Just to make sure, can you pull the entire HEAD? Thanks for checking,
in
any case. p.
I finally had the time to reproduce the issue using the cvs source
code from HEAD.
The following command was used to build OpenLDAP:
CPPFLAGS="-I/home/openldap/software/include -D_AVL_H" \
LDFLAGS="-L/home/openldap/software/lib
-Wl,-rpath=/home/openldap/software/lib" \
./configure --prefix=/home/openldap/software --enable-rewrite
--enable-dnssrv \
--enable-ldap --enable-meta --enable-auditlog --enable-rwm
--enable-sssvlv \
--with-cyrus-sasl --with-tls=openssl --enable-bdb
make depend; make; make install
The necessary SSL certificates are selfsigned:
openssl genrsa -out server1.key 2048
openssl req -new -key server1.key -x509 -days 365 -out server1.crt
openssl genrsa -out server2.key 2048
openssl req -new -key server2.key -x509 -days 365 -out server2.crt
"server2" was started with the command:
slapd -f /home/openldap/config/slapd.conf.server2 -h
"ldaps://server2:6361"
At this point I could already authenticate via SASL EXTERNAL using the
ldapsearch command:
LDAPTLS_CACERT=server2.crt LDAPTLS_CERT=server1.crt
LDAPTLS_KEY=server1.key \
ldapsearch -H "ldaps://server2:6361" -b "" -s base -Y EXTERNAL
'objectclass=*'
Now I started "server1":
slapd -f /home/openldap/config/slapd.conf.server1 -h "ldap://server1:3891"
Searching with
ldapsearch -H ldap://server1:3891 -b "dc=server2,dc=example,dc=com" -x
gives me no result, but the following output on server1's debug log (level
1):
ldap_connect_to_host: Trying 127.0.0.1:6361
ldap_pvt_connect: fd: 9 tm: -1 async: 0
TLS trace: SSL_connect:before/connect initialization
TLS trace: SSL_connect:SSLv2/v3 write client hello A
TLS trace: SSL_connect:SSLv3 read server hello A
TLS certificate verification: depth: 0, err: 18, subject:
/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=server2, issuer:
/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=server2
TLS certificate verification: Error, self signed certificate
TLS trace: SSL3 alert write:fatal:unknown CA
I think the real error is that you're using self-signed certificates; this
has nothing to do with the way OpenLDAP is using them. Using certificates
signed by a CA known to the servers I obtain the expected behavior.
p.
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS: can't connect: error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed (self
signed certificate).
conn=1000 op=1 meta_search_dobind_init[0]: retrying
URI="ldaps://server2:6361" DN="".
And again:
Starting "server1" with the environment variables and everything works
fine:
LDAPTLS_CACERT=server2.crt LDAPTLS_CERT=server1.crt
LDAPTLS_KEY=server1.key \
slapd -f /home/openldap/config/slapd.conf.server1 -h
"ldap://server1:3891"
I hope you can reproduce this issue using the information I provided.
The configurations of both servers are attached below.
Best Regards,
Manuel
slapd.conf.server1
include /home/openldap/software/etc/openldap/schema/core.schema
include /home/openldap/software/etc/openldap/schema/cosine.schema
include
/home/openldap/software/etc/openldap/schema/inetorgperson.schema
database meta
suffix "dc=example,dc=com"
uri "ldaps://server2:6361/dc=server2,dc=example,dc=com"
idassert-authzFrom "*"
idassert-bind bindmethod=sasl
saslmech=EXTERNAL
tls_cert=/home/openldap/config/server1.crt
tls_key=/home/openldap/config/server1.key
tls_cacert=/home/openldap/config/server2.crt
mode=none
slapd.conf.server2
include /home/openldap/software/etc/openldap/schema/core.schema
include /home/openldap/software/etc/openldap/schema/cosine.schema
include
/home/openldap/software/etc/openldap/schema/inetorgperson.schema
TLSCertificateFile /home/openldap/config/server2.crt
TLSCertificateKeyFile /home/openldap/config/server2.key
TLSCACertificateFile /home/openldap/config/server1.crt
TLSVerifyClient demand
database bdb
suffix "dc=server2,dc=example,dc=com"
rootdn "cn=manager,dc=server2,dc=example,dc=com"
directory /home/openldap/db.server2