Bug 1905390
Summary: | Attempting to set sslVersionMin to 1.0 is silently ignored | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Sudhir Menon <sumenon> |
Component: | 389-ds-base | Assignee: | LDAP Maintainers <ldap-maint> |
Status: | CLOSED NOTABUG | QA Contact: | RHDS QE <ds-qe-bugs> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 8.4 | CC: | fcami, ldap-maint, mreynolds |
Target Milestone: | rc | ||
Target Release: | 8.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-01-19 16:46:16 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Sudhir Menon
2020-12-08 08:59:17 UTC
Mark, does this look familiar? Sudhir, what version of python3-lib389 is installed? Rob, The system has python3-lib389-1.4.3.16-3.module+el8.4.0+8869+55706461.noarch installed on it. I know when I run DS healthcheck it does report a warning if sslVersionMin is set to TLS1.0. But the server can adjust this min version if the crypto policy does not support it. Doing an ldapsearch can verify what the server is actually using: ldapsearch -D "cn=directory manager" -W -b cn=encryption,cn=config objectclass=top sslVersionMin It appears that 389-ds is silently ignoring updating this value. Even doing an ldapmodify to set sslVersionMin to TLS1.0 returns no error but it retains the value of TLS1.2 with, as far as I can tell, no mention in the error log. So healthcheck is correctly reporting the current status as SUCCESS because the value is indeed TLS1.2. It's the attempts to change the value which are failing. Not a bad thing but some sort of push back would be useful IMHO. Changing title of BZ as well to reflect the current state. (In reply to Rob Crittenden from comment #4) > It appears that 389-ds is silently ignoring updating this value. Even doing > an ldapmodify to set sslVersionMin to TLS1.0 returns no error but it retains > the value of TLS1.2 with, as far as I can tell, no mention in the error log. Well you need to restart the server for it to take effect, but at restart NSS might adjust it again (that is logged in the errors log at startup). Not sure there is a bug here, I'll check it later today... The value is accepted but after DS restart NSS adjusts it based off of the system crypto policy. This can be seen in the errors log: [19/Jan/2022:11:43:41.939342900 -0500] - INFO - Security Initialization - slapd_ssl_init2 - Configured SSL version range: min: TLS1.0, max: TLS1.3 [19/Jan/2022:11:43:41.939342900 -0500] - INFO - Security Initialization - slapd_ssl_init2 - NSS adjusted SSL version range: min: TLS1.2, max: TLS1.3 Closing as it works as expected |