OK, then I try to add that attribute TLSecName to my config (OLC)
, but it fails :
X25519:P-256, it fails the same way
IIRC OpenLDAP doesn't specify any curve by default for ECDHE. You need to specify it explicitly to be able to use ECDHE (and thus ECDSA), eg: TLSECName X25519:P-256 This is also needed to get ECDHE key exchange with RSA certificates, btw. So perhaps OpenLDAP should configure a curve (list) by default? (OpenSSL < 1.0.2 supports only a single curve. Pick P-256 in that case.) Geert On Tue, Dec 10, 2024 at 11:49:00 +0100, Dirk Kastens wrote:Hi, we use certificates with ecdsa-with-SHA256 signature created with certbot on openldap 2.6 without problems. Am 10.12.2024 um 11:28 schrieb jehan Procaccia:Hi we finally moved from RSA signed certificate to ECDSA signature as it is the defaults nowdays (https://community.letsencrypt.org/t/ecdsa- certificates-by-default-and-other-upcoming-changes-in-certbot-2-0/177013) unfortunatly , slapd doesnt like those certificates : / slapd[641]: @(#) $OpenLDAP: slapd 2.4.44 (Feb 23 2022 17:11:27) $/ /mockbuild@x86-01.bsys.centos.org:/builddir/build/BUILD/openldap-2.4.44/ openldap-2.4.44/serve/ / slapd[641]: main: TLS init def ctx failed: -1/ / slapd[641]: slapd stopped./ This happened on a server running old openldap 2.4 (openldap-2.4.44-25.el7_9.x86_64) is there a directive to allow ECDSA certs in slapd (2.4) ? is it natively supported in up2date versions of openldap 2.5 / 2.6 ? is there a special directive in certbot to request slapd certs ? thanks .Dirk