Bug 742023
Summary: | Default SSL certificate bundle is not found by openldap library | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | advax | |
Component: | openldap | Assignee: | Jan Vcelak <jvcelak> | |
Status: | CLOSED ERRATA | QA Contact: | BaseOS QE Security Team <qe-baseos-security> | |
Severity: | medium | Docs Contact: | ||
Priority: | medium | |||
Version: | 6.1 | CC: | dspurek, jplans, jvcelak, ovasik, tsmetana | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | openldap-2.4.23-26.el6 | Doc Type: | Bug Fix | |
Doc Text: |
- client establishes TLS connection to a remote server, which has a certificate issued by a commonly trusted CA
- server certificate is rejected because the CA certificate cannot be found
- during the package installation, certificate database is created and a module with trusted root CA is loaded into it, default configuration uses this certificate database
- after default installation, client can establish TLS connection to a remote server, which has a certificate issued by a commonly trusted CA; trusted CA shipped with Mozilla NSS package are used
|
Story Points: | --- | |
Clone Of: | ||||
: | 789088 (view as bug list) | Environment: | ||
Last Closed: | 2012-06-20 07:28:59 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 789088 |
Description
advax
2011-09-28 19:45:59 UTC
Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: - always - it's not possible to connect to openldap server using certificates - sample server-side certificates are generated during installation - it is possible to connect to openldap server using certificates Technical note updated. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. Diffed Contents: @@ -1,4 +1,4 @@ -- always +- client establishes TLS connection to a remote server, which has a certificate issued by a commonly trusted CA -- it's not possible to connect to openldap server using certificates +- server certificate is rejected because the CA certificate cannot be found -- sample server-side certificates are generated during installation +- during the package installation, certificate database is created and a module with trusted root CA is loaded into it, default configuration uses this certificate database -- it is possible to connect to openldap server using certificates+- after default installation, client can establish TLS connection to a remote server, which has a certificate issued by a commonly trusted CA; trusted CA shipped with Mozilla NSS package are used ldap.conf file is generated bad, default value of TLS_CACERTDIR missing. The fix is incomplete. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2012-0899.html |