Fedora iTOps Tube

Thursday, November 24, 2011



LDAP is rapidly becoming a defacto standard for remote authentication and authorization of users, not only in the realm of Linux, but also in that of Windows where it is a key component of Active Directory. Usage of LDAP is also becoming increasingly widespread in wireless networking systems. For example in hot spots, ISPs will sacrifice data security for the sake of convenience by not using encryption, but will use LDAP to restrict access to the Internet to people who have purchased pre-paid access codes with a predefined lifetime.

Chapter 32, "Controlling Web Access with Squid", covers the use of the Linux Squid application to cache Web content, restrict Web access by the time of day and via password prompts. Although it is beyond the scope of this book, you should know that you can use LDAP can to complement the functionality of Squid in larger implementations.

Configuring RADIUS for LDAP

Configuring RADIUS for LDAP

Many network equipment manufacturers use an authorization scheme called RADIUS to filter the types of activities a user can do. The Linux FreeRADIUS server can be configured to talk to a Linux LDAP server to handle login authentication services. In other words, the user logs into the equipment, which then sends a username/password combination to the RADIUS server, the RADIUS server queries the LDAP server to see if the user is a valid one, and then replies to the network equipment with the desired login privileges if the LDAP query is successful.

You'll have to refer to your manufacturer's manuals on how to configure RADIUS, but fortunately researching how the FreeRADIUS server interacts with the Linux LDAP server is much simpler. Here are the steps.

How To Download and Install The FreeRADIUS Packages

Most RedHat and Fedora Linux software products are available in the RPM format. When searching for the file, remember that the FreeRADIUS RPM's filename usually starts with freeradius followed by a version number, as in freeradius-0.9.1-1.i386.rpm.

Starting and Stopping FreeRADIUS

You can use the chkconfig command to get the FreeRADIUS daemon, radiusd, configured to start at boot:

[root@bigboy tmp]# chkconfig radiusd on

To start, stop, and restart radiusd after booting, use

[root@bigboy tmp]# service radiusd start
[root@bigboy tmp]# service radiusd stop
[root@bigboy tmp]# service radiusd restart

Remember to restart the radiusd process every time you make a change to the configuration files for the changes to take effect on the running process.

Configuring The /etc/raddb/radiusd.conf File

The /etc/raddb/radiusd.conf file stores the main RADIUS configuration parameters. You'll have to update some of the settings to allow LDAP queries from RADIUS.

1. Activate the use of the LDAP module in the authorize section of the file by uncommenting the word ldap.

authorize {
    #  The ldap module will set Auth-Type to LDAP if it has not
    #  already been set

2. Activate the use of the LDAP module in the authenticate section by uncommenting the Auth-Type block for LDAP:

Auth-Type LDAP {

3. Define the LDAP domain, LDAP server, and password methods to be used in the ldap block. In the example, the LDAP and RADIUS server is the same machine, so you set the LDAP server IP address to localhost.

ldap {
     # Define the LDAP server and the base domain name
     server = "localhost"
     basedn = "dc=example,dc=com"
     # Define which attribute from an LDAP "ldapsearch" query
     # is the password. Create a filter to extract the password
     # from the "ldapsearch" output
     password_attribute = "userPassword"
     filter = "(uid=%{Stripped-User-Name:-%{User-Name}})"
     # The following are RADIUS defaults
     start_tls = no
     dictionary_mapping = ${raddbdir}/ldap.attrmap
     ldap_connections_number = 5
     timeout = 4
     timelimit = 3
     net_timeout = 1

These configuration steps only cover how to configure RADIUS to interact with LDAP. You'll have to define the login attributes and privileges each user will receive and the IP addresses of the varius RADIUS clients. We'll cover these topics next.

Configuring The /etc/raddb/users File

The /etc/raddb/users file defines the types of attributes a user receives upon login. In the case of a router, this may include allowing some user groups to login to a device in a privileged mode, while allowing other only basic access.

One of the first entries in this file is to check the local server's /etc/passwd file. The very next entry should be one referring to your LDAP server with a fall through statement that will allow additional authorizations to be granted to the LDAP user further down the file based on other sets of criteria.

