2002-06-12 23:59:10 -04:00
|
|
|
.TH LDAP.CONF 5 "RELEASEDATE" "OpenLDAP LDVERSION"
|
1999-09-12 00:41:47 -04:00
|
|
|
.\" $OpenLDAP$
|
2021-01-11 14:25:53 -05:00
|
|
|
.\" Copyright 1998-2021 The OpenLDAP Foundation All Rights Reserved.
|
1999-09-12 00:41:47 -04:00
|
|
|
.\" Copying restrictions apply. See COPYRIGHT/LICENSE.
|
1998-11-29 15:58:40 -05:00
|
|
|
.SH NAME
|
2008-08-20 10:21:10 -04:00
|
|
|
ldap.conf, .ldaprc \- LDAP configuration file/environment variables
|
1998-11-29 15:58:40 -05:00
|
|
|
.SH SYNOPSIS
|
2008-08-20 10:21:10 -04:00
|
|
|
ETCDIR/ldap.conf, ldaprc, .ldaprc, $LDAP<option-name>
|
1998-11-29 15:58:40 -05:00
|
|
|
.SH DESCRIPTION
|
2002-09-04 16:59:57 -04:00
|
|
|
If the environment variable \fBLDAPNOINIT\fP is defined, all
|
|
|
|
|
defaulting is disabled.
|
|
|
|
|
.LP
|
1998-11-29 15:58:40 -05:00
|
|
|
The
|
|
|
|
|
.I ldap.conf
|
|
|
|
|
configuration file is used to set system-wide defaults to be applied when
|
|
|
|
|
running
|
|
|
|
|
.I ldap
|
2002-09-04 16:59:57 -04:00
|
|
|
clients.
|
1999-01-14 18:04:08 -05:00
|
|
|
.LP
|
2002-06-16 03:19:31 -04:00
|
|
|
Users may create an optional configuration file,
|
|
|
|
|
.I ldaprc
|
2002-05-08 22:07:41 -04:00
|
|
|
or
|
1998-11-29 15:58:40 -05:00
|
|
|
.IR .ldaprc ,
|
2002-06-16 03:19:31 -04:00
|
|
|
in their home directory which will be used to override the system-wide
|
1999-01-14 18:04:08 -05:00
|
|
|
defaults file.
|
2002-05-08 22:07:41 -04:00
|
|
|
The file
|
2002-06-16 03:19:31 -04:00
|
|
|
.I ldaprc
|
2002-05-08 22:07:41 -04:00
|
|
|
in the current working directory is also used.
|
1999-01-14 18:04:08 -05:00
|
|
|
.LP
|
2002-09-04 16:59:57 -04:00
|
|
|
.LP
|
1999-01-14 18:04:08 -05:00
|
|
|
Additional configuration files can be specified using
|
|
|
|
|
the \fBLDAPCONF\fP and \fBLDAPRC\fP environment variables.
|
2002-06-16 03:19:31 -04:00
|
|
|
\fBLDAPCONF\fP may be set to the path of a configuration file. This
|
|
|
|
|
path can be absolute or relative to the current working directory.
|
|
|
|
|
The \fBLDAPRC\fP, if defined, should be the basename of a file
|
1999-01-14 18:04:08 -05:00
|
|
|
in the current working directory or in the user's home directory.
|
|
|
|
|
.LP
|
|
|
|
|
Environmental variables may also be used to augment the file based defaults.
|
2002-06-16 03:19:31 -04:00
|
|
|
The name of the variable is the option name with an added prefix of \fBLDAP\fP.
|
|
|
|
|
For example, to define \fBBASE\fP via the environment, set the variable
|
|
|
|
|
\fBLDAPBASE\fP to the desired value.
|
1999-12-16 22:27:16 -05:00
|
|
|
.LP
|
2009-06-02 20:43:44 -04:00
|
|
|
Some options are user-only. Such options are ignored if present
|
1999-12-16 22:27:16 -05:00
|
|
|
in the
|
2002-06-16 03:19:31 -04:00
|
|
|
.I ldap.conf
|
1999-12-16 22:27:16 -05:00
|
|
|
(or file specified by
|
|
|
|
|
.BR LDAPCONF ).
|
2008-08-20 10:21:10 -04:00
|
|
|
.LP
|
|
|
|
|
Thus the following files and variables are read, in order:
|
|
|
|
|
.nf
|
|
|
|
|
variable $LDAPNOINIT, and if that is not set:
|
|
|
|
|
system file ETCDIR/ldap.conf,
|
|
|
|
|
user files $HOME/ldaprc, $HOME/.ldaprc, ./ldaprc,
|
|
|
|
|
system file $LDAPCONF,
|
|
|
|
|
user files $HOME/$LDAPRC, $HOME/.$LDAPRC, ./$LDAPRC,
|
2009-11-18 13:22:53 -05:00
|
|
|
variables $LDAP<uppercase option name>.
