Ubuntu 20.04
Sponsored Link

OpenLDAP : LDAP over SSL/TLS
2020/05/11
 
Configure LDAP over SSL/TLS to use secure encrypted connection.
[1]
[2] Configure LDAP Server.
root@dlp:~#
cp /etc/ssl/private/server.key \
/etc/ssl/private/server.crt \
/etc/ssl/certs/ca-certificates.crt \
/etc/ldap/sasl2/

root@dlp:~#
chown openldap. /etc/ldap/sasl2/server.key \
/etc/ldap/sasl2/server.crt \
/etc/ldap/sasl2/ca-certificates.crt
root@dlp:~#
vi mod_ssl.ldif
# create new

dn: cn=config
changetype: modify
add: olcTLSCACertificateFile
olcTLSCACertificateFile: /etc/ldap/sasl2/ca-certificates.crt
-
replace: olcTLSCertificateFile
olcTLSCertificateFile: /etc/ldap/sasl2/server.crt
-
replace: olcTLSCertificateKeyFile
olcTLSCertificateKeyFile: /etc/ldap/sasl2/server.key

root@dlp:~#
ldapmodify -Y EXTERNAL -H ldapi:/// -f mod_ssl.ldif

SASL/EXTERNAL authentication started
SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
SASL SSF: 0
modifying entry "cn=config"

root@dlp:~#
systemctl restart slapd
[3] Configure LDAP Client.
If you'd like to make sure the connection between LDAP server and client is encrypted, use tcpdump or other network capture software on LDAP server.
root@node01:~#
echo "TLS_REQCERT allow" >> /etc/ldap/ldap.conf

root@node01:~#
vi /etc/ldap.conf
# line 261: uncomment

ssl start_tls
root@node01:~#
logout
node01 login: focal     # LDAP user
Password:
Welcome to Ubuntu 20.04 LTS (GNU/Linux 5.4.0-26-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

  System information as of Mon 11 May 2020 05:03:25 PM JST

  System load:  0.0               Processes:               127
  Usage of /:   9.1% of 24.54GB   Users logged in:         0
  Memory usage: 4%                IPv4 address for enp1s0: 10.0.0.51
  Swap usage:   0%

Last login: Mon May 10 16:56:03 JST 2020 on ttyS0
focal@node01:~$      # logined
Matched Content