On 3/12/22 4:26 AM, Howard Chu wrote:
The LDAP Password Policy spec requires userPassword to store only 1 value.
But simple auth will still work for all of them if someone manually adds others right?
You can generate short lifetime certs easily enough but keys tend to still be 
long lived. Likewise in Kerberos
where tickets are short lifetime, but you still use a longlived password to get 
the initial TGT.

You can use the autoCA overlay in OpenLDAP to streamline certificate generation 
for all of your users and set
them to arbitrarily long or short lifetimes. No matter what security mechanism 
you develop, the key management
problem remains unchanged.

But if you're swapping out the cert, you can optionally re-key at the same time, so I think we add to the list of TLS client best practice: re-key when you re-cert. Right? There are no great costs to re-keying, unless I am missing something.

  3. Is there anyway to have ldap* commands read the key in from an environment 
variable or call to gpg/secrets store /etc? Funky alias / bash-wrapper yeah but
     I'm looking for something less clunky.
The OpenLDAP software doesn't even touch any strong secrets - they're all 
managed by the relevant TLS / Kerberos / whatever library,
so this question should be directed to those packages.

Thanks for the redirect, Howard. I will ask.

Reply via email to