|
2008-08-20 10:21:10 -04:00
|
|
|
.fi
|
|
|
|
|
Settings late in the list override earlier ones.
|
2009-11-18 13:22:53 -05:00
|
|
|
.SH SYNTAX
|
2004-10-27 07:26:27 -04:00
|
|
|
The configuration options are case-insensitive;
|
|
|
|
|
their value, on a case by case basis, may be case-sensitive.
|
2006-09-12 17:02:30 -04:00
|
|
|
.LP
|
2009-11-18 13:22:53 -05:00
|
|
|
Blank lines are ignored.
|
|
|
|
|
.br
|
|
|
|
|
Lines beginning with a hash mark (`#') are comments, and ignored.
|
2006-09-12 17:02:30 -04:00
|
|
|
.LP
|
|
|
|
|
Valid lines are made of an option's name (a sequence of non-blanks,
|
|
|
|
|
conventionally written in uppercase, although not required),
|
|
|
|
|
followed by a value.
|
|
|
|
|
The value starts with the first non-blank character after
|
|
|
|
|
the option's name, and terminates at the end of the line,
|
|
|
|
|
or at the last sequence of blanks before the end of the line.
|
|
|
|
|
The tokenization of the value, if any, is delegated to the handler(s)
|
|
|
|
|
for that option, if any. Quoting values that contain blanks
|
|
|
|
|
may be incorrect, as the quotes would become part of the value.
|
|
|
|
|
For example,
|
|
|
|
|
|
2009-11-18 13:22:53 -05:00
|
|
|
.nf
|
|
|
|
|
# Wrong - erroneous quotes:
|
|
|
|
|
URI "ldap:// ldaps://"
|
2006-09-12 17:02:30 -04:00
|
|
|
|
2009-11-18 13:22:53 -05:00
|
|
|
# Right - space-separated list of URIs, without quotes:
|
|
|
|
|
URI ldap:// ldaps://
|
2006-09-12 17:02:30 -04:00
|
|
|
|
2009-11-18 13:22:53 -05:00
|
|
|
# Right - DN syntax needs quoting for Example, Inc:
|
|
|
|
|
BASE ou=IT staff,o="Example, Inc",c=US
|
|
|
|
|
# or:
|
2018-06-14 11:08:36 -04:00
|
|
|
BASE ou=IT staff,o=Example\\2C Inc,c=US
|
2006-09-12 17:02:30 -04:00
|
|
|
|
2009-11-18 13:22:53 -05:00
|
|
|
# Wrong - comment on same line as option:
|
|
|
|
|
DEREF never # Never follow aliases
|
|
|
|
|
.fi
|
2006-09-12 17:02:30 -04:00
|
|
|
.LP
|
|
|
|
|
A line cannot be longer than LINE_MAX, which should be more than 2000 bytes
|
|
|
|
|
on all platforms.
|
|
|
|
|
There is no mechanism to split a long line on multiple lines, either for
|
|
|
|
|
beautification or to overcome the above limit.
|
2009-11-18 13:22:53 -05:00
|
|
|
.SH OPTIONS
|
1998-11-29 15:58:40 -05:00
|
|
|
The different configuration options are:
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2006-10-09 15:18:03 -04:00
|
|
|
.B URI <ldap[si]://[name[:port]] ...>
|
2003-02-09 01:49:34 -05:00
|
|
|
Specifies the URI(s) of an LDAP server(s) to which the
|
|
|
|
|
.I LDAP
|
2006-10-09 15:18:03 -04:00
|
|
|
library should connect. The URI scheme may be any of
|
|
|
|
|
.BR ldap ,
|
2003-02-09 01:49:34 -05:00
|
|
|
.B ldaps
|
2006-10-09 15:18:03 -04:00
|
|
|
or
|
|
|
|
|
.BR ldapi ,
|
|
|
|
|
which refer to LDAP over TCP, LDAP over SSL (TLS) and LDAP
|
2006-10-09 15:26:41 -04:00
|
|
|
over IPC (UNIX domain sockets), respectively.
