I confirm that ldpas broke after upgrade.

This is the workaround in my case:

1) Commented out TLSCipherSuite from /etc/ldap/slapd.conf so it 
   picks-up the defaults.

2) Changed TLS_REQCERT from "allow" to "never" into 
   /etc/ldap/ldap.conf.

The clients connect to a name which is different from the 
commonName stated into the self signed certificate.

However this is strange beacuse LDAP.CONF(5) states that 
TLS_REQCERT "allow" means:

  The server certificate is requested. If no certificate is 
  provided, the session proceeds normally. If a bad certificate 
  is provided, it will be ignored and the session proceeds normally.

But the session does not proceeds normally, even if I add 
a subjectAltName into the certificate.

-- 
Niccolo Rigacci
Firenze - Italy



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to