Issue #717 has been updated by Raphaël Ouazana.

Status changed from Assigned to Feedback
Assigned to changed from Raphaël Ouazana to Clément OUDOT
% Done changed from 0 to 70

This should be fixed in branch 2.1 and in trunk. Please test.

Francesco, your patch was correct but it seems you were using an 
asyncLdapSourceService. So the first sync used TLS, but the async one didn't 
use TLS.
----------------------------------------
Bug #717: StartTLS ignored
http://tools.lsc-project.org/issues/717

Author: Francesco Malvezzi
Status: Feedback
Priority: Normal
Assigned to: Clément OUDOT
Category: Core
Target version: 2.1.2
Problem in version: 2.1.1


switch tlsActivated is ignored.

In order to enable, add following lines at: org.lsc.jndi.JndiServices line 410:

 if(connection.isTlsActivated() != null) {
                LOGGER.info("is TlsActivated? " + connection.isTlsActivated());
            props.setProperty("java.naming.tls", 
Boolean.toString(connection.isTlsActivated()));
        }

but after then, i see: 
<pre>
ago 08 16:08:17 - INFO  - Connecting to LDAP server 
ldap://ldap2.example.org:389/dc=example,dc=org as 
cn=provisionator,ou=agents,dc=example,dc=org with STARTTLS extended operation
ago 08 16:08:17 - DEBUG - found X509TrustManager 
sun.security.ssl.X509TrustManagerImpl@3be61638
ago 08 16:08:17 - DEBUG - found X509TrustManager 
sun.security.ssl.X509TrustManagerImpl@3be61638
ago 08 16:08:18 - DEBUG - Sending request 
MessageType : BIND_REQUEST
Message ID : 1
    BindRequest
        Version : '3'
        Name : 'cn=provisionator,ou=agents,dc=example,dc=org'
        Simple authentication : 'secret/0x47 0x55 0x65 0x45 0x6D 0x4E 0x32 0x72 
'
ago 08 16:08:18 - DEBUG - Adding <1, 
org.apache.directory.ldap.client.api.future.BindFuture>
ago 08 16:08:18 - DEBUG - Adding <1, 
org.apache.directory.ldap.client.api.future.BindFuture>
ago 08 16:08:18 - DEBUG - -------> MessageType : BIND_RESPONSE
Message ID : 1
    BindResponse
        Ldap Result
            Result code : (INVALID_CREDENTIALS) invalidCredentials
            Matched Dn : ''
            Diagnostic message : ''
 Message received <-------
</pre>

note the expected: "with STARTTLS extended operation"

Unfortunately something is still wrong:
<pre>
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 fd=42 ACCEPT from IP=my_ip:42469 
(IP=0.0.0.0:389)
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 op=0 EXT oid=1.3.6.1.4.1.1466.20037
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 op=0 STARTTLS
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 op=0 RESULT oid= err=0 text=
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 fd=42 TLS established tls_ssf=256 
ssf=256
Aug  8 16:08:18 b1 slapd[2666]: conn=4282641 fd=42 closed (connection lost)
francesco@b1:~$ sudo grep 'conn=4282642' /var/log/ldap.log
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 fd=44 ACCEPT from IP=my_ip:42470 
(IP=0.0.0.0:389)
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 op=0 BIND 
dn="cn=provisionator,ou=agents,dc=example,dc=org" method=128
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 op=0 RESULT tag=97 err=49 text=
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 fd=44 closed (connection lost)
</pre>

as you can read from slapd log, lsc creates a start_tls session, drops it then 
starts a cleartext (no ssl, no tls) connection which fails due to the access 
control list of the OpenLDAP.

Hope it helps,

Francesco


-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://tools.lsc-project.org/my/account
_______________________________________________________________
Ldap Synchronization Connector (LSC) - http://lsc-project.org

lsc-dev mailing list
[email protected]
http://lists.lsc-project.org/listinfo/lsc-dev

Reply via email to