Hope this helps: $ gnutls-cli -d 5 -p 636 xx.xx.xx.xx Resolving 'xx.xx.xx.xx'... Connecting to 'xx.xx.xx.xx:636'... |<4>| REC[0x18dd150]: Allocating epoch #0 |<2>| ASSERT: gnutls_constate.c:695 |<4>| REC[0x18dd150]: Allocating epoch #1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 |<3>| HSK[0x18dd150]: Keeping ciphersuite: RSA_ARCFOUR_MD5 |<2>| EXT[0x18dd150]: Sending extension SERVER NAME (17 bytes) |<2>| EXT[0x18dd150]: Sending extension SAFE RENEGOTIATION (1 bytes) |<2>| EXT[0x18dd150]: Sending extension SESSION TICKET (0 bytes) |<2>| EXT[SIGA]: sent signature algo (4.2) DSA-SHA256 |<2>| EXT[SIGA]: sent signature algo (4.1) RSA-SHA256 |<2>| EXT[SIGA]: sent signature algo (2.1) RSA-SHA1 |<2>| EXT[SIGA]: sent signature algo (2.2) DSA-SHA1 |<2>| EXT[0x18dd150]: Sending extension SIGNATURE ALGORITHMS (10 bytes) |<3>| HSK[0x18dd150]: CLIENT HELLO was sent [137 bytes] |<4>| REC[0x18dd150]: Sending Packet[0] Handshake(22) with length: 137 |<4>| REC[0x18dd150]: Sent Packet[1] Handshake(22) with length: 142 |<4>| REC[0x18dd150]: Expected Packet[0] Handshake(22) with length: 1 |<4>| REC[0x18dd150]: Received Packet[0] Handshake(22) with length: 1828 |<4>| REC[0x18dd150]: Decrypted Packet[0] Handshake(22) with length: 1828 |<3>| HSK[0x18dd150]: SERVER HELLO was received [81 bytes] |<3>| HSK[0x18dd150]: Server's version: 3.3 |<3>| HSK[0x18dd150]: SessionID length: 32 |<3>| HSK[0x18dd150]: SessionID: 2b0122b46beded9d4f13d425eec48fa6e98846a1196077633b78ba8d40e62caa |<3>| HSK[0x18dd150]: Selected cipher suite: RSA_CAMELLIA_256_CBC_SHA1 |<2>| EXT[0x18dd150]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes) |<3>| HSK[0x18dd150]: Safe renegotiation succeeded |<3>| HSK[0x18dd150]: CERTIFICATE was received [1743 bytes] |<2>| ASSERT: auth_cert.c:1127 |<2>| ASSERT: gnutls_kx.c:705 |<2>| ASSERT: gnutls_handshake.c:2777 *** Fatal error: The signature algorithm is not supported. |<4>| REC: Sending Alert[2|40] - Handshake failed |<4>| REC[0x18dd150]: Sending Packet[1] Alert(21) with length: 2 |<4>| REC[0x18dd150]: Sent Packet[2] Alert(21) with length: 7 *** Handshake has failed GnuTLS error: The signature algorithm is not supported. |<4>| REC[0x18dd150]: Epoch #0 freed |<4>| REC[0x18dd150]: Epoch #1 freed
And more info: $ gnutls-cli-debug -p 636 xx.xx.xx.xx Resolving 'xx.xx.xx.xx'... Connecting to 'xx.xx.xx.xx:636'... Checking for SSL 3.0 support... yes Checking whether %COMPAT is required... no Checking for TLS 1.0 support... yes Checking for TLS 1.1 support... yes Checking fallback from TLS 1.1 to... N/A Checking for TLS 1.2 support... no Checking whether we need to disable TLS 1.0... N/A Checking for Safe renegotiation support... yes Checking for Safe renegotiation support (SCSV)... yes Checking for HTTPS server name... not checked Checking for version rollback bug in RSA PMS... no Checking for version rollback bug in Client Hello... no Checking whether the server ignores the RSA PMS version... no Checking whether the server can accept Hello Extensions... yes Checking whether the server can accept cipher suites not in SSL 3.0 spec... yes Checking whether the server can accept a bogus TLS record version in the client hello... yes Checking for certificate information... N/A Checking for trusted CAs... N/A Checking whether the server understands TLS closure alerts... partially Checking whether the server supports session resumption... yes Checking for export-grade ciphersuite support... no Checking RSA-export ciphersuite info... N/A Checking for anonymous authentication support... no Checking anonymous Diffie-Hellman group info... N/A Checking for ephemeral Diffie-Hellman support... no Checking ephemeral Diffie-Hellman group info... N/A Checking for AES cipher support (TLS extension)... yes Checking for CAMELLIA cipher support (TLS extension)... yes Checking for 3DES cipher support... yes Checking for ARCFOUR 128 cipher support... no Checking for ARCFOUR 40 cipher support... no Checking for MD5 MAC support... no Checking for SHA1 MAC support... yes Checking for max record size (TLS extension)... no Checking for OpenPGP authentication support (TLS extension)... no -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1534230 Title: LDAP TLS connection stopped working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnutls26/+bug/1534230/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