|
2003-02-09 01:49:34 -05:00
|
|
|
Each server's name can be specified as a
|
|
|
|
|
domain-style name or an IP address literal. Optionally, the
|
|
|
|
|
server's name can followed by a ':' and the port number the LDAP
|
|
|
|
|
server is listening on. If no port number is provided, the default
|
|
|
|
|
port for the scheme is used (389 for ldap://, 636 for ldaps://).
|
2006-10-09 15:26:41 -04:00
|
|
|
For LDAP over IPC,
|
2006-10-09 15:18:03 -04:00
|
|
|
.B name
|
|
|
|
|
is the name of the socket, and no
|
|
|
|
|
.B port
|
2006-10-09 15:26:41 -04:00
|
|
|
is required, nor allowed; note that directory separators must be
|
|
|
|
|
URL-encoded, like any other characters that are special to URLs;
|
|
|
|
|
so the socket
|
2006-10-09 15:18:03 -04:00
|
|
|
|
|
|
|
|
/usr/local/var/ldapi
|
|
|
|
|
|
|
|
|
|
must be specified as
|
|
|
|
|
|
|
|
|
|
ldapi://%2Fusr%2Flocal%2Fvar%2Fldapi
|
|
|
|
|
|
2003-02-09 01:49:34 -05:00
|
|
|
A space separated list of URIs may be provided.
|
|
|
|
|
.TP
|
2002-06-16 03:19:31 -04:00
|
|
|
.B BASE <base>
|
|
|
|
|
Specifies the default base DN to use when performing ldap operations.
|
1998-11-29 15:58:40 -05:00
|
|
|
The base must be specified as a Distinguished Name in LDAP format.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
|
|
|
|
.B BINDDN <dn>
|
|
|
|
|
Specifies the default bind DN to use when performing ldap operations.
|
1999-12-16 22:27:16 -05:00
|
|
|
The bind DN must be specified as a Distinguished Name in LDAP format.
|
2009-06-02 20:43:44 -04:00
|
|
|
.B This is a user-only option.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2006-11-13 11:39:44 -05:00
|
|
|
.B DEREF <when>
|
|
|
|
|
Specifies how alias dereferencing is done when performing a search. The
|
|
|
|
|
.B <when>
|
|
|
|
|
can be specified as one of the following keywords:
|
|
|
|
|
.RS
|
|
|
|
|
.TP
|
|
|
|
|
.B never
|
|
|
|
|
Aliases are never dereferenced. This is the default.
|
|
|
|
|
.TP
|
|
|
|
|
.B searching
|
|
|
|
|
Aliases are dereferenced in subordinates of the base object, but
|
|
|
|
|
not in locating the base object of the search.
|
|
|
|
|
.TP
|
|
|
|
|
.B finding
|
|
|
|
|
Aliases are only dereferenced when locating the base object of the search.
|
|
|
|
|
.TP
|
|
|
|
|
.B always
|
|
|
|
|
Aliases are dereferenced both in searching and in locating the base object
|
|
|
|
|
of the search.
|
|
|
|
|
.RE
|
|
|
|
|
.TP
|
|
|
|
|
.TP
|
2002-06-16 03:19:31 -04:00
|
|
|
.B HOST <name[:port] ...>
|
|
|
|
|
Specifies the name(s) of an LDAP server(s) to which the
|
2003-02-09 01:49:34 -05:00
|
|
|
.I LDAP
|
2002-06-16 03:19:31 -04:00
|
|
|
library should connect. Each server's name can be specified as a
|
|
|
|
|
domain-style name or an IP address and optionally followed by a ':' and
|
1998-11-29 15:58:40 -05:00
|
|
|
the port number the ldap server is listening on. A space separated
|
2002-06-16 03:19:31 -04:00
|
|
|
list of hosts may be provided.
|
2003-02-09 01:49:34 -05:00
|
|
|
.B HOST
|
|
|
|
|
is deprecated in favor of
|
2003-05-16 21:08:09 -04:00
|
|
|
.BR URI .
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2006-11-13 11:39:44 -05:00
|
|
|
.B NETWORK_TIMEOUT <integer>
|
|
|
|
|
Specifies the timeout (in seconds) after which the poll(2)/select(2)
|
|
|
|
|
following a connect(2) returns in case of no activity.
|
|
|
|
|
.TP
|
2002-06-16 03:19:31 -04:00
|
|
|
.B PORT <port>
|
|
|
|
|
Specifies the default port used when connecting to LDAP servers(s).
|
1998-11-29 15:58:40 -05:00
|
|
|
The port may be specified as a number.
|
2003-02-09 01:49:34 -05:00
|
|
|
.B PORT
|
|
|
|
|
is deprecated in favor of
|
|
|
|
|
.BR URI.
