Emmanuel Lecharny wrote:
Overwriting the keys for uid=admin,ou=system did not work out
as expected so that we had to use our own ldapserver class.

This overwriting is really hard, because one has to modify at least three attribute values (private key, public key, cetificate). The biggest problem is the private key. If you use keytool to create your keypair, which would be a good choice to recommend, because it is part of JDK, you are not able to export your private key out of the keystore. The tool does not provide this functionality, I guess for security reasons.

I therefore had to use tools normally not available to an admin ...

I think we have to modify the way the server is initialized. Allowing the server to use an external keystore should be possible. I will try to modify the server in order to add such a configuration possible. Hopefully, this will be added to the upcoming 1.5.5 version.

This would be nice, at least for some users. And for me from an VSLDAP point of view.

The main advantage of the current implementation is that the private key is in the DIT and therefore save (if the server is). But if someone wants to modify it, s/he has to store it with an LDAP client, which is obviously a bad thing (exporting the key and sending it over the wire).

A disadvantage of the keystore approach is that you have to provide a password in order to access the private key. The password must be written somewhere in the configuration, which is bad as well, because it threats the private key.

My favorite would be an extended operation, which stores the key pair in the DIT and creates a certificate and perhaps a certificate signing request (CSR). This would really be great, because the parameters of the extended operation could contain the parameters for key creation etc., and it would be easy to write a UI for studio etc. Perhaps something for the 2.0 ...

Greetings from Hamburg,
    Stefan


Reply via email to