OpenLDAP (简体中文)
OpenLDAP 是 LDAP 协议的一个开源实现。LDAP 服务器本质上是一个为只读访问而优化的非关系型数据库。它主要用做地址簿查询(如 email 客户端)或对各种服务访问做后台认证以及用户数据权限管控。(例如,访问 Samba 时,LDAP 可以起到域控制器的作用;或者 Linux 系统认证 时代替 /etc/passwd
的作用。)
ldap
开头的命令(如: ldapsearch
)是客户端工具,以 slap
开头的命令(如: slapcat
slapcat
)是服务端工具。本页面内容仅基于一个基本的 OpenLDAP 安装做简要配置说明。
安装
OpenLDAP 软件包同时包含了服务器和客户端。请安装软件包 openldap。
配置
服务端
/var/lib/openldap/openldap-data/
目录下的所有文件。服务器的配置文件位于 /etc/openldap/slapd.conf
。
需要编辑后缀和 rootdn。典型的后缀通常是你所用的域名,但这并非强制要求,而是依赖于你如何使用你的目录。下例中以 example 做为域名,tld 为 com,rootdn 则是 LDAP 管理员的名字(这里用 root)。
suffix "dc=example,dc=com" rootdn "cn=root,dc=example,dc=com"
现在删除默认 root 口令并创建一个强口令:
# sed -i "/rootpw/ d" /etc/openldap/slapd.conf #find the line with rootpw and delete it # echo "rootpw $(slappasswd)" >> /etc/openldap/slapd.conf # 添加一行包含经由 slappasswd 哈希化的口令行
在 slapd.conf
头部添加一些 schemas:
include /etc/openldap/schema/cosine.schema include /etc/openldap/schema/inetorgperson.schema include /etc/openldap/schema/nis.schema #include /etc/openldap/schema/samba.schema
可能需要在 slapd.conf
底部加入一些常用的 indexes:
index uid pres,eq index mail pres,sub,eq index cn pres,sub,eq index sn pres,sub,eq index dc eq
现在准备数据目录,需要重命名配置文件:
# mv /var/lib/openldap/openldap-data/DB_CONFIG.example /var/lib/openldap/openldap-data/DB_CONFIG
/etc/openldap/slapd.d/
中,建议不再使用 slapd.conf
作为配置文件。将 slapd.conf
中的改动应用到 /etc/openldap/slapd.d/
,需要先删除老配置:
# rm -rf /etc/openldap/slapd.d/*
如果还没有数据库,用 using systemd 启动然后停止 slapd.service
服务。
用下面命令生成配置文件:
# slaptest -f /etc/openldap/slapd.conf -F /etc/openldap/slapd.d/
每次修改 slapd.conf
后,都需要执行上面命令。检查有没有问题,可以忽略 "bdb_monitor_db_open: monitoring disabled; configure monitor database to enable".
修改 /etc/openldap/slapd.d 中所有文件的权限:
# chown -R ldap:ldap /etc/openldap/slapd.d
# slapindex # chown ldap:ldap /var/lib/openldap/openldap-data/*
或者
$ sudo -u ldap slapindex
最后,启动 slapd.service
服务。
客户端
客户的配置文件位于 /etc/openldap/ldap.conf
.
这个配置很简单,只需要将BASE
设置为服务器的前缀,将 URI
设置为服务器的地址:
/etc/openldap/ldap.conf
BASE dc=example,dc=com URI ldap://localhost
要使用 SSL 的话:
-
URI
的协议 (ldap 或 ldaps) 要和 slapd 配置一致 - 要使用自签名的证书,在
ldap.conf
中添加TLS_REQCERT allow
行 - 要从认证机构获取自签名证书,在
ldap.conf
中添加TLS_CACERTDIR /usr/share/ca-certificates/trust-source
行.
创建初始项
配置好客户端后,创建根项和 root 角色项:
$ ldapadd -x -D 'cn=root,dc=example,dc=com' -W dn: dc=example,dc=com objectClass: dcObject objectClass: organization dc: example o: Example description: Example directory dn: cn=root,dc=example,dc=com objectClass: organizationalRole cn: root description: Directory Manager ^D
第一行后的内容是在 stdin 输入的,或者用 -f 选项从文件或重定向读入.
测试安装好的系统
运行下面命令:
$ ldapsearch -x '(objectclass=*)'
或认证为 rootdn (将 -x
替换为 -D <user> -W
), 用上面配置的例子的话:
$ ldapsearch -D "cn=root,dc=example,dc=com" -W '(objectclass=*)'
应该能看到数据库中的信息.
基于 TLS 的 OpenLDAP
如果通过网络访问 OpenLDAP 服务器,尤其是当你的服务器上保存有敏感数据时,明文传输这些数据存在被他人嗅探的风险。If you access the OpenLDAP server over the network and especially if you have sensitive data stored on the server you run the risk of someone sniffing your data which is sent clear-text. 下面章节将指导你如何设置 LDAP 服务器与客户端之间的 SSL 连接以加密传输数据。The next part will guide you on how to setup an SSL connection between the LDAP server and the client so the data will be sent encrypted.
要使用 TLS,你必须获得一个证书。In order to use TLS, you must have a certificate. 测试时可以使用自签署证书。证书的详细信息请参阅 OpenSSL。For testing purposes, a self-signed certificate will suffice. To learn more about certificates, see OpenSSL.
