Dieter Kluenter schrieb:
> Hi,
> [...] 
> The value of X509v3 Authority Key Identifier keyid in your
> servercert.pem is identical to the value in your cacert.pem, it is a
> proof of the correct cacert, if the value differs you have signed your
> servercert with the wrong cacert.
> 
Hi,
I have done:
oracle:/etc/openldap # openssl x509 -in  servercrt.pem -text > servercrt.txt
oracle:/etc/openldap # openssl x509 -in  cacert.pem -text > cacert.txt
and here are parts out of this files:
oracle:/etc/openldap # grep -i keyid servercrt.txt
                
keyid:90:4F:E9:05:AA:38:FC:D9:21:45:B0:BD:A5:2E:B3:5B:E9:59:38:AF
oracle:/etc/openldap # grep -i keyid cacert.txt
                
keyid:90:4F:E9:05:AA:38:FC:D9:21:45:B0:BD:A5:2E:B3:5B:E9:59:38:AF
I assume that this keyids must be the same?

>> I've read, that I have to set the common name to my fqdn (of the server)
>> but I don't understand the reason. What means: checked and validated by
>> the clients? - must the name resolv to an ip or what means validated?
> 
> A searchstring contains a hostname, i.e.
> ldpsearch -H ldap://my.host.mydomain
> in any configuration file you define a ldap host. This hostname is
> checked against the CN of a certificate, if these don't match, the
> searchstring is not valid. A good dictionary will give you more
> information on validation.
Sorry, I don't understand that. Now I tried only from
the server oracle.hhb.bonn.de with the command
ldapsearch -h oracle.hhb.bonn.de -b "dc=hhb,dc=bonn,dc=de" -D 
"cn=manager,dc=hhb,dc=bonn,dc=de" -x  -W -ZZ -d1
and the following entries in /etc/openldap/ldap.conf
------------#
# LDAP Defaults
#

# See ldap.conf(5) for details
# This file should be world readable but not world writable.

#BASE   dc=example, dc=com
#URI    ldap://ldap.example.com ldap://ldap-master.example.com:666

#SIZELIMIT      12
#TIMELIMIT      15
#DEREF          never
TLS_REQCERT     allow
ssl     start_tls
host    oracle.hhb.bonn.de
base    dc=hhb,dc=bonn,dc=de
TLS_CACERT /etc/openldap/cacert.pem
----------------------

again: no success with tls:
[...]
TLS trace: SSL_connect:before/connect initialization
TLS trace: SSL_connect:SSLv2/v3 write client hello A
TLS trace: SSL3 alert read:fatal:handshake failure
TLS trace: SSL_connect:error in SSLv2/v3 read server hello A
TLS: can't connect.
ldap_perror
ldap_start_tls: Connect error (-11)
        additional info: error:14077410:SSL 
routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure

I don't know where to search for hints
any ideas?

Thanks
      Karsten

> 
> -Dieter 
> 


---
You are currently subscribed to [email protected] as: [EMAIL PROTECTED]
To unsubscribe send email to [EMAIL PROTECTED] with the word UNSUBSCRIBE as the 
SUBJECT of the message.

Reply via email to