Le 2017-08-09 14:13, Michael Ströder a écrit :
> r0m5 wrote:
>> So I set up a PKI and now it looks OK regarding syncrepl. So I guess my
>> problem might
>> be related to ITS#8427, which I didn't see before posting here.
>> I still have issues though, with applications randomly failing STARTTLS to
>> my consumers
> Many problems like this are caused by not getting the PKI to issue correct
> certs. Especially you should put all DNS names a LDAP client might use to
> connect to your
> LDAP server in subjectAltName extension.
> E.g. ITS#8427 says:
> "Provide the servers with TLS certificates that are correct but do not include
> an address used in syncrepl provider setting."
> What the heck does that mean?!?
> Ciao, Michael.
I guess the guy uses in order to reproduce a provider certificate which
is signed by a CA his consumer trusts, but the consumer connects to the
provider using a DNS name different from the certificate CN and not
included in subjectAltName.
The certificate I used when I had the problem was self signed but my
consumer was connecting to a correct DNS name (the CN of the
In both cases the certificate is not "valid", but apparently for
Regarding my applications randomly failing STARTTLS to my consumers,
it's not related to the use of a DNS name different from the certificate
CN and not included in subjectAltName. Considering an application using
always the same DNS name to connect to the consumer and connecting to
the same consumer which presents always the same certificate
(self-signed) : most of the time this application succeeds STARTTLS, but
sometimes fails. Log on the consumer :
conn=3232 fd=20 ACCEPT from IP=192.168.74.222:50187 (IP=0.0.0.0:389)
conn=3232 op=0 EXT oid=188.8.131.52.4.1.1466.20037
conn=3232 op=0 STARTTLS
conn=3232 op=0 RESULT oid= err=0 text=
conn=3232 fd=20 TLS established tls_ssf=128 ssf=128
conn=3232 fd=20 closed (connection lost)
I will dig more into it. So far it appears than only PHP applications
fail this way, it seems like there are no probrems with STARTTLS from
freeradius or Apache Basic AuthType with AuthBasicProvider ldap.