# First setup all accounts to be checked against the UNIX /etc/passwd.
DEFAULT Auth-Type = System
        Fall-Through = 1
# Defaults for LDAP
        Fall-Through = 1

Configuring The /etc/raddb/clients.conf File

You can define a shared secret password key to be used by the RADIUS server and its clients in the /etc/raddb/clients.conf file.

Passwords can be allocated for ranges of IP addresses in each network block using the secret keyword. The next example defines the password testing123 for all queries from localhost, but s3astar for the network and shrtp3nc1l for the network. All RADIUS clients have to peer with the RADIUS server from these networks using the correct password before logins are correctly accepted.

client {
     secret = testing123
     shortname = localhost
     secret = s3astar
     shortname = home-network

client {
     secret = shrtp3nc1l
     shortname = office-network

Troubleshooting And Testing RADIUS

You can now test the various elements of the RADIUS setup:

Server Setup

To test the server, run radiusd in debug mode to see verbose messages about the status of the RADIUS queries. These messages are much more informative than those provided in the /var/log/messages and /var/log/radius/radius.log files.

[root@bigboy tmp]# /usr/sbin/radiusd -X -A

After testing is complete, you must start the radiusd daemon in the normal manner using the command service radiusd start.

Linux Client Setup

For Linux clients, you can perform RADIUS queries with the radtest command. The arguments are the LDAP username, the LDAP user's password, the LDAP server IP address, an NAS port value (any value between 1 and 100 will work here), and the RADIUS client-server shared secret password key. Successful queries will show an Access-Accept message.

A successful test from the RADIUS server looks like this.

[root@bigboy tmp]# radtest ldapuser "ldapuser-password" \
  localhost 2 testing123
rad_recv: Access-Accept packet from host, id=99, length=20
[root@bigboy tmp]#

A successful test from a Linux RADIUS client looks like this:

[root@smallfry bin]# radtest ldapuser "ldapuser-password" 2 s3astar
rad_recv: Access-Accept packet from host, id=51, length=20
[root@smallfry bin]#

In this case, freeradius was installed solely for the purposes of testing the shared secret password key from another network. This is a good troubleshooting tip to verify remote client access before deploying network equipment.

Cisco Client Setup

Here is a sample snippet of how to set up a Cisco device to use a RADIUS server. You can find full coverage of Cisco authentication, authorization, and accounting (AAA) setup using RADIUS on Cisco's corporate Web site at www.cisco.com.

aaa new-model
aaa authentication login default radius enable
aaa authentication ppp default radius
aaa authorization network radius
radius-server host
radius-server timeout 10
radius-server key shrtp3nc1l

The important thing to note in relation to our setup is that the radius-server statements define the RADIUS server's IP address and the shared secret password key.

Errors With Fedora Core 2

The interaction between LDAP and RADIUS on Fedora Core 2 seems to be plagued with a segmentation fault error that you can see on the RADIUS server when running in debug mode. The error looks like this:

ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection 
rlm_ldap: (re)connect to localhost:389, authentication 0
rlm_ldap: bind as / to localhost:389
 Segmentation fault

The only solution I have found is to install the Fedora Core 1 versions of the RADIUS and LDAP RPMs and to edit the /etc/yum.conf file to prevent them from being automatically updated to newer versions.

Common LDAP Administrative Tasks

Common LDAP Administrative Tasks

Here are some explanations of how to do many common LDAP tasks. They are all based on our sample organization with DNs of example and com.

Note: You need to always make sure that there are no entries for regular users in the /etc/passwd files of the LDAP clients. These should only reside on the LDAP server.

Starting and Stopping LDAP

You can use the chkconfig command to get ldap configured to start at boot:

[root@bigboy tmp]# chkconfig ldap on

To start, stop, or restart ldap after booting, use

[root@bigboy tmp]# service ldap start
[root@bigboy tmp]# service ldap stop
[root@bigboy tmp]# service ldap restart

Remember to restart the ldap process every time you make a change to the LDAP database file for the changes to take effect on the running process.

LDAP users changing their own passwords

LDAP users can modify their LDAP passwords using the regular passwd command.

