Edward Allcutt <emall...@gleim.com> writes:

> Package: libgnutls13
> Version: 1.4.4-3+etch3
> Severity: important
>
> After the upgrade all embedded uses of LDAP fail with connection errors.
> On investigations these seem to be caused by certificate validation
> problems.
>
> This was first noticed with nss_ldap. After enabling debugging, running
> `getent group` produced error messages like:
> TLS certificate verification: depth: 0, err: 130, subject: <snip DN/>
> TLS certificate verification: Error, Unknown error
>
> Similar problems occur for pam_ldap and apache mod_authnz_ldap.
> Strangely, gnutls-cli verifies the server certificate with no problems.
>
> The error was first seen in a STARTTLS only configuration. I have since
> enabled ldaps to ease testing with gnutls-cli and confirmed it still
> affects nss_ldap and apache switched to ldaps.
>
> The root (trusted) certificate of our cert chain is an x509v1 cert, however 
> I'd
> expect gnutls-cli to complain if this were the issue.

Please post output from 'gnutls-cli -p 663 your.ldap.server -d 4711
--print-cert' replacing your.ldap.server as appropriate.

I suspect the problem is that you have a RSA-MD5 signature somewhere in
the certificate chain.

/Simon



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to