创建一个自签署的证书
输入下列命令创建一个自签署证书: To create a self-signed certificate, type the following:
$ openssl req -new -x509 -nodes -out slapdcert.pem -keyout slapdkey.pem -days 365
You will be prompted for information about your LDAP server. Much of the information can be left blank. The most important information is the common name. This must be set to the DNS name of your LDAP server. If your LDAP server's IP address resolves to example.org but its server certificate shows a CN of bad.example.org, LDAP clients will reject the certificate and will be unable to negotiate TLS connections (apparently the results are wholly unpredictable).
Now that the certificate files have been created copy them to /etc/openldap/ssl/
(create this directory if it does not exist) and secure them.
slapdcert.pem
must be world readable because it contains the public key. slapdkey.pem
on the other hand should only be readable for the ldap user for security reasons:
# mv slapdcert.pem slapdkey.pem /etc/openldap/ssl/ # chmod -R 755 /etc/openldap/ssl/ # chmod 400 /etc/openldap/ssl/slapdkey.pem # chmod 444 /etc/openldap/ssl/slapdcert.pem # chown ldap /etc/openldap/ssl/slapdkey.pem
配置基于SSL的slapd
Edit the daemon configuration file (/etc/openldap/slapd.conf
) to tell LDAP where the certificate files reside by adding the following lines:
# Certificate/SSL Section TLSCipherSuite DEFAULT TLSCertificateFile /etc/openldap/ssl/slapdcert.pem TLSCertificateKeyFile /etc/openldap/ssl/slapdkey.pem
If you are using a signed SSL Certificate from a certification authority such as Let’s Encrypt, you will also need to specify the path to the root certificates database and your intermediary certificate. You will also need to change ownership of the .pem
files and intermediary directories to make them readable to the user ldap
:
# Certificate/SSL Section TLSCipherSuite DEFAULT TLSCertificateFile /etc/letsencrypt/live/ldap.my-domain.com/cert.pem TLSCertificateKeyFile /etc/letsencrypt/live/ldap.my-domain.com/privkey.pem TLSCACertificateFile /etc/letsencrypt/live/ldap.my-domain.com/chain.pem TLSCACertificatePath /usr/share/ca-certificates/trust-source
The TLSCipherSuite specifies a list of OpenSSL ciphers from which slapd will choose when negotiating TLS connections, in decreasing order of preference. In addition to those specific ciphers, you can use any of the wildcards supported by OpenSSL. DEFAULT is a wildcard. See ciphers(1ssl) for description of ciphers, wildcards and options supported.
openssl ciphers -v ALL:COMPLEMENTOFALL
. Always test which ciphers will actually be enabled by TLSCipherSuite by providing it to OpenSSL command, like this: openssl ciphers -v 'DEFAULT'
Regenerate the configuration directory:
# rm -rf /etc/openldap/slapd.d/* # erase old config settings # slaptest -f /etc/openldap/slapd.conf -F /etc/openldap/slapd.d/ # generate new config directory from config file # chown -R ldap:ldap /etc/openldap/slapd.d # Change ownership recursively to ldap on the config directory
启动基于SSL的slapd
You will have to edit slapd.service
to change to protocol slapd listens on.
Create the override unit:
systemctl edit slapd.service
[Service] ExecStart=/usr/bin/slapd -u ldap -g ldap -h "ldaps:///"
Localhost connections do not need to use SSL. So, if you want to access the server locally you should change the ExecStart
line to:
ExecStart=/usr/bin/slapd -u ldap -g ldap -h "ldap://127.0.0.1 ldaps:///"
Then restart slapd.service
. If it was enabled before, reenable it now.
If slapd
started successfully you can enable it.
TLS_REQCERT allow
to /etc/openldap/ldap.conf
on the client, or it will not be able connect to the server.下一步
You now have a basic LDAP installation. The next step is to design your directory. The design is heavily dependent on what you are using it for. If you are new to LDAP, consider starting with a directory design recommended by the specific client services that will use the directory (PAM, Postfix, etc).
A directory for system authentication is the LDAP authentication article.
A nice web frontend is phpLDAPadmin.
排错
检查客户端认证
If you cannot connect to your server for non-secure authentication
$ ldapsearch -x -H ldap://ldaservername:389 -D cn=Manager,dc=example,dc=exampledomain
and for TLS secured authentication with:
$ ldapsearch -x -H ldaps://ldaservername:636 -D cn=Manager,dc=example,dc=exampledomain
LDAP服务突然停止
If you notice that slapd seems to start but then stops, try running:
# chown ldap:ldap /var/lib/openldap/openldap-data/*
to allow slapd write access to its data directory as the user "ldap".
LDAP Server Does not Start
Try starting the server from the command line with debugging output enabled:
# slapd -u ldap -g ldap -h ldaps://ldaservername:636 -d Config,Stats
参阅
- Official OpenLDAP Software 2.4 Administrator's Guide
- phpLDAPadmin is a web interface tool in the style of phpMyAdmin.
- LDAP authentication
- apachedirectorystudioAUR from the Arch User Repository is an Eclipse-based LDAP viewer. Works perfect with OpenLDAP installations.