[ldapuser@smallfry ldapuser]$ passwd
Changing password for user ldapuser.
Enter login(LDAP) password:
New password:
Retype new password:
LDAP password information changed for ldapuser
passwd: all authentication tokens updated successfully.
[ldapuser@smallfry ldapuser]$

LDAP Password Changes by LDAP User "root"

The following three commands will reset the password for ldapuser's account. The ldappasswd command automatically generates and sets the password unless run with the -S (prompt for new password) or -s (specify new password) command line options. When prompted for the LDAP password, use the unencrypted version of the root password you created and placed in your slapd.conf file.

[root@smallfry tmp]# ldappasswd -x -W -D cn=Manager,dc=example,dc=com" "uid=ldapuser,ou=People,dc=example,dc=com"
Enter LDAP password:
New password: c06Nb/MA
Result: Success (0)
[root@smallfry tmp]#

[root@smallfry tmp]# ldappasswd -S -x -W -D "cn=Manager,dc=example,dc=com" "uid=ldapuser,ou=People,dc=example,dc=com"
New password:
Re-enter new password:
Enter LDAP password:
Result: Success (0)
[root@smallfry tmp]#

[root@smallfry tmp]# ldappasswd -s NewpasS -x -W –D "cn=Manager,dc=example,dc=com" "uid=ldapuser,ou=People,dc=example,dc=com"
Enter LDAP password:
Result: Success (0)
[root@smallfry tmp]#

Modifying LDAP users by user "root"

One easy way for the system administrator to manage LDAP users is to modify the regular Linux users' characteristics on the LDAP server in the regular way and then run a script to automatically modify the LDAP database.

The Modify LDAP User Script

You can use the very simple sample script /usr/local/bin/modifyldapuser to extract a particular user's information from /etc/passwd and import it into your LDAP database.

The script works by using the grep command to extract the /etc/passwd user record to a temporary file. It then runs the migrate_passwd script on this data and outputs the result to a temporary LDIF file. Next, the script replaces the default padl DC with the example DC and exports this to the final LDIF file. Finally, the ldapmodify command does the update, and then the temporary files are deleted.

grep $1 /etc/passwd > /tmp/modifyldapuser.tmp
/usr/share/openldap/migration/migrate_passwd.pl \
   /tmp/modifyldapuser.tmp /tmp/modifyldapuser.ldif.tmp
cat /tmp/modifyldapuser.ldif.tmp | sed s/padl/example/ \
    > /tmp/modifyldapuser.ldif
ldapmodify -x -D "cn=Manager,dc=example,dc=com" -W -f \
rm -f /tmp/modifyldapuser.*

Remember to make the script executable and usable only by user root with the chmod command.

[root@bigboy tmp]# chmod 700 /usr/local/bin/modifyldapuser
[root@bigboy tmp]#

To use the script, modify the Linux user. In this case, modify the password for user ldapuser by running the modifyldapuser script using ldapuser as the argument. You will be prompted for the LDAP root password.

[root@bigboy tmp]# passwd ldapuser
Changing password for user ldapuser.
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
[root@bigboy tmp]# modifyldapuser ldapuser
Enter LDAP Password:
modifying entry "uid=ldapuser,ou=People,dc=example,dc=com"
[root@bigboy tmp]#

Adding new LDAP users

You can use the short script in this section to add LDAP users to your database. I'll also provide an example of how to use it.

Create an LDAP Add User Script

You can create a /usr/local/bin/addldapuser script based on the modifyldapuser script you created earlier. For example:


grep $1 /etc/passwd > /tmp/changeldappasswd.tmp
/usr/share/openldap/migration/migrate_passwd.pl \
    /tmp/changeldappasswd.tmp /tmp/changeldappasswd.ldif.tmp
cat /tmp/changeldappasswd.ldif.tmp | sed s/padl/example/ \
    > /tmp/changeldappasswd.ldif
ldapadd -x -D "cn=Manager,dc=example,dc=com" -W -f \
rm -f /tmp/changeldappasswd.*

Add the User to the Database

Adding the user to database takes three steps:

1. Create the Linux user on the LDAP server.

2. Run the addldapuser script with the username as the only argument. This example imports a previously created Linux user named ldapuser. The script prompts you for your LDAP root password.

[root@bigboy tmp]# addldapuser ldapuser
Enter LDAP Password:
adding new entry "uid=ldapuser,ou=People,dc=example,dc=com"
[root@bigboy tmp]#

3. Create home directories for the user on all the LDAP client Linux boxes.

Remember that this script adds existing Linux users to the LDAP database. The creation of Linux users still requires the use of the adduser command.

