Bug 722959
Summary: | TLS_REQCERT=never ignored when the certificate is expired | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Jan Vcelak <jvcelak> | ||||
Component: | openldap | Assignee: | Jan Vcelak <jvcelak> | ||||
Status: | CLOSED ERRATA | QA Contact: | BaseOS QE Security Team <qe-baseos-security> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 6.1 | CC: | jhrozek, jplans, jvcelak, jzeleny, omoris, ovasik, tsmetana | ||||
Target Milestone: | rc | ||||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | openldap-2.4.23-17.el6 | Doc Type: | Bug Fix | ||||
Doc Text: |
- openldap client tool settings contain TLS_REQCERT=never, remote LDAP server has certificate, which was issued by CA whose certificate is expired, the client tries to connect to that server
- the connection fails as the CA certificate is expired
- patch was applied to ignore expired CA certificate, when TLS_REQCERT is set to 'never'
- the connection to server while TLS_REQCERT=never is set succeeds, even if the certificate issuer's certificate is not valid
|
Story Points: | --- | ||||
Clone Of: | |||||||
: | 722961 (view as bug list) | Environment: | |||||
Last Closed: | 2011-12-06 12:12:58 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 722961 | ||||||
Attachments: |
|
Description
Jan Vcelak
2011-07-18 15:39:41 UTC
Not completely true. All versions of OpenLDAP with MozNSS are affected. When the issuer certificate is expired, the connection will terminate. When the certificate validation is disabled (e.g. TLS_REQCERT=never), another error has to be ignored - SEC_ERROR_EXPIRED_ISSUER_CERTIFICATE. Created attachment 514059 [details]
proposed patch
Submitted upstream: http://www.openldap.org/its/index.cgi?findid=6998 Patch was applied upstream. http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=e8ac17e Resolved in openldap-2.4.23-17.el6 Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: - openldap client tool settings contain TLS_REQCERT=never, remote LDAP server has certificate, which was issued by CA whose certificate is expired, the client tries to connect to that server - the connection fails as the CA certificate is expired - patch was applied to ignore expired CA certificate, when TLS_REQCERT is set to 'never' - the connection to server while TLS_REQCERT=never is set succeeds, even if the certificate issuer's certificate is not valid Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2011-1514.html |