Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Created attachment 615685[details]
Full text output of the installation and configuration of an openldap server, a detailed description of the problem, and details of how to work around it
Description of problem:
Openldap server will ignore openssl certificates and keys if a mozilla/nss cert/key db exists in /etc/openldap/certs.
When installing and configuring openldap for the first time, if you attempt to use certificate files as opposed to certificates that are managed in a mozilla/nss cert/key db, upon establishing an ssl/tls connection to the server, the openldap server will ignore these files and attempt to open the moznss cert/key db anyway.
Version-Release number of selected component (if applicable):
openldap-servers-2.4.23-26.el6_3.2.i686 on RHEL 6.3
How reproducible:
every time
Steps to Reproduce:
(this is a summary. The full steps I took to set up the openldap server, reproduce the problem, and work around it are attached).
1. install openldap-servers
2. basic server configuration:
- configure suffix
- set olcrootpw for cn=manager
- set olcTLSCertificateFile, olcTLSCertificateKeyFile, olcTLSCACertificateFile
3. restart server.
4. openssl s_client -connect localhost:636 -showcerts
Actual results:
# openssl s_client -connect localhost:636 -showcerts
CONNECTED(00000003)
*nothing more appears -- the server hangs here*
Expected results:
# openssl s_client -connect localhost:636 -showcerts
CONNECTED(00000003)
depth=0 C = XX, L = Default City, O = Default Company Ltd, CN = centos6.example.org
verify error:num=18:self signed certificate
verify return:1
depth=0 C = XX, L = Default City, O = Default Company Ltd, CN = centos6.example.org
[snip, snip]
Additional info:
How to work around (yes this is not the 'Right Thing To Do'(tm) but it demonstrates the problem):
1. cd /etc/openldap/certs
2. mv cert8.db key3.db /tmp/
3. service slapd restart
Created attachment 615685 [details] Full text output of the installation and configuration of an openldap server, a detailed description of the problem, and details of how to work around it Description of problem: Openldap server will ignore openssl certificates and keys if a mozilla/nss cert/key db exists in /etc/openldap/certs. When installing and configuring openldap for the first time, if you attempt to use certificate files as opposed to certificates that are managed in a mozilla/nss cert/key db, upon establishing an ssl/tls connection to the server, the openldap server will ignore these files and attempt to open the moznss cert/key db anyway. Version-Release number of selected component (if applicable): openldap-servers-2.4.23-26.el6_3.2.i686 on RHEL 6.3 How reproducible: every time Steps to Reproduce: (this is a summary. The full steps I took to set up the openldap server, reproduce the problem, and work around it are attached). 1. install openldap-servers 2. basic server configuration: - configure suffix - set olcrootpw for cn=manager - set olcTLSCertificateFile, olcTLSCertificateKeyFile, olcTLSCACertificateFile 3. restart server. 4. openssl s_client -connect localhost:636 -showcerts Actual results: # openssl s_client -connect localhost:636 -showcerts CONNECTED(00000003) *nothing more appears -- the server hangs here* Expected results: # openssl s_client -connect localhost:636 -showcerts CONNECTED(00000003) depth=0 C = XX, L = Default City, O = Default Company Ltd, CN = centos6.example.org verify error:num=18:self signed certificate verify return:1 depth=0 C = XX, L = Default City, O = Default Company Ltd, CN = centos6.example.org [snip, snip] Additional info: How to work around (yes this is not the 'Right Thing To Do'(tm) but it demonstrates the problem): 1. cd /etc/openldap/certs 2. mv cert8.db key3.db /tmp/ 3. service slapd restart