Lightweight Directory Access Protocol or LDAP is used to authenticate and authorize users. LDAP is used in different infrastructures like Windows Domain, Linux, Network, etc. LDAP uses different port numbers like 389 and 636. LDAP is used by different software like OpenLDAP, Microsoft Active Directory, Netscape Directory Server, Novell eDirectory, etc. LDAP is developed to access the X.500 databases which store information about different users, groups, and entities.
轻型目录访问协议或LDAP用于认证和授权用户。 LDAP用于不同的基础结构(例如Windows域,Linux,网络等)中。LDAP使用不同的端口号(例如389和636)。LDAP被不同的软件(例如OpenLDAP,Microsoft Active Directory,Netscape Directory Server,Novell eDirectory等)使用。开发用于访问X.500数据库,该数据库存储有关不同用户,组和实体的信息。
LDAP的TCP和UDP 389 (TCP and UDP 389 For LDAP)
The well-known port for LDAP is TCP 389. Both UDP and TCP transmission can be used for this port. We can use this port for unsecured and unencrypted LDAP transmission. This means if the LDAP traffic for port 389 is sniffed it can create security problems and expose information like username, password, hash, certificates, and other critical information.
The port of LDAP TCP and UDP 389 is assigned by the IANA which is an international standardization institution. We can see below the registration information and contact for the port registration.
TCP和UDP 636安全或SSL LDAP (TCP and UDP 636 Secure or SSL LDAP)
Security is an important part of the network protocols. LDAP is not a secure protocol if we do not implement extra security measures. LDAPS is a secure version of the LDAP where LDAP communication is transmitted over an SSL tunnel. Also, TCP and UDP 636 can be used for LDAPS secure transmission. Even the attacker can sniff the port 636 traffic no information will be exposed to the attacker.