Return-Path: Delivered-To: apmail-directory-dev-archive@www.apache.org Received: (qmail 58163 invoked from network); 4 Sep 2008 00:46:37 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 4 Sep 2008 00:46:37 -0000 Received: (qmail 18169 invoked by uid 500); 4 Sep 2008 00:46:34 -0000 Delivered-To: apmail-directory-dev-archive@directory.apache.org Received: (qmail 18120 invoked by uid 500); 4 Sep 2008 00:46:34 -0000 Mailing-List: contact dev-help@directory.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Apache Directory Developers List" Delivered-To: mailing list dev@directory.apache.org Received: (qmail 18109 invoked by uid 99); 4 Sep 2008 00:46:34 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 03 Sep 2008 17:46:34 -0700 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 04 Sep 2008 00:45:44 +0000 Received: from brutus (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id CAF2D234C1C8 for ; Wed, 3 Sep 2008 17:45:45 -0700 (PDT) Message-ID: <2124438448.1220489145830.JavaMail.jira@brutus> Date: Wed, 3 Sep 2008 17:45:45 -0700 (PDT) From: "Alex Karasulu (JIRA)" To: dev@directory.apache.org Subject: [jira] Assigned: (DIRSERVER-1164) SSL Cert Compatibility issue with LDAPS for Outlook Clients In-Reply-To: <1074830138.1209052522215.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/DIRSERVER-1164?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Alex Karasulu reassigned DIRSERVER-1164: ---------------------------------------- Assignee: Alex Karasulu > SSL Cert Compatibility issue with LDAPS for Outlook Clients > ----------------------------------------------------------- > > Key: DIRSERVER-1164 > URL: https://issues.apache.org/jira/browse/DIRSERVER-1164 > Project: Directory ApacheDS > Issue Type: Improvement > Components: ldap > Affects Versions: 1.5.2 > Reporter: Steve > Assignee: Alex Karasulu > Fix For: 1.5.4 > > > Any Outlook Version will simply refuse the service to LDAPS on a default apacheds installation. > The SSL certificate has to match the hostname exactly - if it is empty or you do not connect using > the DNS name - outlook will simply refuse the connection even if the cert itself is trusted. > The Standard Apache 1.5.2 distribution should work out of the box with Outlook Clients for using LDAPS - > the only catch is the SSL certificate which is automatically generated by apacheDS - it is neither > trusted by outlook - nor does it contain a valid common name (the DNS name of the server) it seems. > The first issue can of course not be resolved by the auto key generation when you startup the server - but maybe the DNS address of the certificate. > Even then - there needs to be a way to easily extract the generated public key so that you can manually trust it on windows clients. > This issue only applies to Outlook Clients - Thunderbird/LDAPBrowser and Co will ask the user if they want to connect to untrusted sites. > Alternatively - there should be an option for admins to simply change the SSL key to a valid/trusted one - in 1.52 the only way i found so far > for modifying the SSL key is programatically this way : > EntryOperationContext adminEntry = new EntryOperationContext( > directoryService.getRegistries(), PartitionNexus.getAdminName()); > if (directoryService.getPartitionNexus().hasEntry(adminEntry)) { > > KeyStore store = // load some store from p12 for example > KeyPair keyPair = // load some keypair from store > Attributes entry = new BasicAttributes(); > PrivateKey privateKey = keyPair.getPrivate(); > entry.put(TlsKeyGenerator.KEY_ALGORITHM_AT, privateKey > .getAlgorithm()); > entry.put(TlsKeyGenerator.PRIVATE_KEY_AT, privateKey.getEncoded()); > entry.put(TlsKeyGenerator.PRIVATE_KEY_FORMAT_AT, privateKey > .getFormat()); > PublicKey publicKey = keyPair.getPublic(); > entry.put(TlsKeyGenerator.PUBLIC_KEY_AT, publicKey.getEncoded()); > entry.put(TlsKeyGenerator.PUBLIC_KEY_FORMAT_AT, publicKey > .getFormat()); > Certificate cert = store.getCertificate(alias); > entry.put(TlsKeyGenerator.USER_CERTIFICATE_AT, cert.getEncoded()); > List items = ModifyOperationContext.createModItems( > ServerEntryUtils.toServerEntry(entry, PartitionNexus > .getAdminName(), directoryService.getRegistries()), > ModificationOperation.REPLACE_ATTRIBUTE); > directoryService.getPartitionNexus().modify( > new ModifyOperationContext( > directoryService.getRegistries(), PartitionNexus > .getAdminName(), items)); -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.