Deleting LDAP users

Sometimes you want to get rid of users instead of add them. You can create a /usr/local/bin/deleteldapuser script to delete LDAP users from your database. For example

ldapdelete -x -W -D "cn=Manager,dc=example,dc=com" \

To delete the user from the database, run the deleteldapuser script with the username as the only argument. This example below deletes a previously created Linux user named ldapuser. The script prompts you for your LDAP root password.

[root@bigboy tmp]# deleteldapuser ldapuser
Enter LDAP Password:
[root@bigboy tmp]#

LDAP Web Management Tools

Once you understand the principles behind LDAP management, you may want to use a graphical tool to help with further administration. If the tool misbehaves, at least you'll now know how to try to fix it behind the scenes from the command line.

The LDAP Account Manager (LAM), which is available at http://lam.sourceforge.net, is a well known, easy-to-use product. After you feel comfortable enough with the background tasks and concepts outlined in this chapter, you should give it a try.

Troubleshooting LDAP Logins

Troubleshooting LDAP Logins

You can never be certain about the functioning of any application unless you test it. LDAP is fairly complicated to install and should be as thoroughly tested as possible before you deploy it. Here are some steps you can take to help you sleep better at night.

Check Your /var/log/messages file

The first step is to see what type of error massages you are getting on both the LDAP server and client. Lots of valuable information can be obtained using this method and it is covered in much more detail in Chapter 5, "Troubleshooting Linux with syslog".Here are some messages that refer to common mistakes:

  • You have an unnecessary "ssl start_tls" statement in your client's /etc/ldap.conf file.

Mar 8 10:58:50 bigboy slapd[14842]: conn=6 op=0 RESULT oid= err=1 text=TLS already started

Testing Basic Connectivity

The very first step is to use TELNET to determine whether your LDAP server is accessible on TCP port 389 (LDAP) or 636 (LDAPS).

Lack of connectivity could be caused by a firewall in the path between the LDAP server and client or there could be firewall software running on the servers themselves.

Other sources of failure include LDAP not being started at all, the server could be down, or there could be a network related failure.

Troubleshooting with Telnet is covered in Chapter 4, "Simple Network Troubleshooting", on network troubleshooting.

Testing Using ldapsearch

Always run the ldapsearch command on both the LDAP client and server to test your LDAP configuration.

[root@smallfry tmp]# ldapsearch -x -b 'dc=example,dc=com' \

When LDAP is configured correctly, the command sends a full database listing to your screen.

Use SSH or the Linux console

Try to log in as user ldapuser to the LDAP client Linux system as an alternative test. If it fails, try restarting SSH on the LDAP client so that the /etc/nsswitch.conf file can be reread with the new LDAP information. This step is not required in all versions of Linux.

Use the tcpdump Command

If the LDAP configuration files appear correct and LDAP still doesn't work, then you should try using the tcpdump command, outlined in Chapter 4, "Simple Network Troubleshooting", to see whether your systems can correctly communicate with one another. A failure to communicate could be due to poor routing, misconfigured firewalls along the way, or possibly LDAP being turned off on the server.

Testing Regular LDAP

On the LDAP server, use the tcpdump command to listen for traffic on the regular LDAP port 389 or ldap. Run the ldapsearch command on the LDAP client.

[root@bigboy tmp]# tcpdump -n tcp port ldap

If everything is configured correctly, you should see bidirectional LDAP packet flows between the LDAP client and server.

Note: The insecurity of unencrypted LDAP client communication can also be demonstrated by using network packet capture. In this example, the tethereal command is used with the -x flag to view the ASCII contents of LDAP traffic between client and server. The username, password, UID (100), GID (503), shell (/bin/bash) and home directory (/home/ldapuser) of the ldapuser user can all be clearly seen in clear text. It is always a good practice to add an additional layer of security with LDAP TLS encryption which will eliminate this ASCII visibility.

If you are using the stunnel method you would set the tethereal TCP port to ldaps.

