Skip to content

Commit c29a630

Browse files
committed
Merge branch 'jgehrcke-jp/tlschange' into hotfix-1.1.4
2 parents 0a9815f + 9965458 commit c29a630

File tree

8 files changed

+11
-15
lines changed

8 files changed

+11
-15
lines changed

CHANGELOG.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
# Changelog
22

3+
## 1.1.4
4+
- Remove environment variable LDAP_TLS_PROTOCOL_MIN as it takes no effect, see #69.
5+
- Adjust default GnuTLS cipher string according to Red Hat's TLS hardening guide.
6+
This by default also restricts the TLS protocol version to 1.2. For reference,
7+
see #69.
8+
39
## 1.1.3
410
Merge pull request :
511
- Use mdb over hdb #50

README.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -253,8 +253,7 @@ TLS options:
253253
- **LDAP_TLS_KEY_FILENAME**: Ldap ssl certificate private key filename. Defaults to `ldap.key`
254254
- **LDAP_TLS_CA_CRT_FILENAME**: Ldap ssl CA certificate filename. Defaults to `ca.crt`
255255
- **LDAP_TLS_ENFORCE**: Enforce TLS. Defaults to `false`
256-
- **LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:-VERS-SSL3.0`
257-
- **LDAP_TLS_PROTOCOL_MIN**: TLS min protocol. Defaults to `3.1`
256+
- **LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC`, based on Red Hat's [TLS hardening guide](https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Hardening_TLS_Configuration.html)
258257
- **LDAP_TLS_VERIFY_CLIENT**: TLS verify client. Defaults to `demand`
259258

260259
Help: http://www.openldap.org/doc/admin24/tls.html

example/extend-osixia-openldap/environment/my-env.yaml.startup

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,7 @@ LDAP_TLS_KEY_FILENAME: cert.key
2323
LDAP_TLS_CA_CRT_FILENAME: ca.crt
2424

2525
LDAP_TLS_ENFORCE: false
26-
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
27-
LDAP_TLS_PROTOCOL_MIN: 3.1
26+
LDAP_TLS_CIPHER_SUITE: SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC
2827
LDAP_TLS_VERIFY_CLIENT: never
2928

3029
# Replication

example/kubernetes/simple/ldap-rc.yaml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,9 +56,7 @@ spec:
5656
- name: LDAP_TLS_ENFORCE
5757
value: "false"
5858
- name: LDAP_TLS_CIPHER_SUITE
59-
value: "SECURE256:-VERS-SSL3.0"
60-
- name: LDAP_TLS_PROTOCOL_MIN
61-
value: "3.1"
59+
value: "SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC"
6260
- name: LDAP_TLS_VERIFY_CLIENT
6361
value: "demand"
6462
- name: LDAP_REPLICATION

example/kubernetes/using-secrets/environment/my-env.yaml.startup

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,7 @@ LDAP_TLS_KEY_FILENAME: ldap.key
2828
LDAP_TLS_CA_CRT_FILENAME: ca.crt
2929

3030
LDAP_TLS_ENFORCE: false
31-
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
32-
LDAP_TLS_PROTOCOL_MIN: 3.1
31+
LDAP_TLS_CIPHER_SUITE: SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC
3332
LDAP_TLS_VERIFY_CLIENT: demand
3433

3534
# Replication

image/environment/default.yaml.startup

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,7 @@ LDAP_TLS_KEY_FILENAME: ldap.key
2828
LDAP_TLS_CA_CRT_FILENAME: ca.crt
2929

3030
LDAP_TLS_ENFORCE: false
31-
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
32-
LDAP_TLS_PROTOCOL_MIN: 3.1
31+
LDAP_TLS_CIPHER_SUITE: SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC
3332
LDAP_TLS_VERIFY_CLIENT: demand
3433

3534
# Replication

image/service/slapd/assets/config/tls/tls-enable.ldif

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,6 @@ changetype: modify
33
replace: olcTLSCipherSuite
44
olcTLSCipherSuite: {{ LDAP_TLS_CIPHER_SUITE }}
55
-
6-
replace: olcTLSProtocolMin
7-
olcTLSProtocolMin: {{ LDAP_TLS_PROTOCOL_MIN }}
8-
-
96
replace: olcTLSCACertificateFile
107
olcTLSCACertificateFile: {{ LDAP_TLS_CA_CRT_PATH }}
118
-

image/service/slapd/startup.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,6 @@ EOF
244244
sed -i "s|{{ LDAP_TLS_DH_PARAM_PATH }}|${LDAP_TLS_DH_PARAM_PATH}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
245245

246246
sed -i "s|{{ LDAP_TLS_CIPHER_SUITE }}|${LDAP_TLS_CIPHER_SUITE}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
247-
sed -i "s|{{ LDAP_TLS_PROTOCOL_MIN }}|${LDAP_TLS_PROTOCOL_MIN}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
248247
sed -i "s|{{ LDAP_TLS_VERIFY_CLIENT }}|${LDAP_TLS_VERIFY_CLIENT}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
249248

250249
ldapmodify -Y EXTERNAL -Q -H ldapi:/// -f ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif 2>&1 | log-helper debug

0 commit comments

Comments
 (0)