Sean Gallagher wrote:
> On 26/06/2023 7:40 pm, Howard Chu wrote:
>> That feature is already available using TLSVerifyClient in the slapd config.
> 
> Not really. Using the TLSVerifyClient mechanism could be made to work and 
> would be a nice solution but it isn't there yet. To make this this work, you 
> would
> need to pass to libldap, some type of specification of the names of 
> legitimate clients. Then in the tls_o.c:tlso_verify_cb() function, compare 
> the name on the
> client cert with the specification and return the pass/fail status back to 
> the TLS layer. Then it would all "just work".
> 
> The average user might be surprised to learn that TLSVerifyClient does not 
> currently involve checking the client's name. You would intuitively think 
> that was
> pretty important.

The point of a certificate-based authentication system is not to have to 
implement authentication rules
for each and every individual user. An LDAP server should only trust 
certificates issued by a single CA;
that CA should only be issuing certs to valid users. Ideally, the LDAP server 
should be the CA, which is
what slapo-autoca is designed for.

An LDAP server is not a web server or a client. There is no reason for it to 
trust certs from multiple CAs.
> 
>> Pure nonsense.
> 
> Pure hubris.
> 
> It's sad when it takes a disaster to affect real change.

Pure ignorance.
> 

> 


-- 
  -- Howard Chu
  CTO, Symas Corp.           http://www.symas.com
  Director, Highland Sun     http://highlandsun.com/hyc/
  Chief Architect, OpenLDAP  http://www.openldap.org/project/

Reply via email to