--On Wednesday, February 23, 2022 9:34 AM +0100 Frédéric Goudal <[email protected]> wrote:



Le 22 févr. 2022 à 17:48, Quanah Gibson-Mount <[email protected]> a
écrit : --On Tuesday, February 22, 2022 9:45 AM +0100 Frédéric Goudal
<[email protected]> wrote:

Hello,

For a legacy application we need to drop the ssl version available on
our openldap server.

Currently it supports TLSv1.2, checked with   nmap --script
ssl-enum-ciphers -p 636 host

What ever value I put on olcTLSProtocolmin the ssl version does not
change… I have tried 3.0 3.1 3.2…

What do I miss ?
Or is it a feature ?

What SSL library is your OpenLDAP linked to?

From what I see in config.status
D["HAVE_OPENSSL_SSL_H"]=" 1"
 D["HAVE_OPENSSL"]=" 1"

ii  libssl-dev:amd64                      1.1.1f-1ubuntu2.9
amd64        Secure Sockets Layer toolkit - development files ii
libssl1.1:amd64                       1.1.1f-1ubuntu2.9
amd64        Secure Sockets Layer toolkit - shared libraries

Generally I'd look at the output of readelf or ldd on the slapd binary itself.

I would note that as documented, olcTLSProtocolMin is N+1, so 3.2 would allow 1.1 or later. 3.2 would restrict it to TLS 1.2 or later. I'm not sure nmap is actually telling you all supported versions, just that 1.2 is allowed.

I generally test using the openssl s_client command.

--Quanah




Reply via email to