[root@bigboy ~]# tethereal -n  -x -i eth0  tcp port ldap
0050  69 64 3d 6c 64 61 70 75 73 65 72 2c 6f 75 3d 50   id=ldapuser,ou=P
0060  65 6f 70 6c 65 2c 64 63 3d 65 78 61 6d 70 6c 65   eople,dc=example
0070  2c 64 63 3d 63 6f 6d 30 82 01 04 30 11 04 03 75   ,dc=com0...0...u
0080  69 64 31 0a 04 08 6c 64 61 70 75 73 65 72 30 10   id1...ldapuser0.
0090  04 02 63 6e 31 0a 04 08 6c 64 61 70 75 73 65 72   ..cn1...ldapuser
00e0  75 73 65 72 50 61 73 73 77 6f 72 64 31 2b 04 29   userPassword1+.)
00f0  7b 63 72 79 70 74 7d 24 31 24 47 53 77 48 53 54   {crypt}$1$GSwHST
0100  4a 49 24 71 59 4d 65 66 47 32 4f 35 77 6a 7a 70   JI$qYMefG2O5wjzp
0110  77 42 2e 32 4b 70 58 48 31 30 19 04 0a 6c 6f 67   wB.2KpXH10...log
0120  69 6e 53 68 65 6c 6c 31 0b 04 09 2f 62 69 6e 2f   inShell1.../bin/
0130  62 61 73 68 30 12 04 09 75 69 64 4e 75 6d 62 65   bash0...uidNumbe
0140  72 31 05 04 03 35 30 33 30 12 04 09 67 69 64 4e   r1...5030...gidN
0150  75 6d 62 65 72 31 05 04 03 31 30 30 30 21 04 0d   umber1...1000!..
0160  68 6f 6d 65 44 69 72 65 63 74 6f 72 79 31 10 04   homeDirectory1..
0170  0e 2f 68 6f 6d 65 2f 6c 64 61 70 75 73 65 72      ./home/ldapuser
[root@bigboy ~]#

Testing Secure LDAP

On the LDAP server, when using stunnel, use the tcpdump command to listen for traffic on the secure LDAP port 636 or ldaps. With TLS you would use the regular LDAP port 389 or ldap with the command. Run theldapsearch command on the LDAP client and if everything is configured correctly, you should see packet flows such as this one.

[root@bigboy tmp]# tcpdump -n tcp port ldaps
tcpdump: listening on eth0
09:20:02.281257 > S 1665037104:1665037104(0) win 5840 <mss 1460,sackOK,timestamp 74401362 0,nop,wscale 0> (DF)
09:20:02.281356 > S 1911175072:1911175072(0) ack 1665037105 win 5792 <mss 1460,sackOK,timestamp 20737195 74401362,nop,wscale 0> (DF)
[root@bigboy tmp]#

Note: You can also verify the lack of ACSII strings being sent with LDAP encryption using the tetheralexample used previously. Remember to use ldap for TLS encryption and ldaps when using stunnel.

[root@bigboy ~]# tethereal -n  -x -i eth0  tcp port ldaps
0000  00 b0 d0 46 32 71 00 b0 d0 4e f2 18 08 00 45 00   ...F2q...N....E.
0010  01 3e 14 2c 40 00 40 06 a1 11 c0 a8 01 64 c0 a8   .>.,@.@......d..
0020  01 c8 90 ec 01 85 95 c1 c9 95 90 a3 67 01 80 18   ............g...
0030  08 88 3c 2c 00 00 01 01 08 0a 02 3e d3 b9 02 3e   ..<,.......>...>
0040  ea 23 17 03 01 00 20 a4 47 5e c4 54 87 66 a2 5a   .#.... .G^.T.f.Z
0050  5d ef 24 77 7f 9b c5 57 84 a1 b6 f0 10 ef 3e be   ].$w...W......>.
0060  bc 91 ec 31 a2 81 5e 17 03 01 00 e0 ee 34 fc 93   ...1..^......4..
0070  f9 b9 3f ba e7 fb 97 78 3e a0 25 09 77 bf c9 b0   ..?....x>.%.w...
0080  95 30 ca 6a e8 e7 7f cc a5 77 db e5 30 e6 34 ac   .0.j.....w..0.4.
0090  e3 d0 84 98 d5 97 1a b5 9f 2b 9c 11 41 b7 ae ed   .........+..A...
00a0  0e fc 54 52 89 fd 59 b0 77 42 d4 07 96 83 33 6f   ..TR..Y.wB....3o
00b0  fb 85 dd e7 90 dc 83 44 41 1f 8f 1d d3 29 60 28   .......DA....)`(
00c0  58 a7 22 8e 6e 16 01 5f fa f1 4f 69 31 78 1e 6c   X.".n.._..Oi1x.l
00d0  a4 23 9e 89 3a 9c 25 37 da 9d 27 03 d4 17 31 9e   .#..:.%7..'...1.
00e0  30 d8 25 d8 95 57 a3 7b 7f 77 20 7b f4 ee cd 7a   0.%..W.{.w {...z
00f0  9e 72 6f 21 80 2d d0 4c 66 f3 6f 40 e0 5d 31 43   .ro!.-.Lf.o@.]1C
0100  20 3c d2 2f 60 30 71 66 a4 7e 4a d2 3b b5 7c eb    <./`0qf.~J.;.|.
0110  11 15 06 49 ab 00 46 61 b3 a5 76 7e 2c 37 9d 88   ...I..Fa..v~,7..
0120  6b f9 5e 72 e7 f3 ad 1a 94 cb 81 40 3a 7b d5 cc   k.^r.......@:{..
0130  33 23 ad 82 46 29 a8 38 df 48 ba ea 23 87 15 4b   3#..F).8.H..#..K
0140  58 99 88 45 6a 54 e4 5a 54 81 4d bc               X..EjT.ZT.M.
[root@bigboy ~]#

