Bug 807491 - LDAPS is not working if LDAPTrustedGlobalCert is defined
Summary: LDAPS is not working if LDAPTrustedGlobalCert is defined
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: httpd
Version: 5.7
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Luboš Uhliarik
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-03-27 22:57 UTC by David Hill
Modified: 2021-01-14 09:21 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-03-27 12:56:03 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description David Hill 2012-03-27 22:57:52 UTC
Description of problem:
LDAPS is not working if LDAPTrustedGlobalCert is defined.


Version-Release number of selected component (if applicable):


How reproducible:
Add this to the httpd.conf file:
LDAPTrustedGlobalCert CA_BASE64 /etc/httpd/conf/ssl.crt/cacert.crt
LDAPTrustedMode SSL
#LDAPVerifyServerCert off

Add this to any virtual host:
        AuthType basic
        AuthName "Page: Login/Pass Windows"
        AuthBasicProvider ldap
        AuthzLDAPAuthoritative on
        AuthLDAPURL "ldaps://dc.org:3269/DC=org,DC=org?sAMAccountName?sub?(objectClass=user)" SSL
        AuthLDAPBindDN "USER"
        AuthLDAPBindPassword "PASSWORD"

        # Using a "Require ldap-filter" here because "Require ldap-group" only grants access to the immediate group members and does not spawn to subgroups.
        Require ldap-filter memberof:1.2.840.113556.1.4.1941:=CN=USER,OU=org,DC=org,DC=org

Steps to Reproduce:
1. Configure the environment as cited above
2. Reload apache
3. Try to access the vhost
  
Actual results:
Can't connect to LDAP server appears in that vhost error log file

Expected results:
Should be working 


Additional info:
The certificate is signed by our internal CA but as soon as I set the LDAPTrustedGlobalCert parameter, it stops working.  I must absolutely uncomment/delete the line starting with LDAPTrustedGlobalCert  ...

The only way to get it working is to set it like what's below:
#LDAPTrustedGlobalCert blah
LDAPTrustedMode SSL
LDAPVerifyServerCert off

Comment 1 Jan Kaluža 2012-06-26 12:55:07 UTC
Hi,

I was trying to reproduce it and it works correctly for me. Can you please to try this command to verify it's really caused by httpd and not by possible LDAP misconfiguration?

LDAPTLS_CACERT=/etc/httpd/conf/ssl.crt/cacert.crt ldapsearch -H ldaps://dc.org:3269 -x -D USER -w PASSWORD

If it won't work, please add "-d1" and send me the output please.

Comment 2 Jan Kaluža 2013-03-27 12:56:03 UTC
We've been unable to reproduce this internally; I'm closing this bug.  If you have further issues please contact Red Hat Support for assistance.


Note You need to log in before you can comment on or make changes to this bug.