h2. How to enable SSL This section describes the transport layer security options for LDAP, and especially how to enable LDAPS on ApacheDS. h3. Transport layer security and LDAP Several requirements related to security can be easily accomplished with the help of *SSL* technology (Secure Socket Layer) or its standardized successor *TLS* (Transport Layer Security, RFC 2246). Among these are the protection of data against eavesdropping and modification, when on transit between client and server (data integrity), and the authentication of a server toward a client with the help of a certificate. There are two approaches to utilize these technologies in the LDAP world. # ldaps (LDAP over SSL/TLS, port 636) # StartTLS (extended operation) The first option is comparable to HTTPS and inserts an SSL/TLS layer between the TCP/IP protocol and LDAP. Establishing a connection like this is normally provided via a different server port (port 636 is common, it is a well-known port, like port 389 is for LDAP). In URIs the schema "ldaps" is specified (for instance _ldaps://zanzibar:636/_) instead of "ldap". It is possible to write programs which switch between ldap and ldaps without changes in the source, if the connection data is configured external. In the second option a client establishes at first a "normal" LDAP connection. With a special request (extended operation StartTLS) it tries to switch to secure communication afterwards. It is not necessary to change the port for this, the communication continues on the established connection. The client may go back to the original connection state ("TLS Closure Alert"), in doing so protecting only selected parts of the communication. Both ways to utilize SSL/TLS within LDAP require the configuration of the server with an appropriate certificate. h3. Server configuration ApacheDS 2.0 currently only supports the first option (ldaps) and only if it runs with JDK 1.5 or above. The feature is disabled by default, you need to configure it. There are some steps to follow in order to obtain a SSL enabled server. Of capital importance: You need a *certificate* for your server. A certificate is signed public key (signed normally by a third party, a certificate authority, CA). There are different options - either you buy a certificate from a Certificate Authority (like Verisign, etc.), or you obtain one from your enterprise CA, if available - or you ask for a free certificate from [CACERT organisation|http://www.cacert.org/|www.cacert.org] - or you create your own certificate, self-signed or signed by your private CA, which will not be trusted. We will do it the last way (self-signed), primarily because it's easy and fast (you won't have to pay nor to wait to obtain your certificate) h4. Key creation First it is necessary to create a key pair (public/private key) for your server, _zanzibar_ in our case. One option is to use the JDK tool _keytool_ for this task. In the following example, we use these options || Option || value || Description || | -genkey | | command to generate a key pair | | -keyalg | "RSA" | algorithm to be used to generate the key pair, in our case, default is "DSA" | | -dname | "cn=zanzibar, ou=ApacheDS, o=ASF, c=US" | the X.500 Distinguished Name to be associated with alias, used as the issuer and subject fields in the self-signed certificate | | -alias | zanzibar | name to refer the entry within the keystore | | -keystore | zanzibar.ks | keystore file location | | -storepass | secret | password used to protect the integrity of the keystore | | -validity | 730 | number of days for which the certificate should be considered valid, default is 90 | Learn more about keytool at the [manpage|http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/keytool.html|java.sun.com]. {noformat} $ keytool -genkey -keyalg "RSA" -dname "cn=zanzibar, ou=ApacheDS, o=ASF, c=US" \\ -alias zanzibar -keystore zanzibar.ks -storepass secret -validity 730 Enter key password for (RETURN if same as keystore password): $ -bash-3.00$ ls -l total 4 -rw-r--r-- 1 szoerner staff 1275 Dec 22 12:23 zanzibar.ks $ keytool -list -keystore zanzibar.ks Enter keystore password: secret Keystore type: jks Keystore provider: SUN Your keystore contains 1 entry zanzibar, Dec 22, 2007, keyEntry, Certificate fingerprint (MD5): 30:15:82:C2:C0:CE:FD:8C:3C:41:48:FF:93:EB:93:BC $ {noformat} Another option is to use graphical tools for key creation like [Portecle|http://portecle.sourceforge.net/|portecle.sourceforge.net], which is basically a user-friendly front-end for keytool with comparable functionality. For a first impression see a screen shot below. !portecle_with_keystore.png! h4. Configuring ApacheDS Enabling SSL in Apache Directory Server and using the key pair created as above is quite easy. Simply put the keystore file in the _conf_ directory of your ApacheDS instance, and enable ldaps. Here is the fragment from _server.xml_ on how to do so. Note that there are two ldapServer elements within the default _server.xml_ file. Pick the one with id="ldapsServer". {code:xml} ... ... {code} The following attributes were used || Property|| default value || Description || | enabled | false | sets if this configuration is enabled or not | | ipPort | 636 | LDAPS TCP/IP port number to listen to | | enableLdaps | false | sets if ldaps is enabled or not | | ldapsCertificateFile | server-work/certificates/server.cert | path of the X509 (or JKS) certificate file for LDAPS | | ldapsCertificatePassword | changeit| password which is used to load the LDAPS certificate file | After modification of the _server.xml_, the server has to be restarted in order to take effect. h3. Verification, Clients After restarting the server, you should have a server offering both ldap and ldaps. How to verify whether it works? h4. Using Apache Directory Studio to connect Apache Directory Studio happily supports ldaps connections. Enter the connection data (hostname and port) and select "Use SSL encryption" from the dropdown, if you create or modify a connection: !studio_ssl.png! Afterwards the connection behaves like LDAP does. No difference in functionality, but the transmission is secured by SSL. Because our self-signed certificate is not trustworthy, many tools will present a warning (Studio currently does not). You will likely be able to view the certificate, and decide to continue (accepting the certificate always or this session only), like with web browsers. h4. Other clients, Java programs using JNDI If you use other graphical clients, the behavior will be comparable. Sometimes clients don't allow to connect to a server, if the certificate is not trustworthy. This is for instance by default the case for Java clients using JNDI. The following simple Java program tries to connect via JNDI/JSSE (Java Secure Socket Extension) and LDAPS to _ldaps://zanzibar:10636_ {code:java} import java.util.Hashtable; import javax.naming.