389-ds-base linked to NSS and GnuTLS, replication fails
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
389-ds-base (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
openldap (Debian) |
Fix Released
|
Unknown
|
|||
openldap (Ubuntu) |
Won't Fix
|
Undecided
|
Unassigned |
Bug Description
The ns-slapd binary is currently linked to two separate SSL libraries, NSS for server connections, and gnutls for client connections via openldap:
<email address hidden>
libnss3.so => /usr/lib/
(0x00007f0e14e6
(0x00007f0e12de
Because 389ds's replication plugin passes parameters that are only understandable by NSS to the gnutls library, all attempts to replicate over SSL fails as follows:
[30/Mar/
new TLS context
[30/Mar/
the server for cert auth - error -1 - make sure the server is correctly
configured for SSL/TLS
[30/Mar/
ldap.example.com" (ldap:636): Replication bind with EXTERNAL auth failed:
LDAP error 0 (Success) ()
These messages are caused by NSS certificate nicknames being interpreted by gnutls as filesystem paths, triggering failures.
To fix this, 389ds needs to be linked against an LDAP client library that is also linked to NSS.
Right now 389ds cannot be used on Trusty at all in any kind of meaningful way.
affects: | 389-ds-base (Debian) → openldap (Debian) |
Changed in openldap (Debian): | |
status: | Unknown → Won't Fix |
Changed in openldap (Debian): | |
status: | Won't Fix → New |
Changed in openldap (Debian): | |
status: | New → Won't Fix |
Changed in openldap (Ubuntu): | |
status: | New → Won't Fix |
Changed in openldap (Debian): | |
status: | Won't Fix → Fix Released |
Correct, and I'm not sure that's going to change. My priorities are with FreeIPA and 4.3 uses GSSAPI for the replication and this works fine with the test packages. Still unsure if all the bits will land in 16.04 though..