|
|
|
|
|
.TP
|
2005-07-04 08:01:19 -04:00
|
|
|
.B REFERRALS <on/true/yes/off/false/no>
|
|
|
|
|
Specifies if the client should automatically follow referrals returned
|
|
|
|
|
by LDAP servers.
|
|
|
|
|
The default is on.
|
|
|
|
|
Note that the command line tools
|
|
|
|
|
.BR ldapsearch (1)
|
|
|
|
|
&co always override this option.
|
2006-11-13 18:51:52 -05:00
|
|
|
.\" This should only be allowed via ldap_set_option(3)
|
|
|
|
|
.\".TP
|
|
|
|
|
.\".B RESTART <on/true/yes/off/false/no>
|
|
|
|
|
.\"Determines whether the library should implicitly restart connections (FIXME).
|
2006-11-13 11:39:44 -05:00
|
|
|
.TP
|
2003-02-09 01:49:34 -05:00
|
|
|
.B SIZELIMIT <integer>
|
2009-05-27 08:37:00 -04:00
|
|
|
Specifies a size limit (number of entries) to use when performing searches.
|
|
|
|
|
The number should be a non-negative integer. \fISIZELIMIT\fP of zero (0)
|
|
|
|
|
specifies a request for unlimited search size. Please note that the server
|
|
|
|
|
may still apply any server-side limit on the amount of entries that can be
|
|
|
|
|
returned by a search operation.
|
2003-02-09 01:49:34 -05:00
|
|
|
.TP
|
|
|
|
|
.B TIMELIMIT <integer>
|
2009-05-27 08:37:00 -04:00
|
|
|
Specifies a time limit (in seconds) to use when performing searches.
|
|
|
|
|
The number should be a non-negative integer. \fITIMELIMIT\fP of zero (0)
|
|
|
|
|
specifies unlimited search time to be used. Please note that the server
|
|
|
|
|
may still apply any server-side limit on the duration of a search operation.
|
2019-06-21 07:44:06 -04:00
|
|
|
.TP
|
2006-09-25 22:54:34 -04:00
|
|
|
.B VERSION {2|3}
|
|
|
|
|
Specifies what version of the LDAP protocol should be used.
|
|
|
|
|
.TP
|
|
|
|
|
.B TIMEOUT <integer>
|
2007-02-16 06:52:46 -05:00
|
|
|
Specifies a timeout (in seconds) after which calls to synchronous LDAP
|
|
|
|
|
APIs will abort if no response is received. Also used for any
|
|
|
|
|
.BR ldap_result (3)
|
|
|
|
|
calls where a NULL timeout parameter is supplied.
|
2003-02-09 01:49:34 -05:00
|
|
|
.SH SASL OPTIONS
|
|
|
|
|
If OpenLDAP is built with Simple Authentication and Security Layer support,
|
|
|
|
|
there are more options you can specify.
|
|
|
|
|
.TP
|
|
|
|
|
.B SASL_MECH <mechanism>
|
|
|
|
|
Specifies the SASL mechanism to use.
|
|
|
|
|
.TP
|
|
|
|
|
.B SASL_REALM <realm>
|
|
|
|
|
Specifies the SASL realm.
|
|
|
|
|
.TP
|
|
|
|
|
.B SASL_AUTHCID <authcid>
|
|
|
|
|
Specifies the authentication identity.
|
2009-06-02 20:43:44 -04:00
|
|
|
.B This is a user-only option.
|
2003-02-09 01:49:34 -05:00
|
|
|
.TP
|
|
|
|
|
.B SASL_AUTHZID <authcid>
|
|
|
|
|
Specifies the proxy authorization identity.
|
2009-06-02 20:43:44 -04:00
|
|
|
.B This is a user-only option.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
|
|
|
|
.B SASL_SECPROPS <properties>
|
|
|
|
|
Specifies Cyrus SASL security properties. The
|
|
|
|
|
.B <properties>
|
|
|
|
|
can be specified as a comma-separated list of the following:
|
|
|
|
|
.RS
|
|
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B none
|
2002-06-16 03:19:31 -04:00
|
|
|
(without any other properties) causes the properties
|
2000-08-23 21:09:18 -04:00
|
|
|
defaults ("noanonymous,noplain") to be cleared.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B noplain
|
2002-06-16 03:19:31 -04:00
|
|
|
disables mechanisms susceptible to simple passive attacks.
|
|
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B noactive
|
2002-06-16 03:19:31 -04:00
|
|
|
disables mechanisms susceptible to active attacks.
|
|
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B nodict
|
2002-06-16 03:19:31 -04:00
|
|
|
disables mechanisms susceptible to passive dictionary attacks.
|
|
|
|
|
.TP
|
|
|
|
|
.B noanonymous
|
|
|
|
|
disables mechanisms which support anonymous login.
|
|
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B forwardsec
|
2002-06-16 03:19:31 -04:00
|
|
|
requires forward secrecy between sessions.
|
|
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B passcred
|
2002-06-16 03:19:31 -04:00
|
|
|
requires mechanisms which pass client credentials (and allows
|
2000-08-23 21:09:18 -04:00
|
|
|
mechanisms which can pass credentials to do so).
