I am running into issues on RHEL 6.x servers (mix of 6.5 and now 6.6) when attempting to disable SSLv3. I have compiled the servers with the --with-tls=openssl option and communication appears to be working well between servers to matter what I have for SSL Protocol. My problems are with the clients.

For client configuration I install the openldap-clients package via yum install. Everything works as expected with this setting on the server side:

olcTLSCipherSuite: HIGH:+TLSv1.2:-TLSv1.1:-TLSv1.0:+SSLv3:-SSLv2

as soon as I modify the +SSLv3 to -SSLv3 to this:

olcTLSCipherSuite: HIGH:+TLSv1.2:-TLSv1.1:-TLSv1.0:-SSLv3:-SSLv2

the client no longer works. I have tried just about everything I can think of. I /can /get ldapsearch to work properly when I compile the openldap source on the client but sssd / authentication on the Red Hat side still fails. Here is the error message I am getting:

54481b75 slap_listener_activate(8):
54481b75 >>> slap_listener(ldaps://blah)
54481b75 connection_get(38): got connid=1009
54481b75 connection_read(38): checking for input on id=1009
TLS trace: SSL_accept:before/accept initialization
TLS trace: SSL3 alert write:fatal:handshake failure
TLS trace: SSL_accept:error in SSLv3 read client hello C
TLS trace: SSL_accept:error in SSLv3 read client hello C
TLS: can't accept: error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared cipher.
54481b75 connection_read(38): TLS accept failure error=-1 id=1009, closing
54481b75 connection_close: conn=1009 sd=38

I am assuming this has something to do with RHEL clients linking to MozNSS libraries instead of openssl but can not be sure of that. Again, to be clear - I do not change anything but the olcTLSCipherSuite entry so I do not believe it is a certificate issue.

Is there a solution to LDAP auth for RHEL clients with only allowind TLSv1.2? I will gladly compile from source or use the LTB Project rpms.

Thanks in advance,

--
Peter Boguszewski
Manager of Library Systems
UW Madison - Library Technology Group
[email protected]
608.262.4768

Reply via email to