LDAP Works but not When I Switch to LDAPS

An stunnel LDAPS configuration will default to using regular LDAP if there is an error with the SSL keys. This could be due to:

  • Incorrect permissions and ownerships on the key file and/or certificates.
  • Incorrectly configured ldap.conf and slapd.conf configuration files.

With TLS there could be other causes:

  • The server names in the certificates may not match the host parameters in both of the client's ldap.conffiles. A typical symptom of this is the ldapsearch command working when logged in as the root user, but LDAP based logins fail.
  • Incorrectly configured ldap.conf and slapd.conf configuration files.


The LDAP bind utility is used for each login and can give failure errors that are usually not very descriptive. Two of the main ones that usually occur when running the ldapadd command are

Can't contact LDAP server (81): This is usually caused by not configuring the correct IP address in the LDAP client's ldap.conf file.
Invalid credentials (49): This is usually caused by incorrect dc= statements in the configuration files or in commands used

Configuring Encrypted LDAP Communication

Configuring Encrypted LDAP Communication

There are two commonly mentioned methods of encrypting Linux LDAP communications between clients and servers. One method is through the use of the external stunnel utility that protects the data using SSL. The other method also uses SSL, but it is natively supported in LDAP by using its Transport Layer Security (TLS) option and is therefore easier to implement. This section describes both methods.

Using Transport Layer Security (TLS)Encryption

TLS is an updated version of the Secure Socket Layer (SSL) protocol used by many web browsers to do shopping cart checkouts. Like most certificate based encryption schemes it allows a client and server to talk in a trusted manner without the use of a password.

TLS will require you to create a certificate authority (CA) for your organization. A CA is a server that will manage the issuance and authentication of new server certificates used by the LDAP server for TLS. In the example that follows, the CA and LDAP servers are the same device, but guidelines are also provided on how the functions can be assigned to separate servers.

Note: Unlike the stunnel encryption method described later, TLS runs encrypted on LDAP's TCP port 389.

Before we begin configuration it is important to understand how TLS works. This will be discussed next.

How TLS Communication Works

There is a sequence of events that occur prior to the creation of an LDAP communication session using TLS. These include the following steps:

  1. Both the LDAP server and client need to be configured with a shared copy of a CA certificate beforehand.
  2. When the TLS LDAP connection is made, the client and server negotiate their SSL encryption scheme.
  3. The LDAP server then sends its public encryption key and its server certificate.
  4. The LDAP client inspects the server certificate to make sure that it hasn't expired and takes note of the name and key ID of the CA server that issued it. It then checks this CA information with all the CA certificates in its database to determine whether the server certificate should be trusted.
  5. If everything is valid, the LDAP client then creates a random "premaster" secret encryption key that it encrypts with the LDAP server's public key. It then sends the encrypted encryption key to the LDAP server.
  6. When public keys are created, a special "private" key is also simultaneously created. Anything encrypted with the public key can only be decrypted with the private key and vice versa. The server then uses its private key to extract the premaster key.
  7. The client and server then use the premaster key to generate a master secret that will be the same for both, but will never be transmitted so that a third-party cannot intercept it.
  8. The master secret key is then used to create session keys that will be used to encrypt all future communication between client and server for the duration of the TLS session.

