The strace was run on the client (ldapsearch), not the server (slapd).

The client is configured to look in /etc/openldap/cacerts for cacert.pem, which is the CA that I used to sign the server's cert. So I think that part's ok.

The slapd.conf looks like this:
TLSCACertificateFile /var/lib/ldap/cacert.pem

...right, that's for slapd on the server.

 > It looks like everything is in order.  An strace of the ldapsearch
 > command shows this:
 > open("/etc/openldap/cacerts",...

...and this is for ldapsearch on the client, which is configured thusly...

The client has in /etc/openldap/ldap.conf:

tls_reqcert try
TLS_CACERTDIR /etc/openldap/cacerts

The rest of the strace shows that the client does indeed find cacert.pem and opens it...

open("/etc/openldap/cacerts/cacert.pem", O_RDONLY) = 5
fstat64(5, {st_mode=S_IFREG|0644, st_size=1350, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7f4b000
read(5, "-----BEGIN CERTIFICATE-----\nMIID"..., 4096) = 1350
read(5, "", 4096) = 0




--
Fran Fabrizio
Senior Systems Analyst
Department of Computer and Information Sciences
University of Alabama at Birmingham
http://www.cis.uab.edu/
205.934.0653

---
You are currently subscribed to [email protected] as: [EMAIL PROTECTED]
To unsubscribe send email to [EMAIL PROTECTED] with the word UNSUBSCRIBE as the 
SUBJECT of the message.

Reply via email to