Skip to content

Commit 9965458

Browse files
committed
Adjust LDAP_TLS_CIPHER_SUITE to Red Hat's TLS hardening guide
1 parent c7cdcbb commit 9965458

File tree

6 files changed

+9
-7
lines changed

6 files changed

+9
-7
lines changed

CHANGELOG.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
# Changelog
22

33
## 1.1.4
4-
Remove TLS environment variable LDAP_TLS_PROTOCOL_MIN, see #69
5-
4+
- Remove environment variable LDAP_TLS_PROTOCOL_MIN as it takes no effect, see #69.
5+
- Adjust default GnuTLS cipher string according to Red Hat's TLS hardening guide.
6+
This by default also restricts the TLS protocol version to 1.2. For reference,
7+
see #69.
68

79
## 1.1.3
810
Merge pull request :

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ TLS options:
253253
- **LDAP_TLS_KEY_FILENAME**: Ldap ssl certificate private key filename. Defaults to `ldap.key`
254254
- **LDAP_TLS_CA_CRT_FILENAME**: Ldap ssl CA certificate filename. Defaults to `ca.crt`
255255
- **LDAP_TLS_ENFORCE**: Enforce TLS. Defaults to `false`
256-
- **LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:-VERS-SSL3.0`
256+
- **LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC`, based on Red Hat's [TLS hardening guide](https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Hardening_TLS_Configuration.html)
257257
- **LDAP_TLS_VERIFY_CLIENT**: TLS verify client. Defaults to `demand`
258258

259259
Help: http://www.openldap.org/doc/admin24/tls.html

example/extend-osixia-openldap/environment/my-env.yaml.startup

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ LDAP_TLS_KEY_FILENAME: cert.key
2323
LDAP_TLS_CA_CRT_FILENAME: ca.crt
2424

2525
LDAP_TLS_ENFORCE: false
26-
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
26+
LDAP_TLS_CIPHER_SUITE: SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC
2727
LDAP_TLS_VERIFY_CLIENT: never
2828

2929
# Replication

example/kubernetes/simple/ldap-rc.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ spec:
5454
- name: LDAP_TLS_ENFORCE
5555
value: "false"
5656
- name: LDAP_TLS_CIPHER_SUITE
57-
value: "SECURE256:-VERS-SSL3.0"
57+
value: "SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC"
5858
- name: LDAP_TLS_VERIFY_CLIENT
5959
value: "demand"
6060
- name: LDAP_REPLICATION

example/kubernetes/using-secrets/environment/my-env.yaml.startup

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ LDAP_TLS_KEY_FILENAME: cert.key
2323
LDAP_TLS_CA_CRT_FILENAME: ca.crt
2424

2525
LDAP_TLS_ENFORCE: false
26-
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
26+
LDAP_TLS_CIPHER_SUITE: SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC
2727
LDAP_TLS_VERIFY_CLIENT: never
2828

2929
# Replication

image/environment/default.yaml.startup

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ LDAP_TLS_KEY_FILENAME: ldap.key
2828
LDAP_TLS_CA_CRT_FILENAME: ca.crt
2929

3030
LDAP_TLS_ENFORCE: false
31-
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
31+
LDAP_TLS_CIPHER_SUITE: SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC
3232
LDAP_TLS_VERIFY_CLIENT: demand
3333

3434
# Replication

0 commit comments

Comments
 (0)