On 01/29/2013 01:22 AM, Chris wrote:
Hi
I am running Openldap 2.4.23 on RHEL6. I can telnet to the server on
both 389 636 ports.
I can do a ldapsearch and ldapadd without any errors. I get this error
when I start the slapd daemon.
/ldap_start_tls_s() failed: Can't contact LDAP server: Transport
endpoint is not connected (uri="ldap://ldapserver")//
//failed to bind to LDAP server ldap://ldapserver: Can't contact LDAP
server: Transport endpoint is not connected/
When I do a ldapsearch -x -d1 -Z -b 'dc=flamengro,dc=co,dc=za'
I get the following error
/TLS: certificate [//CA certificate details omitted here...] is not
valid - error -8172:Peer's certificate issuer has been marked as not
trusted by the user..//
//TLS: error: connect - force handshake failure: errno 0 - moznss
error -8172//
//TLS: can't connect: TLS error -8172:Peer's certificate issuer has
been marked as not trusted by the user..//
//ldap_err2string//
//ldap_start_tls: Connect error (-11)//
// additional info: TLS error -8172:Peer's certificate issuer has
been marked as not trusted by the user/
"Peer's certificate issuer has been marked as not trusted by the user" -
this means the issuer (the CA) that issued the certificate of the server
(the peer) is not trusted by the user (the ldapsearch client). This
usually means you have not told ldapsearch (via ldap.conf or .ldaprc)
about the CA cert of the the CA that issued the server cert.
Any help will be appreciated.
This is my slapd.conf file
include /etc/openldap/schema/corba.schema
include /etc/openldap/schema/core.schema
include /etc/openldap/schema/cosine.schema
include /etc/openldap/schema/duaconf.schema
include /etc/openldap/schema/dyngroup.schema
include /etc/openldap/schema/inetorgperson.schema
include /etc/openldap/schema/java.schema
include /etc/openldap/schema/misc.schema
include /etc/openldap/schema/nis.schema
include /etc/openldap/schema/openldap.schema
include /etc/openldap/schema/ppolicy.schema
include /etc/openldap/schema/collective.schema
allow bind_v2
pidfile /var/run/openldap/slapd.pid
argsfile /var/run/openldap/slapd.args
TLSCipherSuite HIGH
TLSCertificateFile /etc/pki/tls/certs/slapdcert.pem
TLSCertificateKeyFile /etc/pki/tls/certs/slapdkey.pem
TLSVerifyClient never
database bdb
suffix "dc=flamengro,dc=co,dc=za"
checkpoint 1024 15
rootdn "cn=Manager,dc=flamengro,dc=co,dc=za"
rootpw secret
directory /var/lib/ldap/flamengro
index objectClass eq,pres
index ou,cn,mail,surname,givenname eq,pres,sub
index uidNumber,gidNumber,loginShell eq,pres
index uid,memberUid eq,pres,sub
index nisMapName,nisMapEntry eq,pres,sub
database monitor
# allow only rootdn to read the monitor
access to *
by dn.exact="cn=Manager,dc=flamengro,dc=co,dc=za" read
by * none
access to attrs=userPassword,shadowLastChange
by anonymous auth
by self write
by * none
I