Red Hat Bugzilla – Bug 1245279
OpenLDAP doesn't use sane (or default) cipher order
Last modified: 2017-03-28 13:57:08 EDT
Description of problem: LDAP clients (like ldapsearch) enable insecure ciphers as well as don't enable the most secure ones. Version-Release number of selected component (if applicable): openldap-2.4.39-6.el7.x86_64 How reproducible: always Steps to Reproduce: 1. tcpdump -i lo -U -w capture.pcap -s 0 port 22 2. ldapsearch -ZZ -H ldaps://localhost:22 3. open capture.pcap with wireshark, set the protocol type to SSL Actual results: Client Hello that advertises support for 42 ciphersuites, among them are export grade ciphers but no AES-GCM ciphers. Expected results: Client Hello that uses NSS default ciphers - no export grade, no single DES, but with AES-GCM ciphers Additional info:
With the nss-3.19.1-9.e7 build these cipher suites are now enabled by default. TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009) TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f) TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d) Not yet enabled yet are TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) pending investigation of some test failures.
Commit adding new cipher suites to play along NSS default ciphers: http://pkgs.devel.redhat.com/cgit/rpms/openldap/commit/?h=rhel-7.2&id=7359eb3d9356ca0c6aba14713814669d29270221 Commit adding checking for eNULL in DEFAULT handling: http://pkgs.devel.redhat.com/cgit/rpms/openldap/commit/?h=rhel-7.2&id=57535c444bf7bef7574ef1614f14884d62520332
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-2131.html