Howard Chu wrote:
Stephen Cartwright wrote:
> I looked into this and I don't understand :( Would you please clarify
> why a DN such as "/C=CA/O=Grid/CN=host/somehost.somedomain.ca" is
> broken? You said "somehost.somedomain.ca" is not a valid RDN because
> it just has a value and not a type, however the RDN is not just
> "somehost.somedomain.ca" but "CN=host/somehost.somedomain.ca"
which
> has a type of "CN" and a value of "host/somehost.somedomain.ca"
does
> it not?
That wasn't clear to me from the output you posted before. Since you
were posting a DN that uses '/' as its RDN separator, the software that
generated this log output should have escaped the '/' in the attribute
value if that was really the situation. E.g., it should have looked like
/CN=host%2Fsomehost.somedomain.ca.
Using top-down-order and / as separator is the standard behaviour of OpenSSL.
:-/ One can also display subject and issuer names in certs with
openssl x509 -nameopt rfc2253
> If this RDN is in fact valid, I still don't understand why
DNs
> of the form
> "/C=CA/O=Grid/CN=host/somehost.somedomain.ca" seem to not work with LDAP.
At this point I have no idea what you're really working with. The
comment I posted originally may not apply to this situation at all.
Since this is about GRID services I guess someone falsely put a Kerberos
service prinicipal name in the CN attribute of the server cert. The cert has
to be corrected to contain exactly the FQDN of the server used during LDAP
connect *without* the prefix "host/".
Ciao, Michael.