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B minssf=<factor>
|
2002-06-16 03:19:31 -04:00
|
|
|
specifies the minimum acceptable
|
2000-08-23 21:09:18 -04:00
|
|
|
.I security strength factor
|
2021-02-17 08:20:05 -05:00
|
|
|
as an integer approximate to effective key length used for
|
2000-08-23 21:09:18 -04:00
|
|
|
encryption. 0 (zero) implies no protection, 1 implies integrity
|
2021-02-17 08:20:05 -05:00
|
|
|
protection only, 128 allows RC4, Blowfish and other similar ciphers,
|
|
|
|
|
256 will require modern ciphers. The default is 0.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B maxssf=<factor>
|
2002-06-16 03:19:31 -04:00
|
|
|
specifies the maximum acceptable
|
2000-08-23 21:09:18 -04:00
|
|
|
.I security strength factor
|
2002-06-16 03:19:31 -04:00
|
|
|
as an integer (see
|
|
|
|
|
.B minssf
|
|
|
|
|
description). The default is
|
|
|
|
|
.BR INT_MAX .
|
|
|
|
|
.TP
|
2000-08-23 21:09:18 -04:00
|
|
|
.B maxbufsize=<factor>
|
2002-06-16 03:19:31 -04:00
|
|
|
specifies the maximum security layer receive buffer
|
2000-08-23 21:09:18 -04:00
|
|
|
size allowed. 0 disables security layers. The default is 65536.
|
2002-06-16 03:19:31 -04:00
|
|
|
.RE
|
2012-02-22 07:04:49 -05:00
|
|
|
.TP
|
|
|
|
|
.B SASL_NOCANON <on/true/yes/off/false/no>
|
|
|
|
|
Do not perform reverse DNS lookups to canonicalize SASL host names. The default is off.
|
2020-04-14 09:10:48 -04:00
|
|
|
.TP
|
|
|
|
|
.B SASL_CBINDING <none/tls-unique/tls-endpoint>
|
|
|
|
|
The channel-binding type to use, see also LDAP_OPT_X_SASL_CBINDING. The default is none.
|
2008-10-09 06:51:28 -04:00
|
|
|
.SH GSSAPI OPTIONS
|
|
|
|
|
If OpenLDAP is built with Generic Security Services Application Programming Interface support,
|
|
|
|
|
there are more options you can specify.
|
|
|
|
|
.TP
|
|
|
|
|
.B GSSAPI_SIGN <on/true/yes/off/false/no>
|
|
|
|
|
Specifies if GSSAPI signing (GSS_C_INTEG_FLAG) should be used.
|
|
|
|
|
The default is off.
|
|
|
|
|
.TP
|
|
|
|
|
.B GSSAPI_ENCRYPT <on/true/yes/off/false/no>
|
|
|
|
|
Specifies if GSSAPI encryption (GSS_C_INTEG_FLAG and GSS_C_CONF_FLAG)
|
|
|
|
|
should be used. The default is off.
|
|
|
|
|
.TP
|
|
|
|
|
.B GSSAPI_ALLOW_REMOTE_PRINCIPAL <on/true/yes/off/false/no>
|
2013-04-09 06:41:38 -04:00
|
|
|
Specifies if GSSAPI based authentication should try to form the
|
2008-10-09 06:51:28 -04:00
|
|
|
target principal name out of the ldapServiceName or dnsHostName
|
|
|
|
|
attribute of the targets RootDSE entry. The default is off.
|
2002-06-16 03:19:31 -04:00
|
|
|
.SH TLS OPTIONS
|
2003-02-09 01:49:34 -05:00
|
|
|
If OpenLDAP is built with Transport Layer Security support, there
|
2003-05-21 20:15:57 -04:00
|
|
|
are more options you can specify. These options are used when an
|
|
|
|
|
.B ldaps:// URI
|
|
|
|
|
is selected (by default or otherwise) or when the application
|
2005-12-19 19:39:41 -05:00
|
|
|
negotiates TLS by issuing the LDAP StartTLS operation.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
|
|
|
|
.B TLS_CACERT <filename>
|
|
|
|
|
Specifies the file that contains certificates for all of the Certificate
|
|
|
|
|
Authorities the client will recognize.
