-
Bug
-
Resolution: Unresolved
-
Undefined
-
rhel-9.5
-
389-ds-base-2.6.1-4.el9_6
-
No
-
Moderate
-
ZStream
-
rhel-sst-idm-ds
-
ssg_idm
-
0
-
False
-
-
Yes
-
None
-
Approved Blocker
-
-
Pass
-
Automated
-
Bug Fix
-
-
None
What were you trying to do that didn't work?
I would like to enable TLS1.3 for LDAP in IPA.
I ran
dsconf $INSTANCE security set --tls-protocol-max TLS1.3
And it shows
Successfully updated security configuration (nsSSL3Ciphers)
The LDAP audit also shows
time: 20250211165819 dn: cn=encryption,cn=config result: 0 changetype: modify replace: sslVersionMax sslVersionMax: TLS1.3 - replace: modifiersname modifiersname: cn=Directory Manager - replace: modifytimestamp modifytimestamp: 20250211065819Z -
However the sslVersionMax is still
# dsconf $LDAP_INSTANCE security get | grep sslversion sslversionmin: TLS1.2 sslversionmax: TLS1.2
What is the impact of this issue to you?
Failed to connect LDAP with TLS1.3
# openssl s_client -connect $(hostname):636 -tls1_3 -state <<<''
Connecting to fd00:dce6:2::1
CONNECTED(00000003)
SSL_connect:before SSL initialization
SSL_connect:SSLv3/TLS write client hello
SSL3 alert read:fatal:protocol version
SSL_connect:error in error
00EEF790517F0000:error:0A00042E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:909:SSL alert number 70
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 256 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
Please provide the package NVR for which the bug is seen:
- 389-ds-base-libs-2.5.2-2.el9_5.x86_64
- 389-ds-base-2.5.2-2.el9_5.x86_64
- openssl-3.2.2-6.el9_5.x86_64
- nss-util-3.101.0-10.el9_2.x86_64
- nss-softokn-freebl-3.101.0-10.el9_2.x86_64
- nss-softokn-3.101.0-10.el9_2.x86_64
- nss-3.101.0-10.el9_2.x86_64
- nss-sysinit-3.101.0-10.el9_2.x86_64
- nss-tools-3.101.0-10.el9_2.x86_64
- ipa-server-4.12.2-1.el9_5.3.x86_64
How reproducible is this bug?:
Always
Steps to reproduce
- dsconf $INSTANCE security set --tls-protocol-max TLS1.3
Expected results
SSL version max set to TLS1.3
# dsconf $LDAP_INSTANCE security get | grep sslversionmax sslversionmax: TLS1.3
Actual results
SSL version max was still TLS1.2
# dsconf $LDAP_INSTANCE security get | grep sslversionmax sslversionmax: TLS1.2
Additional info
LDAP errors
[11/Feb/2025:16:25:35.417144781 +1000] - INFO - slapd_extract_cert - CA CERT NAME: EXAMPLE.COM IPA CA [11/Feb/2025:16:25:35.426097079 +1000] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password if pin.txt does not exist. [11/Feb/2025:16:25:35.458167021 +1000] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert [11/Feb/2025:16:25:35.496775070 +1000] - INFO - Security Initialization - SSL info: Enabling default cipher set. [11/Feb/2025:16:25:35.505404533 +1000] - INFO - Security Initialization - SSL info: Configured NSS Ciphers [11/Feb/2025:16:25:35.514376334 +1000] - INFO - Security Initialization - SSL info: TLS_AES_128_GCM_SHA256: enabled [11/Feb/2025:16:25:35.523423649 +1000] - INFO - Security Initialization - SSL info: TLS_AES_256_GCM_SHA384: enabled [11/Feb/2025:16:25:35.532383638 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: enabled [11/Feb/2025:16:25:35.541233889 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: enabled [11/Feb/2025:16:25:35.549894736 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: enabled [11/Feb/2025:16:25:35.558803624 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: enabled [11/Feb/2025:16:25:35.567831353 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: enabled [11/Feb/2025:16:25:35.576902917 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: enabled [11/Feb/2025:16:25:35.585804731 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: enabled [11/Feb/2025:16:25:35.596021538 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: enabled [11/Feb/2025:16:25:35.606657012 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: enabled [11/Feb/2025:16:25:35.615795916 +1000] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: enabled [11/Feb/2025:16:25:35.623678463 +1000] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: enabled [11/Feb/2025:16:25:35.632590371 +1000] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: enabled [11/Feb/2025:16:25:35.641503350 +1000] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA: enabled [11/Feb/2025:16:25:35.650563393 +1000] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: enabled [11/Feb/2025:16:25:35.659492466 +1000] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA: enabled [11/Feb/2025:16:25:35.668374552 +1000] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: enabled [11/Feb/2025:16:25:35.677408092 +1000] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_GCM_SHA256: enabled [11/Feb/2025:16:25:35.686166159 +1000] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_GCM_SHA384: enabled [11/Feb/2025:16:25:35.694949070 +1000] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA: enabled [11/Feb/2025:16:25:35.703879714 +1000] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA256: enabled [11/Feb/2025:16:25:35.712568238 +1000] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA: enabled [11/Feb/2025:16:25:35.721375529 +1000] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA256: enabled [11/Feb/2025:16:25:35.744204689 +1000] - INFO - Security Initialization - slapd_ssl_init2 - Configured SSL version range: min: TLS1.2, max: TLS1.3 [11/Feb/2025:16:25:35.753124427 +1000] - INFO - Security Initialization - slapd_ssl_init2 - NSS adjusted SSL version range: min: TLS1.2, max: TLS1.2 [11/Feb/2025:16:25:35.762378520 +1000] - INFO - main - 389-Directory/2.5.2 B2024.260.0000 starting up
LDAP access
[11/Feb/2025:16:58:19.316899476 +1000] conn=46 fd=239 slot=239 connection from local to /run/slapd-EXAMPLE-COM.socket [11/Feb/2025:16:58:19.317308912 +1000] conn=46 AUTOBIND dn="cn=Directory Manager" [11/Feb/2025:16:58:19.317312885 +1000] conn=46 op=0 BIND dn="cn=Directory Manager" method=sasl version=3 mech=EXTERNAL [11/Feb/2025:16:58:19.317327109 +1000] conn=46 op=0 RESULT err=0 tag=97 nentries=0 wtime=0.000197768 optime=0.000122314 etime=0.000319731 dn="cn=Directory Manager" [11/Feb/2025:16:58:19.567754280 +1000] conn=46 op=1 SRCH base="" scope=0 filter="(objectClass=*)" attrs="vendorVersion" [11/Feb/2025:16:58:19.570302403 +1000] conn=46 op=1 RESULT err=0 tag=101 nentries=1 wtime=0.000161897 optime=0.002556038 etime=0.002716459 [11/Feb/2025:16:58:19.575150019 +1000] conn=46 op=2 MOD dn="cn=encryption,cn=config" [11/Feb/2025:16:58:19.585622894 +1000] conn=46 op=2 RESULT err=0 tag=103 nentries=0 wtime=0.000086823 optime=0.010480730 etime=0.010564389 [11/Feb/2025:16:58:19.585990552 +1000] conn=46 op=3 UNBIND [11/Feb/2025:16:58:19.586028187 +1000] conn=46 op=3 fd=239 Disconnect - Cleanly Closed Connection - U1
- is blocked by
-
RHEL-79468 FIPS mode detection doesn't work for sandboxed service
-
- New
-
- links to
-
RHBA-2024:144130 389-ds-base bug fix and enhancement update