Description of problem: ldapsearch and sssd and other LDAP (linked with nss) can't connect to OpenLDAP server running on RHEL6 any longer. gnutls-cli-debug output: for SSL 3.0 (RFC6101) support... yes whether we need to disable TLS 1.2... no whether we need to disable TLS 1.1... no whether we need to disable TLS 1.0... no whether %NO_EXTENSIONS is required... no whether %COMPAT is required... no for TLS 1.0 (RFC2246) support... yes for TLS 1.1 (RFC4346) support... yes for TLS 1.2 (RFC5246) support... yes fallback from TLS 1.6 to... TLS1.2 for inappropriate fallback (RFC7507) support... yes for certificate chain order... sorted for safe renegotiation (RFC5746) support... yes for Safe renegotiation support (SCSV)... yes for encrypt-then-MAC (RFC7366) support... no for ext master secret (RFC7627) support... no for heartbeat (RFC6520) support... no for version rollback bug in RSA PMS... dunno for version rollback bug in Client Hello... no whether the server ignores the RSA PMS version... yes whether small records (512 bytes) are tolerated on handshake... yes whether cipher suites not in SSL 3.0 spec are accepted... yes whether a bogus TLS record version in the client hello is accepted... yes whether the server understands TLS closure alerts... partially whether the server supports session resumption... yes for anonymous authentication support... no for ephemeral Diffie-Hellman support... yes for ephemeral EC Diffie-Hellman support... yes ephemeral EC Diffie-Hellman group info... SECP256R1 for AES-128-GCM cipher (RFC5288) support... no for AES-128-CCM cipher (RFC6655) support... no for AES-128-CCM-8 cipher (RFC6655) support... no for AES-128-CBC cipher (RFC3268) support... yes for CAMELLIA-128-GCM cipher (RFC6367) support... no for CAMELLIA-128-CBC cipher (RFC5932) support... no for 3DES-CBC cipher (RFC2246) support... yes for ARCFOUR 128 cipher (RFC2246) support... yes for MD5 MAC support... yes for SHA1 MAC support... yes for SHA256 MAC support... yes for ZLIB compression support... no for max record size (RFC6066) support... no for OCSP status response (RFC6066) support... no for OpenPGP authentication (RFC6091) support... no ldapsearch say: $ ldapsearch -d256 -ZZ -x -h example.com TLS: could not set SSLv2 mode on. TLS: error: could not initialize moznss security context - error -8187:security library: invalid arguments. TLS: can't create ssl handle. ldap_start_tls: Connect error (-11) OpenLDAP server is using: olcSecurity: ssf=112 olcLocalSSF: 71 I guess recent (config?) changes in nss causes this? Any ideas?
Can you please provide the full set of package versions that work for you, and the set of versions that fail for you?
Now running nss-3.24.0-2.1.fc25.x86_64 which fails, going down to nss-3.23.0-4.fc25.x86_64 it works.
nss-3.23.0-5.fc25.x86_64 works nss-3.23.0-6.fc25.x86_64 works nss-3.23.0-7.fc25.x86_64 works nss-3.23.0-8.fc25.x86_64 works nss-3.23.0-9.fc25.x86_64 works nss-3.24.0-2.0.fc25.x86_64 fails
Same problem with httpd and nss-3.24.0 on Fedora 23. Renaming /etc/httpd/conf.d/nss.conf to /etc/httpd/conf.d/nss.conf-BAK solves the problem but obvioulsy not the correct solution.
nss-3.24.0-2.3.fc25.x86_64 works, thanks!
(In reply to Terje Røsten from comment #5) > nss-3.24.0-2.3.fc25.x86_64 works, thanks! Thanks for the feedback. If that version works for you, then this bug seems to be a duplicate of bug 1342158. *** This bug has been marked as a duplicate of bug 1342158 ***