|
|
|
|
|
.TP
|
|
|
|
|
.B TLS_CACERTDIR <path>
|
|
|
|
|
Specifies the path of a directory that contains Certificate Authority
|
|
|
|
|
certificates in separate individual files. The
|
2002-06-16 03:29:06 -04:00
|
|
|
.B TLS_CACERT
|
|
|
|
|
is always used before
|
2002-06-16 03:19:31 -04:00
|
|
|
.B TLS_CACERTDIR.
|
|
|
|
|
.TP
|
|
|
|
|
.B TLS_CERT <filename>
|
2003-02-09 01:49:34 -05:00
|
|
|
Specifies the file that contains the client certificate.
|
2009-06-02 20:43:44 -04:00
|
|
|
.B This is a user-only option.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2020-08-20 10:07:55 -04:00
|
|
|
.B TLS_ECNAME <name>
|
|
|
|
|
Specify the name of the curve(s) to use for Elliptic curve Diffie-Hellman
|
|
|
|
|
ephemeral key exchange. This option is only used for OpenSSL.
|
|
|
|
|
This option is not used with GnuTLS; the curves may be
|
|
|
|
|
chosen in the GnuTLS ciphersuite specification.
|
|
|
|
|
.TP
|
2002-06-16 03:19:31 -04:00
|
|
|
.B TLS_KEY <filename>
|
|
|
|
|
Specifies the file that contains the private key that matches the certificate
|
|
|
|
|
stored in the
|
|
|
|
|
.B TLS_CERT
|
|
|
|
|
file. Currently, the private key must not be protected with a password, so
|
2006-04-09 18:25:29 -04:00
|
|
|
it is of critical importance that the key file is protected carefully.
|
2009-06-02 20:43:44 -04:00
|
|
|
.B This is a user-only option.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
2004-09-05 03:21:20 -04:00
|
|
|
.B TLS_CIPHER_SUITE <cipher-suite-spec>
|
|
|
|
|
Specifies acceptable cipher suite and preference order.
|
2011-01-31 16:45:24 -05:00
|
|
|
<cipher-suite-spec> should be a cipher specification for
|
2020-04-17 13:19:25 -04:00
|
|
|
the TLS library in use (OpenSSL or GnuTLS).
|
2011-01-06 13:11:46 -05:00
|
|
|
Example:
|
|
|
|
|
.RS
|
|
|
|
|
.RS
|
|
|
|
|
.TP
|
|
|
|
|
.I OpenSSL:
|
|
|
|
|
TLS_CIPHER_SUITE HIGH:MEDIUM:+SSLv2
|
|
|
|
|
.TP
|
2011-01-31 16:45:24 -05:00
|
|
|
.I GnuTLS:
|
2011-01-06 13:11:46 -05:00
|
|
|
TLS_CIPHER_SUITE SECURE256:!AES-128-CBC
|
|
|
|
|
.RE
|
2009-01-25 21:54:32 -05:00
|
|
|
|
2011-01-06 13:11:46 -05:00
|
|
|
To check what ciphers a given spec selects in OpenSSL, use:
|
2009-01-25 21:54:32 -05:00
|
|
|
|
|
|
|
|
.nf
|
2009-06-02 20:43:44 -04:00
|
|
|
openssl ciphers \-v <cipher-suite-spec>
|
2009-01-25 21:54:32 -05:00
|
|
|
.fi
|
|
|
|
|
|
2011-01-31 16:45:24 -05:00
|
|
|
With GnuTLS the available specs can be found in the manual page of
|
2011-01-06 13:11:46 -05:00
|
|
|
.BR gnutls\-cli (1)
|
|
|
|
|
(see the description of the
|
|
|
|
|
option
|
|
|
|
|
.BR \-\-priority ).
|
|
|
|
|
|
2011-01-31 16:45:24 -05:00
|
|
|
In older versions of GnuTLS, where gnutls\-cli does not support the option
|
2011-01-06 13:11:46 -05:00
|
|
|
\-\-priority, you can obtain the \(em more limited \(em list of ciphers by calling:
|
2009-01-25 21:54:32 -05:00
|
|
|
|
|
|
|
|
.nf
|
2011-01-06 13:11:46 -05:00
|
|
|
gnutls\-cli \-l
|
2009-01-25 21:54:32 -05:00
|
|
|
.fi
|
2011-01-06 13:11:46 -05:00
|
|
|
.RE
|
2004-09-05 03:21:20 -04:00
|
|
|
.TP
|
2013-07-29 09:38:27 -04:00
|
|
|
.B TLS_PROTOCOL_MIN <major>[.<minor>]
|
2013-07-29 09:40:02 -04:00
|
|
|
Specifies minimum SSL/TLS protocol version that will be negotiated.
