I'm not quite sure if it's the same thing as is happening here, but we've basically just had our entire infrastructure broken because it relies on LDAP over SSL.
It seems that the newest release of libgnutls13 (2.0.4-1ubuntu2.3), which was supposed to fix a " where some valid certificate chains would be untrusted", ironically breaks our (valid) certificate chain.
The following is a log of a machine which had not yet been updated, basically enabling me to point the finger at libgnutls:
root@xibalba246:~# apt-get -y -q install libgnutls13
Reading package lists...
Building dependency tree...
Reading state information...
Suggested packages:
gnutls-bin
The following packages will be upgraded:
libgnutls13
1 upgraded, 0 newly installed, 0 to remove and 56 not upgraded.
Need to get 0B/307kB of archives.
After this operation, 0B of additional disk space will be used.
(Reading database ... 24099 files and directories currently installed.)
Preparing to replace libgnutls13 2.0.4-1ubuntu2.1 (using .../libgnutls13_2.0.4-1ubuntu2.3_i386.deb) ...
Unpacking replacement libgnutls13 ...
Setting up libgnutls13 (2.0.4-1ubuntu2.3) ...
Processing triggers for libc6 ...
ldconfig deferred processing now taking place
root@xibalba246:~# ldapsearch -x -H ldaps://xibalba233.cs.unibas.ch/ -D cn=xxxcensored,dc=dbis,dc=cs,dc=unibas,dc=ch -w xxxcensored -b "dc=dbis,dc=cs,dc=unibas,dc=ch" -s sub '(&(objectclass=posixAccount)(uid=xxxcensored))'
ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
root@xibalba246:~#
As said, since our user management is in LDAP (pam_ldap), we're currently losing our servers one by one ;-)
Anyway, these machines are not publicly accessible, so you won't be able to immediately test it for yourself. However, there is a *web* server which is using the same certificate chain (just a different CN), available at https://dbis.cs.unibas.ch/
If you contact anybody from the team there (at the mentioned website, that is), we will gladly help you with more details, if required.
One final note: I'm definitely sure that the certificate chain as absolutely correct (and none of them is about to expire anytime soon). This setup has been working for months now in all kinds of SSL/TLS-encrypted settings.
I'm not quite sure if it's the same thing as is happening here, but we've basically just had our entire infrastructure broken because it relies on LDAP over SSL.
It seems that the newest release of libgnutls13 (2.0.4-1ubuntu2.3), which was supposed to fix a " where some valid certificate chains would be untrusted", ironically breaks our (valid) certificate chain.
The following is a log of a machine which had not yet been updated, basically enabling me to point the finger at libgnutls:
root@xibalba246:~# apt-cache policy libgnutls13 0.4-1ubuntu2. 3 0 ch.archive. ubuntu. com hardy-updates/main Packages security. ubuntu. com hardy-security/main Packages dpkg/status ch.archive. ubuntu. com hardy/main Packages /xibalba233. cs.unibas. ch/ -D cn=xxxcensored, dc=dbis, dc=cs,dc= unibas, dc=ch -w xxxcensored -b "dc=dbis, dc=cs,dc= unibas, dc=ch" -s sub '(&(objectclass =posixAccount) (uid=xxxcensore d))' dc=cs,dc= unibas, dc=ch> with scope subtree posixAccount) (uid=xxxcensore d))
libgnutls13:
Installed: 2.0.4-1ubuntu2.1
Candidate: 2.0.4-1ubuntu2.3
Version table:
2.
500 http://
500 http://
*** 2.0.4-1ubuntu2.1 0
100 /var/lib/
2.0.4-1ubuntu2 0
500 http://
root@xibalba246:~# ldapsearch -x -H ldaps:/
# extended LDIF
#
# LDAPv3
# base <dc=dbis,
# filter: (&(objectclass=
# requesting: ALL
#
[...]
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
root@xibalba246:~# apt-get -y -q install libgnutls13 _2.0.4- 1ubuntu2. 3_i386. deb) ...
Reading package lists...
Building dependency tree...
Reading state information...
Suggested packages:
gnutls-bin
The following packages will be upgraded:
libgnutls13
1 upgraded, 0 newly installed, 0 to remove and 56 not upgraded.
Need to get 0B/307kB of archives.
After this operation, 0B of additional disk space will be used.
(Reading database ... 24099 files and directories currently installed.)
Preparing to replace libgnutls13 2.0.4-1ubuntu2.1 (using .../libgnutls13
Unpacking replacement libgnutls13 ...
Setting up libgnutls13 (2.0.4-1ubuntu2.3) ...
Processing triggers for libc6 ... /xibalba233. cs.unibas. ch/ -D cn=xxxcensored, dc=dbis, dc=cs,dc= unibas, dc=ch -w xxxcensored -b "dc=dbis, dc=cs,dc= unibas, dc=ch" -s sub '(&(objectclass =posixAccount) (uid=xxxcensore d))' bind(SIMPLE) : Can't contact LDAP server (-1)
ldconfig deferred processing now taking place
root@xibalba246:~# ldapsearch -x -H ldaps:/
ldap_sasl_
root@xibalba246:~#
As said, since our user management is in LDAP (pam_ldap), we're currently losing our servers one by one ;-)
Anyway, these machines are not publicly accessible, so you won't be able to immediately test it for yourself. However, there is a *web* server which is using the same certificate chain (just a different CN), available at https:/ /dbis.cs. unibas. ch/
If you contact anybody from the team there (at the mentioned website, that is), we will gladly help you with more details, if required.
One final note: I'm definitely sure that the certificate chain as absolutely correct (and none of them is about to expire anytime soon). This setup has been working for months now in all kinds of SSL/TLS-encrypted settings.
We'd be happy to see this fixed :-D