ldap tls question

Ken Hornstein kenh at cmf.nrl.navy.mil
Thu Apr 16 14:27:33 EDT 2026


>Using the "usual place" is questionable, as it includes the mass of 
>Internet CAs. If you trust them to never issue certs for your LDAP 
>server name, fine. I'm less sanguine about the security of random CAs 
>(and there have been multiple past incidents of bogus certs being issued).

It's a fair point, but ... what we've found is that if you DON'T put your
private PKI certificates into the OS store, then a whole LOT of stuff
doesn't work (e.g, curl, your favorite package download tool, etc etc),
especially if you are a large organization and use your private PKI for
a lot of services (e.g., the Department of Defense).  It just becomes
untenable in practice.

I am aware of rogue certificates being issued, but the CAs that
participate in most OS trusted root programs seem to have coalesced
around a common set of requirements for issuance that seem hard to
defeat without a serious compromise.  At least with CT logs you can
see if someone has issued a certificate for your site that you didn't
authorize.  It's not perfect but I am not sure what is when it comes
to PKI.

--Ken


More information about the Kerberos mailing list