Bug#683095: wheezy pam_ldap broken with squeeze slapd using CAcert.org
Gerald Turner
gturner at unzane.com
Fri Apr 19 00:46:29 UTC 2013
Subject: Re: ldap client breaks after upgrade to wheezy
Followup-For: Bug #683095
Package: libgnutls26
Version: 2.12.20-6
I just spent the last couple hours struggling with the same problem.
Upgraded a pam_ldap client machine from squeeze to wheezy, openldap
server is still running squeeze. Server certificate was issued by
CAcert.org.
With debug turned up on an ‘ldapsearch’, all I get is the following:
TLS: peer cert untrusted or revoked (0x102)
TLS: can't connect: (unknown error code).
That led me to bug #478883. Tests using the following command:
gnutls-cli --x509cafile /etc/ssl/certs/ca-certificates.crt \
-d 4711 -V -p 636 ldap.example.com
…works fine on squeeze (2.8), but fails on wheezy (2.12):
…|<3>| HSK[0x251f710]: CERTIFICATE was received [4753 bytes]
|<6>| BUF[REC][HD]: Read 4749 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 214 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 4749 bytes of Data
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: mpi.c:609
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: verify.c:584
|<2>| ASSERT: gnutls_kx.c:705
|<2>| ASSERT: gnutls_handshake.c:2777
|<6>| BUF[HSK]: Cleared Data from buffer
*** Fatal error: Error in the certificate.
|<4>| REC: Sending Alert[2|42] - Certificate is bad
|<4>| REC[0x251f710]: Sending Packet[1] Alert(21) with length: 2
|<7>| WRITE: enqueued 7 bytes for 0x4. Total 7 bytes.
|<7>| WRITE FLUSH: 7 bytes in buffer.
|<7>| WRITE: wrote 7 bytes, 0 bytes left.
|<4>| REC[0x251f710]: Sent Packet[2] Alert(21) with length: 7
*** Handshake has failed
GnuTLS error: Error in the certificate.
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x251f710]: Epoch #0 freed
|<4>| REC[0x251f710]: Epoch #1 freed
Processed 6 CA certificate(s).
Resolving 'ldap.example.com'...
Connecting to '2001:dead:beef:::636'...
*** Verifying server certificate failed...
I hadn't realized that CAcert had reissued their intermediate to change
fingerprint algorithm.
Thanks Daniel!
Manually replacing /usr/share/ca-certificates/cacert.org/cacert.org.crt
on the squeeze server with the wheezy version solved the LDAP failures.
Feels really dirty overwriting a file in /usr. Perhaps the
ca-certificates package in squeeze could use some maintenance
(squeeze-backports?) so that other users avoid this problem on wheezy
upgrade. Or maybe a NEWS.Debian entry in libgnutls26 hinting at the
breakage of the new gnutls validation code vs. older CAcert certificates
on remote squeeze servers?
-- System Information:
Debian Release: 7.0
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages libgnutls26 depends on:
ii libc6 2.13-38
ii libgcrypt11 1.5.0-5
ii libp11-kit0 0.12-3
ii libtasn1-3 2.13-2
ii multiarch-support 2.13-38
ii zlib1g 1:1.2.7.dfsg-13
libgnutls26 recommends no packages.
libgnutls26 suggests no packages.
-- no debconf information
--
Gerald Turner Email: gturner at unzane.com JID: gturner at unzane.com
GPG: 0xFA8CD6D5 21D9 B2E8 7FE7 F19E 5F7D 4D0C 3FA0 810F FA8C D6D5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20130418/6f6f9622/attachment-0001.pgp>
More information about the Pkg-gnutls-maint
mailing list