Bug #468


TLS between ldap server and metacat

Added by Jing Tao about 22 years ago. Updated over 17 years ago.

Target version:
Start date:
Due date:
% Done:


Estimated time:


We already figured out hwo connect metacat with client. But we still need
metacat connect ldap server throught TSL. We will use startTls to handle this.

Actions #1

Updated by Matt Jones over 21 years ago

Fixed typo in bug simmary: TSL should have been TLS

Actions #2

Updated by Jing Tao almost 21 years ago

Postphone it to next release

Actions #3

Updated by Matt Jones over 19 years ago

We need to implement TLS as soon as possible, as its a real problem we're
passing so many passwords around in cleartext. Maybe fold this into the
redesign for PKI certificates as part of the EcoGrid work.

Actions #4

Updated by Saurabh Garg over 18 years ago

I was able to setup secure connection between ldap and metacat without any
changes in the code. There might be a need to change to the code to use
ldapsUrl when it is specified in I dont think any change is
required in classes being used by current code.
So if ldaps url is specified in the ldapurl in then TLS is
started by the current classes being used. A point that verifies this is that
if I follow the instructions from this page:
and include following code
StartTlsResponse tls =
(StartTlsResponse) ctx.extendedOperation(new StartTlsRequest());
SSLSession sess = tls.negotiate();

I get the following error:
LDAP: error code 1 - TLS already started

It would be helpful to know why we have ldapUrl and ldapsUrl in e.g.

If we just have the ldapUrl and specify ldapsUrl in it if we want to use ldaps.

Actions #5

Updated by Saurabh Garg about 18 years ago

Closing the bug. I was able to run TLS (see my last comment)

Making a note in bug# 2175 for this bug as the new setup should have TLS
between metacat and ldap. So if there is a problem in that, then this bug can
be reopened.

Actions #6

Updated by Saurabh Garg almost 18 years ago

Have to modify current code in and integrate new code from Matt into AuthLdap.

Actions #7

Updated by Saurabh Garg over 17 years ago

The code change was working on my machine but was not working on KNB. The testing was done with the PISCO certificate provided by Jordan. My machine has jdk 1.5 on it and KNB had 1.4. So that might be a problem.

I tried running jdk 1.4 on my machine and I ran into the same problem as I have seen on KNB. So I will have to install Java 1.5 on KNB to be able to use the PISCO certificate. Will close the bug after doing that and verifying that the code works on KNB.

Actions #8

Updated by Saurabh Garg over 17 years ago

Verified the code on KNB. There was some problem in running tomcat 5.0 with jdk1.5 and using xml jars that come with tomcat 5.0. But after removal of the jars, everything seems to be running.

The code run fine on KNB. Now TLS is used while passing the username and password information to KNB ldap. TLS is also used while passing the username passwd info to PISCO ldap. The certificates are missing for LTER-ldap - hence that is not setup yet.

Closing the bug.

Actions #9

Updated by Redmine Admin about 11 years ago

Original Bugzilla ID was 468


Also available in: Atom PDF