[GH-ISSUE #525] Support ECKey as private key for lldaps #195

Closed
opened 2026-02-27 08:15:48 +03:00 by kerem · 4 comments
Owner

Originally created by @Michsior14 on GitHub (Apr 4, 2023).
Original GitHub issue: https://github.com/lldap/lldap/issues/525

Caddy defaults to ed25519 tls key type.
It would be cool if the certificates generated with standard configuration of Caddy would work with lldap as well.

Originally created by @Michsior14 on GitHub (Apr 4, 2023). Original GitHub issue: https://github.com/lldap/lldap/issues/525 Caddy defaults to [ed25519 tls key type](https://caddyserver.com/docs/caddyfile/options#key-type). It would be cool if the certificates generated with standard configuration of Caddy would work with lldap as well.
kerem 2026-02-27 08:15:48 +03:00
Author
Owner

@nitnelave commented on GitHub (Apr 4, 2023):

Side note: it would be amazing if you could contribute your Caddy config as well ;)

<!-- gh-comment-id:1496421447 --> @nitnelave commented on GitHub (Apr 4, 2023): Side note: it would be amazing if you could contribute your Caddy config as well ;)
Author
Owner

@Michsior14 commented on GitHub (Apr 5, 2023):

Caddy config is very simple:

lldap.example.com {
    log
    
    # lldap frontend is listening on 8080
    reverse_proxy http://127.0.0.1:8080
    
    tls {
        # dns acme challange using aws route 53
        dns route53
    }
}

Workaround that I use for now is to force RSA certificate via global options:

{
    key_type rsa4096
}

The only thing that is not the greatest is that the lldap needs to be restarted every night to ensure the latest certificate from caddy (there is no signal) is used. Alternatively inotify/incron could listen on the file updates and restart lldap whenever needed.

<!-- gh-comment-id:1497072742 --> @Michsior14 commented on GitHub (Apr 5, 2023): Caddy config is very simple: ``` lldap.example.com { log # lldap frontend is listening on 8080 reverse_proxy http://127.0.0.1:8080 tls { # dns acme challange using aws route 53 dns route53 } } ``` Workaround that I use for now is to force RSA certificate via global options: ``` { key_type rsa4096 } ``` The only thing that is not the greatest is that the lldap needs to be restarted every night to ensure the latest certificate from caddy (there is no signal) is used. Alternatively inotify/incron could listen on the file updates and restart lldap whenever needed.
Author
Owner

@nitnelave commented on GitHub (Apr 5, 2023):

Why do you need to change the certificate every night? Usually you can get much longer-lived certificates, at least 3 months, no?

<!-- gh-comment-id:1497116606 --> @nitnelave commented on GitHub (Apr 5, 2023): Why do you need to change the certificate every night? Usually you can get much longer-lived certificates, at least 3 months, no?
Author
Owner

@Michsior14 commented on GitHub (Apr 5, 2023):

I am using incron to detect the changes and restart only when needed, but without it you won't know when the change happens (caddy can do that week before the 3 months span or it can be days/hours) so it's the safest bet I guess.

<!-- gh-comment-id:1497120166 --> @Michsior14 commented on GitHub (Apr 5, 2023): I am using incron to detect the changes and restart only when needed, but without it you won't know when the change happens (caddy can do that week before the 3 months span or it can be days/hours) so it's the safest bet I guess.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/lldap-lldap#195
No description provided.