Issue #717 has been updated by Francesco Malvezzi.

I confirm it now works. Actually I was using a asyncLdapSourceService. With a 
plain ldapSourceService it works. Tried 2.1 branch.

thank you so much,

Francesco
----------------------------------------
Bug #717: StartTLS ignored
http://tools.lsc-project.org/issues/717

Author: Francesco Malvezzi
Status: Feedback
Priority: Normal
Assigned to: Clément OUDOT
Category: Core
Target version: 2.1.2
Problem in version: 2.1.1


switch tlsActivated is ignored.

In order to enable, add following lines at: org.lsc.jndi.JndiServices line 410:

 if(connection.isTlsActivated() != null) {
                LOGGER.info("is TlsActivated? " + connection.isTlsActivated());
            props.setProperty("java.naming.tls", 
Boolean.toString(connection.isTlsActivated()));
        }

but after then, i see: 
<pre>
ago 08 16:08:17 - INFO  - Connecting to LDAP server 
ldap://ldap2.example.org:389/dc=example,dc=org as 
cn=provisionator,ou=agents,dc=example,dc=org with STARTTLS extended operation
ago 08 16:08:17 - DEBUG - found X509TrustManager 
sun.security.ssl.X509TrustManagerImpl@3be61638
ago 08 16:08:17 - DEBUG - found X509TrustManager 
sun.security.ssl.X509TrustManagerImpl@3be61638
ago 08 16:08:18 - DEBUG - Sending request 
MessageType : BIND_REQUEST
Message ID : 1
    BindRequest
        Version : '3'
        Name : 'cn=provisionator,ou=agents,dc=example,dc=org'
        Simple authentication : 'secret/0x47 0x55 0x65 0x45 0x6D 0x4E 0x32 0x72 
'
ago 08 16:08:18 - DEBUG - Adding <1, 
org.apache.directory.ldap.client.api.future.BindFuture>
ago 08 16:08:18 - DEBUG - Adding <1, 
org.apache.directory.ldap.client.api.future.BindFuture>
ago 08 16:08:18 - DEBUG - -------> MessageType : BIND_RESPONSE
Message ID : 1
    BindResponse
        Ldap Result
            Result code : (INVALID_CREDENTIALS) invalidCredentials
            Matched Dn : ''
            Diagnostic message : ''
 Message received <-------
</pre>

note the expected: "with STARTTLS extended operation"

Unfortunately something is still wrong:
<pre>
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 fd=42 ACCEPT from IP=my_ip:42469 
(IP=0.0.0.0:389)
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 op=0 EXT oid=1.3.6.1.4.1.1466.20037
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 op=0 STARTTLS
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 op=0 RESULT oid= err=0 text=
Aug  8 16:08:17 b1 slapd[2666]: conn=4282641 fd=42 TLS established tls_ssf=256 
ssf=256
Aug  8 16:08:18 b1 slapd[2666]: conn=4282641 fd=42 closed (connection lost)
francesco@b1:~$ sudo grep 'conn=4282642' /var/log/ldap.log
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 fd=44 ACCEPT from IP=my_ip:42470 
(IP=0.0.0.0:389)
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 op=0 BIND 
dn="cn=provisionator,ou=agents,dc=example,dc=org" method=128
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 op=0 RESULT tag=97 err=49 text=
Aug  8 16:08:18 b1 slapd[2666]: conn=4282642 fd=44 closed (connection lost)
</pre>

as you can read from slapd log, lsc creates a start_tls session, drops it then 
starts a cleartext (no ssl, no tls) connection which fails due to the access 
control list of the OpenLDAP.

Hope it helps,

Francesco


-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://tools.lsc-project.org/my/account
_______________________________________________________________
Ldap Synchronization Connector (LSC) - http://lsc-project.org

lsc-dev mailing list
[email protected]
http://lists.lsc-project.org/listinfo/lsc-dev

Reply via email to