Uploaded image for project: 'Red Hat Directory Server'
  1. Red Hat Directory Server
  2. DIRSRV-77

Not able to remove cipher's from Directory Server

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Critical Critical
    • dirsrv-12.6
    • dirsrv-11.8
    • 389-ds-base
    • None
    • rhel-sst-idm-ds
    • 0
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None

      Description of problem:
      Not able to remove cipher's

      Version-Release number of selected component (if applicable):
      389-ds-base-1.4.3.37-2.module+el8.9.0+20974+3405b7e6.x86_64

      How reproducible:
      Always

      Steps to Reproduce:
      1. dsconf EXAMPLE-LOCAL security ciphers disable "TLS_RSA_WITH_AES_256_GCM_SHA384"
      2. dsctl EXAMPLE-LOCAL restart

      Actual results:
      WARN - Security Initialization - SSL alert: Failed to set SSL cipher preference information: invalid ciphers <default,-TLS_RSA_WITH_AES_256_GCM_SHA384>: format is +cipher1,-cipher2... (Netscape Portable Runtime error 0 - no error)

      Expected results:
      Disable cipher and not break SSL/TLS

      Additional info:
      Did test all the following and each one gave the same error

      1. dsconf EXAMPLE-LOCAL security ciphers disable "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
      2. dsconf EXAMPLE-LOCAL security ciphers disable "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384"
      3. dsconf EXAMPLE-LOCAL security ciphers disable "TLS_RSA_WITH_AES_256_GCM_SHA384"

      Which dose match

      1. dsconf EXAMPLE-LOCAL security ciphers list --supported | grep TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
        TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
      1. dsconf EXAMPLE-LOCAL security ciphers list --supported | grep TLS_RSA_WITH_AES_256_GCM_SHA384
        TLS_RSA_WITH_AES_256_GCM_SHA384
      1. dsconf EXAMPLE-LOCAL security ciphers list --supported | grep TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
        TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

      Also tried

      nsSSL3Ciphers: +default,-TLS_RSA_WITH_AES_256_GCM_SHA384
      nsSSL3Ciphers: -TLS_RSA_WITH_AES_256_GCM_SHA384

      Which also failed the same as

      nsSSL3Ciphers: default,-TLS_RSA_WITH_AES_256_GCM_SHA384

              idm-ds-dev-bugs IdM DS Dev
              rhn-support-ekeck Eugene Keck
              IdM DS QE IdM DS QE
              Evgenia Martyniuk Evgenia Martyniuk
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated: