--On Sunday, November 15, 2009 9:09 PM +0000 Markus Moeller <[email protected]> wrote:

I think this would fix it

I think AD must be broken and non RFC compliant. I've never had problems using SASL/GSSAPI encryption at the same time as SSL/TLS encryption. It wouldn't be the first time MS AD was broken in obvious ways.

For example, here is startTLS over ldap with SASL/GSSAPI encryption:

ldap1:/root# ldapsearch -ZZ -h ldap.stanford.edu -b "" -s base
SASL/GSSAPI authentication started
SASL username: [email protected]
SASL SSF: 56
SASL data security layer installed.
# extended LDIF
#

As such, I would suggest your patch as is be rejected. An option to disable the SASL SSF should be supported though.

--Quanah


--

Quanah Gibson-Mount
Principal Software Engineer
Zimbra, Inc
--------------------
Zimbra ::  the leader in open source messaging and collaboration

Reply via email to