Predrag Punosevac wrote: > I am trying to get my head wrapped around securing LDAP so please > forgive me this n00b questions. My final goal is to replace our current > NFS+NIS with NFS+LDAP+[Kerberos] set up. > > I see by default OpenLDAP clients are authenticating via SASL. I also > see the Kerberos can be used with SASL. > > Could somebody point me to a document describing pros and cons of > Kerberazing SASL on "secure" network? As described in an earlier e-mail > I opted for OpenBSD stack LDAP server and I would use stack Kerberos > server. > > Thanks, > Predrag
After many hours of reading ldapd and ldapd.conf man pages as well as OpenLDAP documentation I see that above question doesn't make any sense. I was wondering if somebody could confirm some of the conclusions I came up with. 1. The security of LDAP consist of two unrelated parts: a. security of authentication b. security of data transfer between LDAP database and clients 2. From ldapd man pages I see that ldapd can authenticate users via simple binds or SASL with the PLAIN mechanism. It looks to me that simple bind {SSHA}digest is the safest way to authenticate users as ldapd only supports SASL with PLAIN mechanism. Long story short it looks like Kerberos is not even an option if I go with built in ldapd. I would have to use slapd to be able to use Kerberos. 3. Security of data transfer between LDAP server/database and clients is best achieved using starttls option in ldapd.conf. This requires creating certificates at least for the server preferably for clients too. As a matter of fact I have been able easily to create certificates using easy-rsa tool instead of more raw openssl vanilla procedure described in starttls man pages and preform ldapsearch with --ZZ option. Most Kind Regards, Predrag