Now that you understand the TLS process its time to start configuring secure LDAP.

Configuring the TLS Server

We are about to create our own CA server to create and sign server certificates. This process is known as creating a self-signed SSL certificate as opposed to having a trusted third party organization, such as Verisign, doing it on your behalf. The latter method is most commonly used by public websites in which the CA certificates of many well known and trusted CA companies already come installed on your PC as part of your Web browser installation. Configuration of the server isn't hard, but there are many steps. Let's go!

1. First you need to edit your /etc/sysconfig/ldap file to make ldap use its secure TCP port 636. Here we turn off regular SLAPD_LDAP that listens on the unencrypted port 389 and activate secure SLAPD_LDAPS.

# File: /etc/sysconfig/ldap
# Run slapd with -h "... ldap:/// ..."
#   yes/no, default: yes
# Run slapd with -h "... ldapi:/// ..."
#   yes/no, default: no
# Run slapd with -h "... ldaps:/// ..."
#   yes/no, default: no

2. The certificates are sensitive to the hostname of the LDAP server. We need to know what it is, bigboy.

[root@bigboy tmp]# hostname
[root@bigboy tmp]#

3. Enter the /etc/openldap/cacerts/ directory and generate an SSL key with the openssl command. Let's define the filename as server.pem and give the certificate a lifetime of 10 years, 3650 days. In a business environment, answer as many of the questions as you can. Note: In all cases the host name must be accurately provided. Make sure the hostname is defined in DNS, or listed in all the clients' /etc/hosts file.

[root@bigboy tmp]# cd /etc/openldap/cacerts/
[root@bigboy cacerts]# openssl req -newkey rsa:1024 \ 
-x509 -nodes -out server.pem -keyout server.pem -days 3650

Generating a 1024 bit RSA private key
writing new private key to 'server.pem'
You are about to be asked to enter information that will 
be incorporated into your certificate request.
What you are about to enter is what is called a 
Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
Country Name (2 letter code) [GB]:
State or Province Name (full name) [Berkshire]:
Locality Name (eg, city) [Newbury]:
Organization Name (eg, company) [My Company Ltd]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []:bigboy
Email Address []:
[root@bigboy cacerts]#

4. Verify the encrypted server.pem file has been created, it should look like this.

[root@bigboy cacerts]# cat server.pem 
[root@bigboy cacerts]#

5. Each LDAP client will need a copy of the CERTIFICATE part of the file. The grep command can easily extract this information and place it into a file named client.pem.

[root@bigboy cacerts]# grep -A 100 CERTIFICATE \
   server.pem > client.pem

6. Next we need to edit the /etc/openldap/slapd.conf file to activate TLS encryption of all incoming connections to the server. In the TLS section make reference to your server.pem file.

# File: /etc/openldap/slapd.conf

TLSCipherSuite          HIGH:MEDIUM:+SSLv2:+SSLv3:RSA
TLSCACertificateFile    /etc/openldap/cacerts/server.pem
TLSCertificateFile      /etc/openldap/cacerts/server.pem
TLSCertificateKeyFile   /etc/openldap/cacerts/server.pem
TLSVerifyClient         allow

7. Copy the client.pem file to your LDAP client's /etc/openldap/cacerts/ directory.

[root@bigboy openldap]# scp cacerts/client.pem \
root@smallfry's password: 
client.pem                         100% 1090     1.1KB/s   00:00    
[root@bigboy openldap]#

8. The LDAP daemon won't start properly unless the files in the /etc/openldap/cacerts directory are owned by the ldap user. We need to change this.

[root@bigboy openldap]# chown ldap:ldap cacerts/*

9. Restart the ldap daemon to make these changes take effect.

[root@bigboy openldap]# service ldap restart
Stopping slapd: [  OK  ]
Starting slapd: [  OK  ]
[root@bigboy openldap]# 

10. Make sure LDAP is listening on the TCP port reserved for secure ldaps. This can be done using the netstat command and you should get a response showing ldaps is listening for new connections like this.

