On Thu, Jul 07, 2005 at 11:40:12AM -0400, James Craig wrote:
>       if I set up the ldap server to also listen on port 383, and change the
>       line
> 
>       NS_LDAP_SERVERS= 129.21.36.128
> 
>       It works.
> 
>       From what I am getting from this, is that the solaris ldap client wants
>       to communicate on an unencrypted channel and establish encryption from
>       that.
> 
>       What I think I need to figure out (and help is always appreciated) is
>       how to get the solaris ldap client to communicate with the openldap
>       server on port 636 without having to go through TLS negotiation.

Port 636 is reserved for ldaps (LDAP over TLS). It would be pretty silly to
run a non-TLS LDAP server on port 636.

Your three options are:

- LDAP on port 389, unencrypted (no TLS)
- LDAP on port 389, TLS encrypted using the 'starttls' extension (RFC2830);
  that is, the connection starts unencrypted and then a request is sent to
  upgrade the connection to TLS.
- LDAPS on port 636, TLS is negotiated immediately on connection

At the moment your client thinks it is talking LDAP without TLS, and your
server is trying to negotiate TLS immediately.

---
You are currently subscribed to ldap@umich.edu as: [EMAIL PROTECTED]
To unsubscribe send email to [EMAIL PROTECTED] with the word UNSUBSCRIBE as the 
SUBJECT of the message.

Reply via email to