This ticket is derived from Ticket #47536 - Allow usage of OpenLDAP libraries that don't use NSS for crypto
https://fedorahosted.org/389/ticket/47536#comment:16 commented by rmeggins
There is one more implicit use of NSS that just happens - revocation checking. If you are using NSS for everything, the certs are automatically checked against any CRLs or OCSPs that NSS knows about. We also need to consider how openldap+openssl clients will check server certs (or CA certs too?) for revocation.
Separating the CRL handling from the ticket #47536.
Metadata Update from @nhosoi: - Issue set to the milestone: 1.4 backlog
Metadata Update from @mreynolds: - Custom field reviewstatus adjusted to None - Issue close_status updated to: None - Issue tagged with: openldap
389-ds-base is moving from Pagure to Github. This means that new issues and pull requests will be accepted only in 389-ds-base's github repository.
This issue has been cloned to Github and is available here: - https://github.com/389ds/389-ds-base/issues/1853
If you want to receive further updates on the issue, please navigate to the github issue and click on subscribe button.
subscribe
Thank you for understanding. We apologize for all inconvenience.
Metadata Update from @spichugi: - Issue close_status updated to: wontfix - Issue status updated to: Closed (was: Open)
Login to comment on this ticket.