On Fri, 8 Feb 2002, Lutz Jaenicke wrote: > On Fri, Feb 08, 2002 at 01:53:11AM -0700, Dax Kelson wrote: > > > > sshd/ftpd/telnetd -> pam_ldap -> libldap -> libssl/libcrypto > > > > To recap, when my dual processor Pentium III is idle, I *always* get a > > return value of 0 from SSL_connect. If I bog down the box, I get "1" and > > everything works (login sucessful). > > > > I added a check for SSL_get_error, and I get SSL_ERROR_SYSCALL. > > > > I check the error queue with ERR_get_error() > > > > My luck, I get 0 back from ERR_get_error(). > > > > The man page says, if ERR_get_error returns 0, "an EOF was observed that > > violates the protocol". > > > > <sigh> > > > > I just want my LDAP authentication to work on these two machines out of > > about a dozen where it works fine. The machines that work are "slower" > > 500Mhz boxes, and the failure on a dual P3, and a single CPU AMD 1700+. > > > > pam_ldap is using libldap (further using OpenSSL) to do a starttls > > connection against a remote OpenLDAP server. > > > > I'm just banging my head against the keyboard here. > > Start by using ssldump (http://www.rtfm.com/ssldump). We really need to > see what is going over the wire... (an EOF... would mean that it is the > peer closing the connection... is this really true?). > > Best regards, > Lutz
Ok, 2 months later here is the output from ssldump running on the LDAP server: The first TCP conn happens after I supply my username (nss_ldap). The second TCP connection happens after I supply my password (pam_ldap). 10.1.0.57 is the client, 10.1.0.3 is the server # ssldump -n host 10.1.0.57 and port 389 New TCP connection #1: 10.1.0.57(33046) <-> 10.1.0.3(389) 1 1 0.0109 (0.0109) C>S SSLv2 compatible client hello Version 3.1 cipher suites TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_3DES_EDE_CBC_SHA SSL2_CK_3DES TLS_DHE_DSS_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_MD5 SSL2_CK_RC2 SSL2_CK_RC4 SSL2_CK_RC464 TLS_DHE_DSS_WITH_RC2_56_CBC_SHA TLS_RSA_EXPORT1024_WITH_RC4_56_SHA TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 TLS_RSA_EXPORT1024_WITH_RC4_56_MD5 TLS_DHE_RSA_WITH_DES_CBC_SHA TLS_DHE_DSS_WITH_DES_CBC_SHA TLS_RSA_WITH_DES_CBC_SHA SSL2_CK_DES TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 TLS_RSA_EXPORT_WITH_RC4_40_MD5 SSL2_CK_RC2_EXPORT40 SSL2_CK_RC4_EXPORT40 1 2 0.0144 (0.0035) S>C Handshake ServerHello Version 3.1 session_id[32]= d7 c0 43 0c bc 42 2d b4 05 af 5e 0d eb 0c df dd cc 0f f7 05 a9 24 cb d1 14 c9 36 6e 44 b2 55 40 cipherSuite TLS_RSA_WITH_3DES_EDE_CBC_SHA compressionMethod NULL 1 3 0.0157 (0.0013) S>C Handshake Certificate 1 4 0.0157 (0.0000) S>C Handshake ServerHelloDone 1 5 0.0180 (0.0023) C>S Handshake ClientKeyExchange 1 6 0.0180 (0.0000) C>S ChangeCipherSpec 1 7 0.0180 (0.0000) C>S Handshake 1 8 0.1404 (0.1224) S>C ChangeCipherSpec 1 9 0.1404 (0.0000) S>C Handshake 1 10 0.1432 (0.0027) C>S application_data 1 11 0.1474 (0.0042) S>C application_data 1 12 0.1480 (0.0005) C>S application_data 1 13 0.1546 (0.0066) S>C application_data 1 14 0.1614 (0.0067) C>S application_data 1 15 0.1678 (0.0064) S>C application_data 1 16 2.9909 (2.8231) C>S application_data 1 17 2.9973 (0.0063) S>C application_data New TCP connection #2: 10.1.0.57(33047) <-> 10.1.0.3(389) 2 1 0.0066 (0.0066) C>S SSLv2 compatible client hello Version 3.1 cipher suites TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_3DES_EDE_CBC_SHA SSL2_CK_3DES TLS_DHE_DSS_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_MD5 SSL2_CK_RC2 SSL2_CK_RC4 SSL2_CK_RC464 TLS_DHE_DSS_WITH_RC2_56_CBC_SHA TLS_RSA_EXPORT1024_WITH_RC4_56_SHA TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 TLS_RSA_EXPORT1024_WITH_RC4_56_MD5 TLS_DHE_RSA_WITH_DES_CBC_SHA TLS_DHE_DSS_WITH_DES_CBC_SHA TLS_RSA_WITH_DES_CBC_SHA SSL2_CK_DES TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 TLS_RSA_EXPORT_WITH_RC4_40_MD5 SSL2_CK_RC2_EXPORT40 SSL2_CK_RC4_EXPORT40 2 0.0083 (0.0016) S>C TCP FIN I took a closer look at this second TCP session with tethereal. Here is it: 10.1.0.57 is the client, 10.1.0.3 is the server 41 6.488846 10.1.0.57 -> 10.1.0.3 TCP 33041 > 389 [SYN] Seq=2664529133 Ack=0 Win=5840 Len=0 42 6.489711 10.1.0.3 -> 10.1.0.57 TCP 389 > 33041 [SYN, ACK] Seq=3888408187 Ack=2664529134 Win=16384 Len=0 43 6.489753 10.1.0.57 -> 10.1.0.3 TCP 33041 > 389 [ACK] Seq=2664529134 Ack=3888408188 Win=5840 Len=0 44 6.491937 10.1.0.57 -> 10.1.0.3 LDAP MsgId=1 MsgType=Extended Request 45 6.495114 10.1.0.3 -> 10.1.0.57 LDAP MsgId=1 MsgType=Bad message type (24) 46 6.495155 10.1.0.57 -> 10.1.0.3 TCP 33041 > 389 [ACK] Seq=2664529165 Ack=3888408202 Win=5840 Len=0 47 6.495470 10.1.0.57 -> 10.1.0.3 LDAP Invalid LDAP packet 48 6.497238 10.1.0.3 -> 10.1.0.57 TCP 389 > 33041 [FIN, ACK] Seq=3888408202 Ack=2664529289 Win=17396 Len=0 50 6.529037 10.1.0.57 -> 10.1.0.3 TCP 33041 > 389 [ACK] Seq=2664529289 Ack=3888408203 Win=5840 Len=0 Any help, greatly appreciated! Dax Kelson ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]