-
andyf
tux0r - they'll be going out today. It looks like the regression testing was successful.
-
sjorge
After an omios-extra PR gets merged the package should shwo up automatically right?
-
sjorge
Well that's interesting
-
sjorge
latest bloody has broken ldap/client it seems
-
sjorge
logs nothing usful error wise
-
sjorge
Hmm it seems the included openldap update now is not compatible with the illumos ldap client it fails on the TLS setup
-
sjorge
andyf ^ known issue ?
-
sjorge
Ugh yeah 2.6.8 has a ton of TLS "fixes"
-
sjorge
I wonder why ldap/cliet now does not like it anymore
-
sjorge
ldapclient now seems to fai lagainst 2.6.7 too
-
sjorge
so It's something in ldap/client that changed... but what
-
sjorge
I'm not seeing nay changes though since 20240717
-
sjorge
Maybe the linked version of openssl/gnutls ?
-
sjorge
I'm gonna revert for now, last bloody was from 0704 not 0717
-
sjorge
Back on the 20240704 be and everything works again but given the ldap/client today bloody doesn't work against openldap's slapd 2.6.7 and 2.6.8 I don't think that minor bump is to blame.
-
sjorge
It's definitely a TLS issue though
-
sjorge
andyf IIRC ldapclient (ON) links against openssl right? Did that one get bumped or something recently?
-
sjorge
Aside from completely displaying tls I can't get current bloody's ldap client to connect at all
-
sjorge
Even when re-enabling TLS1.0 and weak ciphers
-
ptribble
Does pointing 'openssl s_client' at the server say anything interesting? (That's my normal first step, remove any applications from the mix entirely and just see what the underlying TLS looks like.)
-
sjorge
That works fine, if I pass the -starttls ldap flag
-
sjorge
Settles on New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
-
sjorge
Which is more or less what I would have expected
-
sjorge
ldap/client ofcourse logs nothing
-
sjorge
Not that slapd logs anything useful except the TLS Negotation Failure
-
sjorge
Since ldap/client is not working only wy I can access the box is via serial not making it any easier
-
sjorge
It essentially logs the same: libsldap: Status: 81 Mesg: openConnection: simple bind failed - Can't contact LDAP server
-
sjorge
rebooting now as I actually have stuff I need to do :(
-
sjorge
But we've been here before and I think back then it was a gnutls vs openssl thingy
-
sjorge
On the old BE slapd logs: TLS established tls_ssf=256 ssf=256 tls_proto=TLSv1.3 tls_cipher=TLS_AES_256_GCM_SHA384
-
sjorge
Which seems to match what openssl s_client uses on both old and new be
-
andyf
That doesn't sound great. It's a while since I did anything with openldap but I can see if I can spin up a zone this evening and compare notes.
-
sjorge
So with both slapd (openldap 2.6.8 and 2.6.7) ldap/client from bloody on 20240704 works fine, it seems to neg `TLS established tls_ssf=256 ssf=256 tls_proto=TLSv1.3 tls_cipher=TLS_AES_256_GCM_SHA384`
-
sjorge
Currently bloody's ldap/client doesn't seem to be able to negotiate anything with either version of openldap
-
sjorge
Resulting in slapd closing the connection and ldap/client logging the connection was closed but nothing else useful
-
sjorge
And as per peter's suggestion using openssl s_client -connect server:ldap -starttls ldap or without startls but using the ldaps port, it works on both 20240704 and current bloody, the always seem to settle on TLS1.3 + TLS_AES_256_GCM_SHA384
-
sjorge
Disabling the requirement for TLS in slapd does make ldap/client 'work'
-
sjorge
That's as far as I. got
-
sjorge
These are my current settings, but I also tried raising and lowering the TLS requirement and cipher set to just be ALL, no change `olcTLSProtocolMin: 3.2, olcTLSCipherSuite: EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH, olcSecurity: tls=1`
-
sjorge
And i have `olcRequires: authc` set too, but since I am using a proxy user for the client that shouldn't matter
-
sjorge
I think that's all the relavant bits
-
tux0r
andyf: :) thx