You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
openssl s_client --startls ldap => old and new BE generate the same negotiated cipher set against both openldap version: TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
old BE ldapclient also trigger good log entries in slapd's log TLS established tls_ssf=256 ssf=256 tls_proto=TLSv1.3 tls_cipher=TLS_AES_256_GCM_SHA384 matching what openssl s_client also ends up chosing
new BE triggers TLS Negotation Failure, seeming to indicate something changed w.r.t. ldapclient's TLS config
I did go over the list of commits here and nothing related to ldapclient or TLS stood out to me, there were some build flag changes. But I'm no expert on them, but maybe some of the linker flags changed and ldapclient is build without TLS support now? That is my only theory that would explain this, but that one does seem a bit farfetched.
Seems the ldapclient broke on bloody somewhere after 20240706T121049Z.
With some help on IRC I managed to reduce it to a TLS negotiation issue on newer BEs.
There is also a openldap update in extra since that date 2.6.7 -> 2.6.8, I ruled out this being an issue by testing:
Some more info on IRC: https://log.omnios.org/omnios/2024-08-15#1723722056-844661 this tried based on the IRC conversation:
openssl s_client --startls ldap
=> old and new BE generate the same negotiated cipher set against both openldap version:TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
TLS established tls_ssf=256 ssf=256 tls_proto=TLSv1.3 tls_cipher=TLS_AES_256_GCM_SHA384
matching what openssl s_client also ends up chosingTLS Negotation Failure
, seeming to indicate something changed w.r.t. ldapclient's TLS configSome relevant openldap config:
Disabling TLS in slapd makes ldapclient work again, but this is obviously unacceptable.
The text was updated successfully, but these errors were encountered: