Creating and Maintaining Databases
Chapter 3
Configuring Directory Databases
99
Since the server pre-encrypts all index keys before looking up an index for an
encrypted attribute, there is some hit to server performance for searches that make
use of an encrypted index, but the effect is not serious enough to offset the benefits
of indexing entries.
Encryption Keys
In order to use database encryption, the server must be configured for SSL because
database encryption uses the server’s SSL encryption key and the same PIN as SSL.
The PIN must either be entered manually upon server startup or a PIN file must be
used.
Randomly generated symmetric cipher keys are used to encrypt and decrypt
attribute data. A separate key is used for each configured cipher. These keys are
“wrapped” using the public key from the server’s SSL certificate, and the resulting
wrapped key is stored within the server’s configuration files. The effective strength
of the database encryption is never higher than the strength of the server’s SSL key.
Without access to the server’s private key, it is not possible to recover the
symmetric keys from the wrapped copies.
Encryption Ciphers
The following ciphers are supported for database encryption:
• Advanced Encryption Standard (AES)
• Triple Data Encryption Standard (3DES)
All ciphers are used in Cipher Block Chaining mode.
CAUTION
There is no mechanism for recovering a lost key. Therefore, it is
especially important to backup the server’s certificate database
safely. If the server's certificate were lost, it would not be possible to
decrypt any encrypted data stored in its database.
CAUTION
If the SSL certificate is going to expire and needs to be renewed,
export the encrypted backend instance before renewing the
certificate. After the certificate is renewed, re-import the exported
LDIF file.
Содержание DIRECTORY SERVER 7.1
Страница 1: ...Administrator s Guide Red Hat Directory Server Version7 1 May 2005 Updated February 2009 ...
Страница 20: ...20 Red Hat Directory Server Administrator s Guide May 2005 Glossary 619 Index 635 ...
Страница 22: ...22 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 26: ...26 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 78: ...Maintaining Referential Integrity 78 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 200: ...Assigning Class of Service 200 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 278: ...Compatibility with Earlier Releases 278 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 374: ...Troubleshooting Replication Related Problems 374 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 478: ...Using the Management Information Base 478 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 488: ...488 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 528: ...PTA Plug in Syntax Examples 528 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 545: ...About Windows Sync Chapter 18 Windows Sync 545 Figure 18 1 Active Directory Directory Server Synchronization Process ...
Страница 572: ...572 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 586: ...Storing Information in Multiple Languages 586 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 606: ...Searching an Internationalized Directory 606 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 612: ...Examples of LDAP URLs 612 Red Hat Directory Server Administrator s Guide May 2005 ...
Страница 634: ...634 Red Hat Directory Server Administrator s Guide May 2005 ...