What version of origin are you running with (and if you built it yourself,
what version of go did you build with?)

It looks like SECURE256 translates to these ciphers:

TLSv1.2:
  ciphers:
    TLS_RSA_WITH_AES_256_CBC_SHA256
    TLS_RSA_WITH_AES_256_GCM_SHA384
    TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384


None of those are supported in go1.4.  TLS_RSA_WITH_AES_256_GCM_SHA384
should work with go1.6.




On Thu, Jul 14, 2016 at 8:54 AM, Andre Esser <[email protected]>
wrote:

> RESOLVED:
>
> Our LDAP servers required 256 bit cyphers but OpenShift appears to use 128
> bit ones. After setting 'olcTLSCipherSuite' to 'SECURE128' authentication
> started to work.
>
> Cheers,
>
> Andre
>
>
>
> On 2016-07-13 17:50, Andre Esser wrote:
>
>> Certificate:
>>      Data:
>>          Version: 3 (0x2)
>>          Serial Number: 971[..] (0x86[..])
>>      Signature Algorithm: sha256WithRSAEncryption
>>          Issuer: C=VG, ST=Tortola, L=Road Town, O=Voidbridge Software
>> Limited, CN=Voidbridge CA/[email protected]
>>          Validity
>>              Not Before: Apr 12 16:39:00 2015 GMT
>>              Not After : Apr  9 16:39:00 2025 GMT
>>          Subject: C=VG, ST=Tortola, L=Road Town, O=Voidbridge Software
>> Limited, CN=Voidbridge CA/[email protected]
>>          Subject Public Key Info:
>>              Public Key Algorithm: rsaEncryption
>>                  Public-Key: (4096 bit)
>>                  Modulus:
>>                      00:b5:35:[...]
>>                  Exponent: 65537 (0x10001)
>>          X509v3 extensions:
>>              X509v3 Subject Key Identifier:
>>                  76:44:AB:[..]
>>              X509v3 Authority Key Identifier:
>>                  keyid:76:44:AB:[..]
>>
>>              X509v3 Basic Constraints:
>>                  CA:TRUE
>>              X509v3 Key Usage:
>>                  Certificate Sign, CRL Sign
>>      Signature Algorithm: sha256WithRSAEncryption
>>           96:5a:ac:[..]
>>
>>
>> On 2016-07-13 17:26, Jordan Liggitt wrote:
>>
>>> Is the signing cert an actual CA (what does `openssl x509 -in
>>> /etc/pki/ca-trust/source/anchors/voidbridge-ca.crt -text -noout` show?)
>>>
>>> On Wed, Jul 13, 2016 at 12:15 PM, Andre Esser
>>> <[email protected] <mailto:[email protected]>> wrote:
>>>
>>>     Hi,
>>>
>>>     I'm having problems getting LDAP authentication with a STARTTLS LDAP
>>>     server to work on an Openshift Origin installation.
>>>
>>>
>>>     The provider config is as follows:
>>>
>>>     -------------------------------------------------------------
>>>     identityProviders:
>>>        - name: "voidbridge_ldap_provider"
>>>          challenge: true
>>>          login: true
>>>          mappingMethod: add
>>>          provider:
>>>            apiVersion: v1
>>>            kind: LDAPPasswordIdentityProvider
>>>            attributes:
>>>              id:
>>>              - uid
>>>              email:
>>>              - mail
>>>              name:
>>>              - gecos
>>>              preferredUsername:
>>>              - uid
>>>            bindDN: ""
>>>            bindPassword: ""
>>>            ca: /etc/pki/ca-trust/source/anchors/voidbridge-ca.crt
>>>            insecure: false
>>>            url: "ldap://ldap.local.voidbridge \
>>>                  /ou=people,dc=voidbridge?uid?one"
>>>     ---------------------------------------------------------------
>>>
>>>     The LDAP server's cert is self-signed, the CA cert is
>>>     voidbridge-ca.crt. The LDAP server only accepts STARTTLS connections
>>>     and performs fine for other services. In particular the command
>>>
>>>        ldapwhoami -h ldap.local.voidbridge \
>>>          -D uid=andre.esser,ou=people,dc=voidbridge -ZZ -W
>>>
>>>     succeeds when the correct password is entered.
>>>
>>>     Also when I temporarily disable the STARTTLS requirement on the LDAP
>>>     server and switch to 'insecure: false' in the provider config, the
>>>     authentication succeeds.
>>>
>>>     The error in the OpenShift log (via syslog) is:
>>>
>>>        Jul 13 15:09:22 osae-master-101 atomic-openshift-master-api:
>>>        E0713 15:09:22.921501   10255 login.go:162] Error authenticating
>>>        "andre.esser" with provider "voidbridge_ldap_provider": LDAP
>>> Result
>>>        Code 200 "": TLS handshake failed (EOF)
>>>
>>>
>>>     Any help to get authentication working over STARTTLS would be
>>>     greatly appreciated,
>>>
>>>     Andre
>>>
>>>     _______________________________________________
>>>     users mailing list
>>>     [email protected]
>>>     <mailto:[email protected]>
>>>     http://lists.openshift.redhat.com/openshiftmm/listinfo/users
>>>
>>>
>>>
_______________________________________________
users mailing list
[email protected]
http://lists.openshift.redhat.com/openshiftmm/listinfo/users

Reply via email to