On 2020-12-22, Kapetanakis Giannis <bil...@edu.physics.uoc.gr> wrote:
> Hi,
>
> After upgrading to 6.8-release I can no longer connect to my ldap server with 
> openldap and SSL/TLS.
> I'm using a self signed root CA to sign LDAP server's certificate.
>
> /etc/openldap/ldap.conf has:
> TLS_CACERTDIR /etc/openldap/cacerts
> TLS_REQCERT demand
>
> # /usr/local/bin/ldapsearch -d9 -x (openldap client)
> TLS trace: SSL_connect:SSLv3 read server hello A
> TLS certificate verification: depth: 1, err: 20, subject: /CN=xxx, issuer: 
> /CN=xxx
> TLS certificate verification: Error, unable to get local issuer certificate
> TLS certificate verification: depth: 1, err: 20, subject: /CN=xxx, issuer: 
> /CN=xxx
> TLS certificate verification: Error, unable to get local issuer certificate
> TLS trace: SSL3 alert write:fatal:unknown CA
> TLS trace: SSL_connect:error in SSLv3 read server certificate B
> TLS: can't connect: error:14007086:SSL routines:CONNECT_CR_CERT:certificate 
> verify failed (unable to get local issuer certificate).
> ldap_err2string
> ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
>
> Even setting TLS_CACERT does not fix it, only making 
> TLS_REQCERT never
>
> TLS_CACERTDIR has pem certificates and links with them with hashes
>
> ktrace does not show any reads on TLS_CACERTDIR
>
> bbbf0019.0@ -> My_ROOT_CA.asc
> My_ROOT_CA.asc@ -> My_ROOT_CA.pem
>
> Apparently this also breaks freeradius which seems logical.
>
> Thanks,
>
> G
>
>

There were big changes in certificate validation in libressl a little
before 6.8 and various problems have been found with them. I added a
workaround for one issue in a -stable packages update to openldap,
some are fixed in libressl in -current, and workarounds for some
ports have been made by changing them to use openssl instead of
libressl.

Your best option is probably to run -current and report back if
there are still problems and then hopefully 6.9 will be better.


Reply via email to