*; import javax.naming.directory.*; public class ConnectWithLdaps { public static void main(String[] args) throws NamingException { Hashtable env = new Hashtable(); // Simple bind env.put(Context.SECURITY_AUTHENTICATION, "simple"); env.put(Context.SECURITY_PRINCIPAL, "cn=Horatio Hornblower,ou=people,o=sevenSeas"); env.put(Context.SECURITY_CREDENTIALS, "pass"); env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory"); env.put(Context.PROVIDER_URL, "ldaps://zanzibar:636/o=sevenSeas"); DirContext ctx = new InitialDirContext(env); NamingEnumeration enm = ctx.list(""); while (enm.hasMore()) { System.out.println(enm.next()); } ctx.close(); } } {code} It causes a _CommunicationException_, if the certificate is not trusted: {noformat} $ java ConnectWithLdaps Exception in thread "main" javax.naming.CommunicationException: simple bind failed: zanzibar:636 [Root exception is javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target] at com.sun.jndi.ldap.LdapClient.authenticate(Unknown Source) ... {noformat} In order to make the client trust our server, one option is to share a self signed certificate. So we export the certificate (DER format) using keytool like this: {noformat} $ keytool -export -keystore zanzibar.ks -alias zanzibar -file zanzibar.cer Enter keystore password: secret Certificate stored in file $ ls -l total 6 -rw-r--r-- 1 szoerner staff 504 Dec 22 13:34 zanzibar.cer -rw-r--r-- 1 szoerner staff 1275 Dec 22 12:23 zanzibar.ks $ {noformat} Please note that you don't want to share the server keystore file itself with arbitrary clients, because it holds the private key. Instead we create a separate keystore _trusted.ks_ with the help of _keytool_. We import the certificate _zanzibar.cer_ like this: {noformat} $ keytool -import -file zanzibar.cer -alias zanzibar -keystore trusted.ks -storepass secret Owner: CN=zanzibar, OU=ApacheDS, O=ASF, C=US Issuer: CN=zanzibar, OU=ApacheDS, O=ASF, C=US Serial number: 476d4825 Valid from: Sat Dec 22 12:23:49 EST 2007 until: Mon Dec 21 12:23:49 EST 2009 Certificate fingerprints: MD5: 30:15:82:C2:C0:CE:FD:8C:3C:41:48:FF:93:EB:93:BC SHA1: D2:7F:C7:48:3D:B6:F7:04:97:27:72:1F:71:75:27:AF:B2:D4:6A:3C Trust this certificate? [no]: yes Certificate was added to keystore -bash-3.00$ keytool -list -keystore trusted.ks -storepass secret Keystore type: jks Keystore provider: SUN Your keystore contains 1 entry zanzibar, Dec 22, 2007, trustedCertEntry, Certificate fingerprint (MD5): 30:15:82:C2:C0:CE:FD:8C:3C:41:48:FF:93:EB:93:BC $ {noformat} Instead of using the command line version of keytool, it is also possible to perform the certificate export and import operations with Portecle or any other graphical frontend. This is for instance how the _trusted.ks_ files with the imported certificate looks like in Portecle. !portecle_with_certificate.png! Clients may use this keystore in order to connect to the server. Therefore they can configure _trusted.ks_ as the trusted store via the environment like this: {noformat} $ java -Djavax.net.ssl.trustStore=trusted.ks ConnectWithLdaps ou=people: javax.naming.directory.DirContext ou=groups: javax.naming.directory.DirContext {noformat} Another option would be to import the certificate in the default keystore of the JRE installation (within $JAVA_HOME/jre/lib/security). For a test certificate this proceeding is not appropriate. h5. Troubleshooting In practice connection establishment with LDAP over SSL may lead to various problems. In order to eliminate the errors it is helpful to see communication-specific debug information. The system property _javax.net.debug_ is available for this task. The value "ssl" provides information about the certificates in the used key store, the server certificate, and the steps during establishing of the SSL connection (handshake): {noformat} $ java -Djavax.net.ssl.trustStore=trusted.ks -Djavax.net.debug=ssl ConnectWithLdaps setting up default SSLSocketFactory use default SunJSSE impl class: com.sun.net.ssl.internal.ssl.SSLSocketFactoryImpl class com.sun.net.ssl.internal.ssl.SSLSocketFactoryImpl is loaded keyStore is : keyStore type is : jks keyStore provider is : init keystore init keymanager of type SunX509 trustStore is: trusted.ks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Subject: CN=zanzibar, OU=ApacheDS, O=ASF, C=US Issuer: CN=zanzibar, OU=ApacheDS, O=ASF, C=US Algorithm: RSA; Serial number: 0x476d4825 Valid from Sat Dec 22 18:23:49 CET 2007 until Mon Dec 21 18:23:49 CET 2009 init context trigger seeding of SecureRandom done seeding SecureRandom instantiated an instance of class com.sun.net.ssl.internal.ssl.SSLSocketFactoryImpl %% No cached client session *** ClientHello, TLSv1 ... {noformat} You should be able to determine any SSL-related configuration problem with the help of this log. {anchor:Resources_2} h3. Resources * [Java Secure Socket Extension (JSSE)|http://java.sun.com/products/jsse/|java.sun.com] * [Portecle|http://portecle.sourceforge.net|portecle.sourceforge.net] a free UI application for creating, managing and examining keystores * [SSL 3.0 Specification (Netscape)|http://wp.netscape.com/eng/ssl3/|wp.netscape.com]