[root@bigboy openldap]# netstat -a | grep ldap
tcp    0  0 *:ldaps      *:*    LISTEN      
[root@bigboy openldap]# 

It's now time to take a look at what needs to be done on the client side.

Configuring the TLS Client

Configuration of the client is much quicker as you will soon see. Here are the steps:

1. Run authconfig-tui and make sure your options match these screens.

 -------------------Authentication Configuration ------------------- |                                                                 | |  User Information        Authentication                         | |  [ ] Cache Information   [*] Use MD5 Passwords                  | |  [ ] Use Hesiod          [*] Use Shadow Passwords               | |  [*] Use LDAP            [*] Use LDAP Authentication            | |  [ ] Use NIS             [ ] Use Kerberos                       | |  [ ] Use Winbind         [ ] Use SMB Authentication             | |                          [ ] Use Winbind Authentication         | |                          [ ] Local authorization is sufficient  | |                                                                 | |            ----------                      --------             | |            | Cancel |                      | Next |             | |            ----------                      --------             | |                                                                 | |                                                                 | ------------------------------------------------------------------- 

 ------------------- LDAP Settings ------------------- |                                                   | |          [*] Use TLS                              | |  Server: bigboy.my-web-site.org__________________ | | Base DN: dc=example,dc=com_______________________ | |                                                   | |         --------                  ------          | |         | Back |                  | Ok |          | |         --------                  ------          | |                                                   | |                                                   | ----------------------------------------------------- 

2. Review the contents of /etc/ldap.conf and make sure they have the following entries. The host must match the hostname of the certificate.

# File: /etc/ldap.conf

uri ldaps://bigboy/
#ssl start_tls
tls_cacertdir /etc/openldap/cacerts

Note: Comment out the ssl statement as it can cause conflicts which will make remote logins fail while passing all other LDAP tests. 3. Review the contents of /etc/openldap/ldap.conf and make sure they have the following entries. The ldaps:// host must match the hostname of the certificate.

# File: /etc/openldap/ldap.conf

URI ldaps://bigboy/
BASE dc=example,dc=com
TLS_CACERTDIR /etc/openldap/cacerts

4. Test to make sure you can get access to the ldap server with the ldapsearch command using the –x flag.

[root@smallfry tmp]# ldapsearch -x 
dn: uid=ldapuser,ou=People,dc=example,dc=com
uid: ldapuser
cn: ldapuser
objectClass: account
objectClass: posixAccount
objectClass: top
objectClass: shadowAccount
userPassword:: e2NyeXB0fSQxJDRGL2huRzdjZrV2w5cDA=
shadowLastChange: 13942
shadowMax: 99999
shadowWarning: 7
loginShell: /bin/bash
uidNumber: 504
gidNumber: 100
homeDirectory: /home/ldapuser
[root@smallfry tmp]#

5. A further test is to see whether you can get the LDAP server to send you a copy of its certificate using the openssl command like this.

[root@smallfry tmp]# openssl s_client -connect bigboy:636 \

depth=0 /C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd/CN=bigboy
verify error:num=18:self signed certificate
verify return:1
Certificate chain
 0 s:/C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd/CN=bigboy
   i:/C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd/CN=bigboy
Server certificate
subject=/C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd/CN=bigboy
issuer=/C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd/CN=bigboy
Acceptable client certificate CA names
/C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd/CN=bigboy
SSL handshake has read 1031 bytes and written 343 bytes
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 1024 bit
Compression: NONE
Expansion: NONE
    Protocol  : TLSv1
    Cipher    : AES256-SHA
    Key-Arg   : None
    Krb5 Principal: None
    Verify return code: 18 (self signed certificate)

[root@smallfry tmp]#

6. Test logging into your LDAP client using the ldapuser we created earlier when testing insecure LDAP.

[root@smallfry tmp]# ssh -l ldapuser localhost
ldapuser@localhost's password: 
Last login: Sat Mar  8 11:01:01 2008 from bigboy-fc8
[ldapuser@smallfry ~]$ exit
[root@smallfry tmp]#

LDAP is now configured for you, and your home office to use.