Bug 1320295
Summary: | If nsSSL3 is on, even if SSL v3 is not really enabled, a confusing message is logged. | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | German Parente <gparente> |
Component: | 389-ds-base | Assignee: | Noriko Hosoi <nhosoi> |
Status: | CLOSED ERRATA | QA Contact: | Viktor Ashirov <vashirov> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.2 | CC: | nkinder, rmeggins, spichugi |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | 389-ds-base-1.3.5.2-1.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-11-03 20:40:41 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
German Parente
2016-03-22 19:10:53 UTC
Upstream ticket: https://fedorahosted.org/389/ticket/48775 Build tested: 389-ds-base-1.3.5.10-5.el7.x86_64 Fix commit message says: "Description: The config entry cn=encryption,cn=config takes old and new formats to specify SSL versions. * old format: nsSSL3: on|off nsTLS1: on|off * new format: sslVersionMin: <min value, e.g., TLS1.0> sslVersionMax: <max value, e.g., TLS1.3> To enable SSLv3, both nsSSL3 needs to be on and sslVersionMin needs to set to SSL3. But the current code logs the following warning if nsSSL3 is on, even if sslVersionMin is set to higher than SSL3: Found unsecured configuration: nsSSL3: on; We strongly recommend to disable nsSSL3 in cn=encryption,cn=config. Instead, this patch changes the behaviour to log the warning only when nsSSL3 is on and sslVersionMin is set to lower than or equal to SSL3: Min value is too low in range: min: SSL3, max: TLS##; We strongly recommend to set sslVersionMin higher than TLS1.0." Verification steps: 1) Install Directory Server instance 2) Enable SSL 3) Set nsSSL3: on [root@rhel-dev ~]# ldapmodify -h localhost -p 389 -D "cn=Directory Manager" -w Secret123 dn: cn=encryption,cn=config changetype: modify replace: nsSSL3 nsSSL3: on modifying entry "cn=encryption,cn=config" 4) Set sslVersionMin: SSL3 [root@rhel-dev ~]# ldapmodify -h localhost -p 389 -D "cn=Directory Manager" -w Secret123 dn: cn=encryption,cn=config changetype: modify replace: sslVersionMin sslVersionMin: SSL3 modifying entry "cn=encryption,cn=config" 5) Restart the instance 6) Check error log for the warning message [root@rhel-dev ~]# tail /var/log/dirsrv/slapd-rhel-dev/errors [02/Aug/2016:16:08:44.142836232 +0200] SSL alert: TLS_RSA_WITH_3DES_EDE_CBC_SHA: enabled, (WEAK CIPHER) [02/Aug/2016:16:08:44.159967815 +0200] SSL alert: TLS_RSA_WITH_RC4_128_MD5: enabled, (WEAK CIPHER) [02/Aug/2016:16:08:44.164679188 +0200] SSL alert: SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA: enabled, (WEAK CIPHER) [02/Aug/2016:16:08:44.169573949 +0200] SSL alert: SSL_RSA_FIPS_WITH_DES_CBC_SHA: enabled, (WEAK CIPHER) [02/Aug/2016:16:08:44.174629834 +0200] SSL alert: TLS_RSA_WITH_DES_CBC_SHA: enabled, (WEAK CIPHER) [02/Aug/2016:16:08:44.193644636 +0200] SSL alert: Min value is too low in range: min: SSL3, max: TLS1.2; We strongly recommend to set sslVersionMin higher than TLS1.0. [02/Aug/2016:16:08:44.198469638 +0200] SSL Initialization - Configured SSL version range: min: SSL3, max: TLS1.2 [02/Aug/2016:16:08:44.209585378 +0200] 389-Directory/1.3.5.10 B2016.197.39 starting up [02/Aug/2016:16:08:44.313029303 +0200] slapd started. Listening on All Interfaces port 389 for LDAP requests [02/Aug/2016:16:08:44.318594584 +0200] Listening on All Interfaces port 636 for LDAPS requests Marking as verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2016-2594.html |