[Pkg-openldap-devel] Bug#473796: Bug#473796: Bug#473796: TLS fails completely

Steve Langasek vorlon at debian.org
Sun Jun 29 08:12:42 UTC 2008


On Thu, Apr 03, 2008 at 12:28:56PM -0700, Quanah Gibson-Mount wrote:
> > ok, more testing, more news:

> >>> now with the slapd 2.4.7 package (with gnutls) this seems to force
> >>> client-certs, too. a TLS query without client-cert won't work - but
> >>> commenting the 'security' line out results in working TLS and working
> >>> non-TLS queries.

> >> The default behavior when TLS is enabled is "TLSVerifyClient never";
> >> 2.4.7 did have a bug related to this, but this was resolved in the
> >> 2.4.7-5 package.

> > well it seems to me like with gnutls the 'security tls=' value controls
> > the tls reqirements, TLSVerifyClient is (more or less?) ignored. but i
> > could be missing something ofc...

> > all queries done with a server cert and without a client cert:

> > security tls=128
> > TLSVerifyClient never

> > ldapsearch		fails (TLS confidentiality required)
> > ldapsearch -ZZ		fails (stronger TLS confidentiality required)

> This will always fail as long as the keystrength of the cert in question is 
> so low.  It states quite clearly in your log:

> conn=0 fd=12 TLS established tls_ssf=32 ssf=32

> I.e., the TLS SSF is 32.  So no value > 32 will ever work.

This suggests to me that the SSF values haven't been properly normalized for
GNUtls.  Doesn't the "128" mean, roughly, a symmetric cipher with keylength
of 128?  Surely the user's "TLSCipherSuite TLS_RSA_AES_256_CBC_SHA1" should
satisfy this?

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                    http://www.debian.org/
slangasek at ubuntu.com                                     vorlon at debian.org





More information about the Pkg-openldap-devel mailing list