|
2013-07-29 09:38:27 -04:00
|
|
|
If the server doesn't support at least that version,
|
|
|
|
|
the SSL handshake will fail.
|
|
|
|
|
To require TLS 1.x or higher, set this option to 3.(x+1),
|
|
|
|
|
e.g.,
|
2013-07-29 09:50:18 -04:00
|
|
|
|
|
|
|
|
.nf
|
|
|
|
|
TLS_PROTOCOL_MIN 3.2
|
|
|
|
|
.fi
|
|
|
|
|
|
2013-07-29 09:38:27 -04:00
|
|
|
would require TLS 1.1.
|
|
|
|
|
Specifying a minimum that is higher than that supported by the
|
2013-07-29 09:40:02 -04:00
|
|
|
OpenLDAP implementation will result in it requiring the
|
2013-07-29 09:38:27 -04:00
|
|
|
highest level that it does support.
|
2013-07-29 09:40:02 -04:00
|
|
|
This parameter is ignored with GnuTLS.
|
2013-07-29 09:38:27 -04:00
|
|
|
.TP
|
2002-06-16 03:19:31 -04:00
|
|
|
.B TLS_RANDFILE <filename>
|
|
|
|
|
Specifies the file to obtain random bits from when /dev/[u]random is
|
|
|
|
|
not available. Generally set to the name of the EGD/PRNGD socket.
|
|
|
|
|
The environment variable RANDFILE can also be used to specify the filename.
|
2020-04-17 13:19:25 -04:00
|
|
|
This parameter is ignored with GnuTLS.
|
2002-06-16 03:19:31 -04:00
|
|
|
.TP
|
|
|
|
|
.B TLS_REQCERT <level>
|
|
|
|
|
Specifies what checks to perform on server certificates in a TLS session,
|
|
|
|
|
if any. The
|
|
|
|
|
.B <level>
|
|
|
|
|
can be specified as one of the following keywords:
|
|
|
|
|
.RS
|
|
|
|
|
.TP
|
|
|
|
|
.B never
|
|
|
|
|
The client will not request or check any server certificate.
|
|
|
|
|
.TP
|
|
|
|
|
.B allow
|
|
|
|
|
The server certificate is requested. If no certificate is provided,
|
|
|
|
|
the session proceeds normally. If a bad certificate is provided, it will
|
|
|
|
|
be ignored and the session proceeds normally.
|
|
|
|
|
.TP
|
|
|
|
|
.B try
|
|
|
|
|
The server certificate is requested. If no certificate is provided,
|
|
|
|
|
the session proceeds normally. If a bad certificate is provided,
|
|
|
|
|
the session is immediately terminated.
|
|
|
|
|
.TP
|
|
|
|
|
.B demand | hard
|
|
|
|
|
These keywords are equivalent. The server certificate is requested. If no
|
|
|
|
|
certificate is provided, or a bad certificate is provided, the session
|
|
|
|
|
is immediately terminated. This is the default setting.
|
2003-03-23 11:37:06 -05:00
|
|
|
.RE
|
2004-10-28 14:50:38 -04:00
|
|
|
.TP
|
2020-08-21 04:15:15 -04:00
|
|
|
.B TLS_REQSAN <level>
|
|
|
|
|
Specifies what checks to perform on the subjectAlternativeName
|
|
|
|
|
(SAN) extensions in a server certificate when validating the certificate
|
|
|
|
|
name against the specified hostname of the server. The
|
|
|
|
|
.B <level>
|
|
|
|
|
can be specified as one of the following keywords:
|
|
|
|
|
.RS
|
|
|
|
|
.TP
|
|
|
|
|
.B never
|
|
|
|
|
The client will not check any SAN in the certificate.
|
|
|
|
|
.TP
|
|
|
|
|
.B allow
|
|
|
|
|
The SAN is checked against the specified hostname. If a SAN is
|
|
|
|
|
present but none match the specified hostname, the SANs are ignored
|
|
|
|
|
and the usual check against the certificate DN is used.
|
|
|
|
|
This is the default setting.
