[Mono-bugs] [Bug 78226][Wis] Changed - Unable to bind to LDAP server via SSL using Novell.Directory.Ldap

bugzilla-daemon at bugzilla.ximian.com bugzilla-daemon at bugzilla.ximian.com
Thu Apr 27 21:18:18 EDT 2006


Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by sebastien at ximian.com.

http://bugzilla.ximian.com/show_bug.cgi?id=78226

--- shadow/78226	2006-04-27 18:15:28.000000000 -0400
+++ shadow/78226.tmp.4088	2006-04-27 21:18:18.000000000 -0400
@@ -1,14 +1,14 @@
 Bug#: 78226
 Product: Mono: Class Libraries
 Version: 1.1
-OS: 
+OS: unknown
 OS Details: 
-Status: NEW   
+Status: ASSIGNED   
 Resolution: 
-Severity: 
+Severity: Unknown
 Priority: Wishlist
 Component: Mono.Security
 AssignedTo: sebastien at ximian.com                            
 ReportedBy: directhex at apebox.org               
 QAContact: mono-bugs at ximian.com
 TargetMilestone: ---
@@ -115,6 +115,60 @@
 
 
 ------- Additional Comments From directhex at apebox.org  2006-04-27 18:15 -------
 Created an attachment (id=16859)
 Certificate of failing server, signed by previously attached CA
 
+
+------- Additional Comments From sebastien at ximian.com  2006-04-27 21:18 -------
+> All certificates were generated with OpenLDAP.
+
+Are you sure they were generated by OpenLDAP and not by OpenSSL ?
+
+
+> openssl verify -purpose sslserver osc-ca.pem
+
+That seems to check the ca certificate, not the SSL server certificate
+and it should return a "semi-error", like:
+
+openssl verify -verbose -purpose sslserver 78226.ca.pem
+78226.ca.pem: /C=UK/ST=Oxfordshire/L=Oxford/O=University of
+Oxford/OU=Oxford Supercomputing Centre/CN=Jo
+Shields/emailAddress=jms at comlab.osc.ox.ac.uk
+error 18 at 0 depth lookup:self signed certificate
+OK
+
+because it's a self signed certificate (unless you used other options).
+
+
+Anyway OpenSSL verify is anemic. It report your certificate as "valid"
+for all purposes, even for signing CRL
+
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose sslserver 78226.ldap.pem
+78226.ldap.pem: OK
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose sslclient 78226.ldap.pem
+78226.ldap.pem: OK
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose nssslserver 78226.ldap.pem
+78226.ldap.pem: OK
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose smimesign 78226.ldap.pem
+78226.ldap.pem: OK
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose smimeencrypt 78226.ldap.pem
+78226.ldap.pem: OK
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose crlsign 78226.ldap.pem
+78226.ldap.pem: OK
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose any 78226.ldap.pem
+78226.ldap.pem: OK
+poupou at pollux:~/src/bugzilla> openssl verify -verbose -CAfile
+78226.ca.pem -purpose ocsphelper 78226.ldap.pem
+78226.ldap.pem: OK
+
+I'll re-read the RFCs about the "lack" of (any type) key usage in v3
+certificates. In the mean time, I suggest you regenerate the server
+certificates (not your CA) to include an extended key usage with the
+oid 1.3.6.1.5.5.7.3.1 (Server Authentication).


More information about the mono-bugs mailing list