[email protected] wrote:

..."If the client does not send a certificate, it can still connect."


Does that mean that traffic is still encrypted if a certificate is not used?

Yes. Certificates are only for authentication, not encrypting the traffic. Usually only servers have certificates, so that clients can verify they are talking to the server they expected, and not being spoofed. Client certificates are very useful to allow the server to verify a client's identity, but there are obviously many other mechanisms for that as well.





----- Original Message -----
From: Emmanuel Dreyfus<[email protected]>
To: Mullis, Josh (CCI-Atlanta); 
[email protected]<[email protected]>
Sent: Sun Aug 23 02:59:05 2009
Subject: Re: tlsverifyclient security implications

Josh Mullis<[email protected]>  wrote:

What are the security implications concerning the following setting in
slapd.conf:
tlsverifyclient allow

As far as I understand, if the client sends a certificate, then slapd
can use it to map client to a LDAP DN, like this:
authz-regexp    cn=foo uid=foo,dc=example,dc=net

If the client does not send a certificate, it can still connect.



--
  -- Howard Chu
  CTO, Symas Corp.           http://www.symas.com
  Director, Highland Sun     http://highlandsun.com/hyc/
  Chief Architect, OpenLDAP  http://www.openldap.org/project/

Reply via email to