| Summary: | openldap can't use TLS after a fork() | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Rich Megginson <rmeggins> |
| Component: | openldap | Assignee: | Jan Vcelak <jvcelak> |
| Status: | CLOSED ERRATA | QA Contact: | Ondrej Moriš <omoris> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 6.1 | CC: | bbuesker, ed, jplans, jvcelak, mike, nalin, omoris, ovasik, rmeggins, ruben, tsmetana, zpericic |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | openldap-2.4.23-13.el6 | Doc Type: | Bug Fix |
| Doc Text: |
- use of any tool which calls fork() and then initiates TLS connection to LDAP server using libldap
- TLS negotiation will fail as Mozilla NSS require crypto modules intitialization for each process (even for forked process, because it cannot be detected that the modules were initialized in parent process)
- added code which reloads NSS crypto modules before initializing TLS
- added code to explicitly disable NSS pkcs11 fork() checking in the software token (note that using a 3rd party pkcs11 library or hardware module will still fail as there is no way to turn off fork() checking there)
- TLS negotiation will work as expected in forked processes
|
Story Points: | --- |
| Clone Of: | 636956 | Environment: | |
| Last Closed: | 2011-05-19 13:59:52 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | 636956 | ||
| Bug Blocks: | |||
|
Description
Rich Megginson
2011-01-21 20:31:48 UTC
Technical note added. If any revisions are required, please edit the "Technical Notes" field
accordingly. All revisions will be proofread by the Engineering Content Services team.
New Contents:
- use of any tool which calls fork() and then initiates TLS connection to LDAP server using libldap
- TLS negotiation will fail as Mozilla NSS require crypto modules intitialization for each process (even for forked process, because it cannot be detected that the modules were initialized in parent process)
- added code which reloads NSS crypto modules before initializing TLS
- TLS negotiation will work as expected in forked processes
Technical note updated. If any revisions are required, please edit the "Technical Notes" field
accordingly. All revisions will be proofread by the Engineering Content Services team.
Diffed Contents:
@@ -1,4 +1,5 @@
- use of any tool which calls fork() and then initiates TLS connection to LDAP server using libldap
- TLS negotiation will fail as Mozilla NSS require crypto modules intitialization for each process (even for forked process, because it cannot be detected that the modules were initialized in parent process)
- added code which reloads NSS crypto modules before initializing TLS
+- added code to explicitly disable NSS pkcs11 fork() checking in the software token (note that using a 3rd party pkcs11 library or hardware module will still fail as there is no way to turn off fork() checking there)
- TLS negotiation will work as expected in forked processes
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2011-0673.html |