After the recent logjam attack, longer DH parameter size have been advised. Unfortunately, this comes with a high computational cost. ECDH is a good alternative to acheive forward secrecy with lower CPU Loads. This patch is a backport from upstream ECDH umplementation. ECDH is enabled by speciying a curve name through the TLSECName directive. Valid curve names can be obtaines by openssl ecparam -list_curves Advised usage for a forward-secrecy only setup wiht only ECDH: TLSCipherSuite EECDH:!RC4:!SHA:!MD5:!DES:!aNULL:!eNULL TLSECName prime256v1 If backward compatibility with older clients is required: TLSCipherSuite EECDH:HIGH:!RC4:!SHA:!MD5:!DES:!aNULL:!eNULL TLSECName prime256v1 Backward compatible flavor with more forward secrecy, at the expense of using costly DH. dh2048.pem is obtained using openssl dhparam 2048 > /etc/openssl/certs/dh2048.pem TLSCipherSuite EECDH:EDH:HIGH:!RC4:!SHA:!MD5:!DES:!aNULL:!eNULL TLSDHParamFile /etc/openssl/certs/dh2048.pem TLSECName prime256v1
78 lines
2.2 KiB
Makefile
78 lines
2.2 KiB
Makefile
# $NetBSD: Makefile,v 1.45 2015/09/14 16:32:26 manu Exp $
|
|
|
|
PKGNAME= ${DISTNAME:S/-/-server-/}
|
|
PKGREVISION= 3
|
|
COMMENT= Lightweight Directory Access Protocol server suite
|
|
|
|
CONFLICTS+= openldap<2.3.23nb1
|
|
|
|
DEPENDS+= openldap-client>=2.3.27nb1:../../databases/openldap-client
|
|
|
|
CFLAGS.FreeBSD+= -DMDB_DSYNC=O_SYNC
|
|
CFLAGS.DragonFly+= -DMDB_DSYNC=O_SYNC -DMDB_FDATASYNC=fsync
|
|
|
|
# slapd options
|
|
CONFIGURE_ARGS+= --enable-slapd
|
|
CONFIGURE_ARGS+= --enable-crypt
|
|
CONFIGURE_ARGS+= --enable-wrappers
|
|
|
|
# slapd backends
|
|
CONFIGURE_ARGS+= --enable-dnssrv
|
|
CONFIGURE_ARGS+= --enable-ldap
|
|
CONFIGURE_ARGS+= --enable-meta
|
|
CONFIGURE_ARGS+= --enable-monitor
|
|
CONFIGURE_ARGS+= --enable-null
|
|
CONFIGURE_ARGS+= --enable-passwd
|
|
CONFIGURE_ARGS+= --enable-shell
|
|
|
|
# slapd (stackable) overlays
|
|
CONFIGURE_ARGS+= --enable-overlays
|
|
|
|
BUILD_DIRS= include libraries servers
|
|
TEST_DIRS= tests
|
|
INSTALL_DIRS= servers
|
|
|
|
BUILD_DEFS+= OPENLDAP_ETCDIR OPENLDAP_VARDIR
|
|
|
|
PKG_GROUPS= ${LDAP_GROUP}
|
|
PKG_USERS= ${SLAPD_USER}:${LDAP_GROUP}
|
|
|
|
OPENLDAP_FILEPERMS= ${REAL_ROOT_USER} ${LDAP_GROUP} 0640
|
|
SLAPD_DIRPERMS= ${SLAPD_USER} ${LDAP_GROUP} 0700
|
|
RUN_DIRPERMS= ${REAL_ROOT_USER} ${LDAP_GROUP} 0775
|
|
|
|
MAKE_DIRS= ${OPENLDAP_ETCDIR}/schema
|
|
OWN_DIRS+= ${OPENLDAP_VARDIR}
|
|
OWN_DIRS_PERMS= ${OPENLDAP_VARDIR}/openldap-data ${SLAPD_DIRPERMS}
|
|
OWN_DIRS_PERMS+= ${OPENLDAP_VARDIR}/run ${RUN_DIRPERMS}
|
|
|
|
CNFS= ${CNFS_SCHEMAS_cmd:sh}
|
|
CNFS_SCHEMAS_cmd= ${SED} -ne "/\.ldif$$/p;/\.schema$$/p" ${PKGDIR}/PLIST | ${SED} -e "s|share/examples/openldap/||"
|
|
|
|
CNFS_PERMS= slapd.conf
|
|
|
|
DB_CONFIG= DB_CONFIG
|
|
|
|
RCD_SCRIPTS= slapd
|
|
|
|
FILES_SUBST+= OPENLDAP_ETCDIR=${OPENLDAP_ETCDIR}
|
|
FILES_SUBST+= SLAPD_USER=${SLAPD_USER}
|
|
|
|
MESSAGE_SUBST+= SLAPD_USER=${SLAPD_USER}
|
|
MESSAGE_SUBST+= LDAP_GROUP=${LDAP_GROUP}
|
|
MESSAGE_SUBST+= OPENLDAP_VARDIR=${OPENLDAP_VARDIR}
|
|
MESSAGE_SUBST+= OPENLDAP_ETCDIR=${OPENLDAP_ETCDIR}
|
|
MESSAGE_SUBST+= CHOWN=${CHOWN:Q}
|
|
MESSAGE_SUBST+= CHMOD=${CHMOD:Q}
|
|
|
|
.include "options.mk"
|
|
|
|
.include "../../databases/openldap/Makefile.common"
|
|
|
|
CONF_FILES_PERMS+= ${EGDIR}/DB_CONFIG ${OPENLDAP_VARDIR}/openldap-data/DB_CONFIG ${OPENLDAP_FILEPERMS}
|
|
|
|
.include "../../mk/bsd.prefs.mk"
|
|
.if ${OPSYS} == "Linux" || ${OPSYS} == "SunOS"
|
|
.include "../../devel/libuuid/buildlink3.mk"
|
|
.endif
|
|
.include "../../mk/bsd.pkg.mk"
|