ldap tls question
Ken Hornstein
kenh at cmf.nrl.navy.mil
Thu Apr 16 14:27:33 EDT 2026
>Using the "usual place" is questionable, as it includes the mass of
>Internet CAs. If you trust them to never issue certs for your LDAP
>server name, fine. I'm less sanguine about the security of random CAs
>(and there have been multiple past incidents of bogus certs being issued).
It's a fair point, but ... what we've found is that if you DON'T put your
private PKI certificates into the OS store, then a whole LOT of stuff
doesn't work (e.g, curl, your favorite package download tool, etc etc),
especially if you are a large organization and use your private PKI for
a lot of services (e.g., the Department of Defense). It just becomes
untenable in practice.
I am aware of rogue certificates being issued, but the CAs that
participate in most OS trusted root programs seem to have coalesced
around a common set of requirements for issuance that seem hard to
defeat without a serious compromise. At least with CT logs you can
see if someone has issued a certificate for your site that you didn't
authorize. It's not perfect but I am not sure what is when it comes
to PKI.
--Ken
More information about the Kerberos
mailing list