On Monday 05 November 2018 17:02:50 Joel Carnat wrote:
> Le 05/11/2018 16:38, Stuart Henderson a écrit :
> > On 2018-11-05, Joel Carnat <[email protected]> wrote:
> >> Le 05/11/2018 13:48, Stuart Henderson a écrit :
> >>> On 2018-11-05, Joel Carnat <[email protected]> wrote:
> >>>> TLS:
> >>>>    New, TLSv1/SSLv3, Cipher is AES256-GCM-SHA384

AES256-GCM-SHA384 is not in:

> # openssl ciphers
> ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA
> 20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-EC
> DSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:DH
> E-RSA-AES128-GCM-SHA256
> ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-
> GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-A
> ES128-GCM-SHA256

Since it is not an ephemeral cipher suite (and presumably the server does not 
support any DHE or ECDHE cipher suites). As Stuart mentioned earlier, you'd 
need to relax the cipher suite list used by ldap(1) to be at least "compat" 
(or specifically include this cipher suite).

Reply via email to