Bug 1090966
Summary: | Net::LDAP should not set ciphers to 'ALL' if not requested explicitly | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Petr Pisar <ppisar> | ||||||||
Component: | perl-LDAP | Assignee: | Petr Pisar <ppisar> | ||||||||
Status: | CLOSED ERRATA | QA Contact: | Stefan Kremen <skremen> | ||||||||
Severity: | medium | Docs Contact: | |||||||||
Priority: | unspecified | ||||||||||
Version: | 6.5 | CC: | antti, ddas, gabe.fahl, jaster, john.a.wagner, jplesnik, mnavrati, perl-maint-list, ppisar, psabata, skremen, tmraz | ||||||||
Target Milestone: | rc | Keywords: | Patch | ||||||||
Target Release: | --- | ||||||||||
Hardware: | x86_64 | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | perl-LDAP-0.40-2.el6 | Doc Type: | Bug Fix | ||||||||
Doc Text: |
When using the Net::LDAPS Perl module to connect to an LDAP server without specifying the list of allowed SSL ciphers, the SSL client offered and accepted all SSL ciphers, even those that were not enabled by default by the underlying cryptographic (OpenSSL) library. To fix this bug, the Net::LDAP source code and documentation have been modified not to request all ciphers by default. As a result, Perl LDAP clients use the default OpenSSL cipher list if not specified otherwise.
|
Story Points: | --- | ||||||||
Clone Of: | 1044401 | ||||||||||
: | 1091316 (view as bug list) | Environment: | |||||||||
Last Closed: | 2015-12-15 16:37:30 UTC | Type: | Bug | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Bug Depends On: | |||||||||||
Bug Blocks: | 1002711, 1070830, 1075802, 1172231 | ||||||||||
Attachments: |
|
Description
Petr Pisar
2014-04-24 13:31:33 UTC
Created attachment 889304 [details]
Fix ported to 0.40
This fix has been proposed to the perl-ldap upstream.
How to test: (1) Start an SSL server. (2) Run a simple Net::LDAPS client without `ciphers' option against the server. (3) Compare list of ciphers advertised by the client to the server against DEFAULT OpenSSL list (see `openssl ciphers DEFAULT' command output). Before: The lists differ. After: The lists are identical. Patch has been accepted by upstream into perl-ldap-0.63. Created attachment 924405 [details]
Correction for the fix
This fix for the original patch is needed. It removes superfluous `defined' keyword. It's upstream commit:
commit 0da06f89aeb715cbf241c2f70ddfc5c3ef4a63b7
Author: Peter Marschall <peter>
Date: Tue Jun 17 19:32:28 2014 +0200
LDAP.pm: set SSL_cipher_list to correct value
Fix commit 11fe2a9 which contains a superfluous defined and thus
set SSL_cipher_list to true instead of the value of the ciphers arg.
Thanks to THOMAS GUEVIN <THOMAS.GUEVIN> for reporting the bug.
Created attachment 1096568 [details]
Correction for the fix ported to 0.40
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-2646.html |