|
|
|
|
|
.TP
|
|
|
|
|
.B try
|
|
|
|
|
The SAN is checked against the specified hostname. If no SAN is present
|
|
|
|
|
in the server certificate, the usual check against the certificate DN
|
|
|
|
|
is used. If a SAN is present but doesn't match the specified hostname,
|
|
|
|
|
the session is immediately terminated. This setting may be preferred
|
|
|
|
|
when a mix of certs with and without SANs are in use.
|
|
|
|
|
.TP
|
|
|
|
|
.B demand | hard
|
|
|
|
|
These keywords are equivalent. The SAN is checked against the specified
|
|
|
|
|
hostname. If no SAN is present in the server certificate, or no SANs
|
|
|
|
|
match, the session is immediately terminated. This setting should be
|
|
|
|
|
used when only certificates with SANs are in use.
|
|
|
|
|
.RE
|
|
|
|
|
.TP
|
2004-10-28 14:50:38 -04:00
|
|
|
.B TLS_CRLCHECK <level>
|
|
|
|
|
Specifies if the Certificate Revocation List (CRL) of the CA should be
|
2005-07-04 02:57:10 -04:00
|
|
|
used to verify if the server certificates have not been revoked. This
|
2004-10-28 14:50:38 -04:00
|
|
|
requires
|
|
|
|
|
.B TLS_CACERTDIR
|
2020-04-17 13:19:25 -04:00
|
|
|
parameter to be set. This parameter is ignored with GnuTLS.
|
2004-10-28 14:50:38 -04:00
|
|
|
.B <level>
|
|
|
|
|
can be specified as one of the following keywords:
|
|
|
|
|
.RS
|
|
|
|
|
.TP
|
|
|
|
|
.B none
|
|
|
|
|
No CRL checks are performed
|
|
|
|
|
.TP
|
|
|
|
|
.B peer
|
|
|
|
|
Check the CRL of the peer certificate
|
|
|
|
|
.TP
|
|
|
|
|
.B all
|
|
|
|
|
Check the CRL for a whole certificate chain
|
|
|
|
|
.RE
|
2007-05-12 21:59:46 -04:00
|
|
|
.TP
|
|
|
|
|
.B TLS_CRLFILE <filename>
|
|
|
|
|
Specifies the file containing a Certificate Revocation List to be used
|
|
|
|
|
to verify if the server certificates have not been revoked. This
|
2020-04-17 13:19:25 -04:00
|
|
|
parameter is only supported with GnuTLS.
|
2002-05-08 22:07:41 -04:00
|
|
|
.SH "ENVIRONMENT VARIABLES"
|
|
|
|
|
.TP
|
|
|
|
|
LDAPNOINIT
|
|
|
|
|
disable all defaulting
|
|
|
|
|
.TP
|
|
|
|
|
LDAPCONF
|
|
|
|
|
path of a configuration file
|
|
|
|
|
.TP
|
|
|
|
|
LDAPRC
|
|
|
|
|
basename of ldaprc file in $HOME or $CWD
|
|
|
|
|
.TP
|
|
|
|
|
LDAP<option-name>
|
|
|
|
|
Set <option-name> as from ldap.conf
|
1998-11-29 15:58:40 -05:00
|
|
|
.SH FILES
|
2002-05-08 22:07:41 -04:00
|
|
|
.TP
|
1998-11-29 15:58:40 -05:00
|
|
|
.I ETCDIR/ldap.conf
|
2002-05-08 22:07:41 -04:00
|
|
|
system-wide ldap configuration file
|
|
|
|
|
.TP
|
|
|
|
|
.I $HOME/ldaprc, $HOME/.ldaprc
|
|
|
|
|
user ldap configuration file
|
|
|
|
|
.TP
|
|
|
|
|
.I $CWD/ldaprc
|
|
|
|
|
local ldap configuration file
|
1998-11-29 15:58:40 -05:00
|
|
|
.SH "SEE ALSO"
|
2005-07-04 08:01:19 -04:00
|
|
|
.BR ldap (3),
|
2007-02-16 06:52:46 -05:00
|
|
|
.BR ldap_set_option (3),
|
|
|
|
|
.BR ldap_result (3),
|
2005-07-04 08:01:19 -04:00
|
|
|
.BR openssl (1),
|
|
|
|
|
.BR sasl (3)
|
1998-11-29 15:58:40 -05:00
|
|
|
.SH AUTHOR
|
|
|
|
|
Kurt Zeilenga, The OpenLDAP Project
|
|
|
|
|
.SH ACKNOWLEDGEMENTS
|
2007-01-02 15:25:16 -05:00
|
|
|
.so ../Project
|