Skip to content
Snippets Groups Projects
Commit 0d21db28 authored by Kurt Zeilenga's avatar Kurt Zeilenga
Browse files

SSF discussion

parent ba4faad6
No related branches found
No related tags found
No related merge requests found
......@@ -76,11 +76,30 @@ A number of {{TERM[expand]SASL}} (SASL) mechanisms, such as DIGEST-MD5
and {{TERM:GSSAPI}}, provide integrity and confidentiality protection.
See the {{SECT:Using SASL}} chapter for more information.
H3: Security Strength Factors
The server uses {{TERM[expand]Security Strength Factors}} (SSF) to
indicate the relative strength of protection. A SSF of zero (0)
indicates no protections are in place. A SSF of one (1) indicates
integrity protection are in place. A SSF greater than one (>1)
roughly correlates to the effective encryption key length. For
example, {{TERM:DES}} is 56, {{TERM:3DES}} is 112, and {{TERM:AES}}
is 128.
128, 192, or 256.
A number of administrative controls rely on SSFs associated with
TLS and SASL protection in place on an LDAP session.
{{EX:security}} controls disallow operations when appropriate
protections are not in place. For example:
> security ssf=1 update_ssf=112
requires integrity protection for all operations and encryption
protection, 3DES equivalent, for update operations (e.g. add,
delete, modify, etc.). See {{slapd.conf}}(5) for details.
For finer grained control, SSFs may be used in access controls.
See {{SECT:Access Control}} section of the {{SECT:The slapd
Configuration File}} for more information.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment