[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
RE: openldap 2.1.30 + gentoo +ssl [self signed problem again]
I noticed that you have a "simple_bind=64" directive in slapd.conf, but your "ldapsearch -Z" is using the default SASL bind?
Gary
-----Original Message-----
From: owner-openldap-software@OpenLDAP.org on behalf of Florin Angelescu
Sent: Thu 11/25/2004 9:07 PM
To: Dieter Kluenter
Cc: OpenLDAP-software@OpenLDAP.org
Subject: Re: openldap 2.1.30 + gentoo +ssl [self signed problem again]
On Thursday 25 November 2004 11:32, you wrote:
> Hello,
>
> Florin Angelescu <fangelescu@caami-hziv.fgov.be> writes:
> > On Thursday 25 November 2004 09:04, you wrote:
> >> U must post your err msgs, debug output of slapd, ldap.conf and
> >> slapd.conf B4 anyone could help u.
>
> [... 9
>
> >> I read the openldap software faq
> >> and followed the instructions but it still got a self signed certificate
> >> error
> >> with ldapsearch ....
> >> [ yes i read the faq, and yes i adde the TLS_CACERT !!! ]
> >> Was there an issue whit that version ? Do i have to upgrade to 2.2 ?
> >
> > oh sure
> > here are the logs
> >
> > http://student.vub.ac.be/~fangeles/ldap/filelist.log
> > http://student.vub.ac.be/~fangeles/ldap/sldaperror.log
> > http://student.vub.ac.be/~fangeles/ldap/ldapsearch.log
> > http://student.vub.ac.be/~fangeles/ldap/ldap.conf
> > http://student.vub.ac.be/~fangeles/ldap/slapd.conf
>
> These are the relevant log lines
>
> ,----[ slapd.log ]
>
> | tls_read: want=2, got=2
> | 0000: 02 30 .0
> | TLS trace: SSL3 alert read:fatal:unknown CA
> | TLS trace: SSL_accept:failed in SSLv3 read client certificate A
> | TLS: can't accept.
> | TLS: error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert unknown ca
> | s3_pkt.c:1052 connection_read(12): TLS accept error error=-1 id=0,
> | closing
> | connection_closing: readying conn=0 sd=12 for close
> | connection_close: conn=0 sd=12
>
> `---
>
> You must have signed a cert with the wrong ca, check all your
> certificats with
>
> openssl x509 -in certificate.pem -text
>
> in particular check the keyid, which must be identical in the key
> chain.
>
> -Dieter
well, i have only 1 CA .... (i used CA.sh -newcert)
and the servercert is signed by my CA
openssl x509 -in servercert.pem -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=BE, ST=BELGIUM, L=BRUSSELS, O=CAAMI_CA, OU=CCI,
CN=CAAMI_CA/emailAddress=fangelescu@caami-hziv.fgov.be
Validity
Not Before: Nov 25 08:32:09 2004 GMT
Not After : Nov 25 08:32:09 2005 GMT
Subject: C=BE, ST=BELGIUM, L=BRUSSELS, O=CAAMI-HZIV, OU=CCI,
CN=ldap.caami-hziv.fgov.be/emailAddress=ldapserver@caami-hziv.fgov.be
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
.
.
.