote:
On Friday 11 April 2008 01:42:30 Jason Dusek wrote:
I'd like to set up LDAP command line tools to point to a server -- say localhost -- that has a certificate with an arbitrary name in it -- say `my-domain.com`.
...
Either: 1)Add an entry to /etc/hosts so that the name on the certificate resolves to the correct IP address, and always use the name on any connection where you want certificate validation
This should work (assuming the client has the cert of the CA that signed the server cert).
or 2)Add TLS_REQCERT allow to the OpenLDAP ldap.conf. If you are using anything besides OpenLDAP software (nss_ldap,pam_ldap) be aware that their configuration is not identical ...
This isn't sufficient. "TLS_REQCERT allow" only disables the checking of the certificate validity (known CA, etc) and not the checking of the hostname in the URI vs the names in the cert. To disable the name checking too, you have to use "TLS_REQCERT never".
Such a config has no protection from MitM attacks: you'll accept any cert from any CA.
Philip Guenther
(Correcting the ldap.conf(5) manpage is ITS #4941)