[Fedora-directory-users] TLS trace: SSL3 alert write:fatal:unknown CA

Jeff Gamsby JFGamsby at lbl.gov
Fri Jun 2 22:39:29 UTC 2006


Jeff Gamsby
Center for X-Ray Optics
Lawrence Berkeley National Laboratory
(510) 486-7783



Richard Megginson wrote:
> Jeff Gamsby wrote:
>>
>> Jeff Gamsby
>> Center for X-Ray Optics
>> Lawrence Berkeley National Laboratory
>> (510) 486-7783
>>
>>
>>
>> Richard Megginson wrote:
>>> Jeff Gamsby wrote:
>>>>
>>>> Jeff Gamsby
>>>> Center for X-Ray Optics
>>>> Lawrence Berkeley National Laboratory
>>>> (510) 486-7783
>>>>
>>>>
>>>>
>>>> Richard Megginson wrote:
>>>>> Jeff Gamsby wrote:
>>>>>> I blew away the server and installed a new one, then I used the 
>>>>>> setupssl.sh script to setup SSL. The script completed 
>>>>>> successfully, and the server is listening on port 636, but I'm 
>>>>>> back to a familiar error:
>>>>>>
>>>>>> ldapsearch -x -ZZ -d -1
>>>>>>
>>>>>> TLS trace: SSL_connect:SSLv3 read server hello A
>>>>>> TLS certificate verification: depth: 1, err: 19, subject: 
>>>>>> /CN=CAcert, issuer: /CN=CAcert
>>>>>> TLS certificate verification: Error, self signed certificate in 
>>>>>> certificate chain
>>>>>> tls_write: want=7, written=7
>>>>>>  0000:  15 03 01 00 02 02 30                               
>>>>>> ......0          TLS trace: SSL3 alert write:fatal:unknown CA
>>>>>> TLS trace: SSL_connect:error in SSLv3 read server certificate B
>>>>>> TLS trace: SSL_connect:error in SSLv3 read server certificate B
>>>>>> TLS: can't connect.
>>>>>> ldap_perror
>>>>>> ldap_start_tls: Connect error (-11)
>>>>>>        additional info: error:14090086:SSL 
>>>>>> routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
>>>>>>
>>>>>> Shouldn't CN=CAcert be cn=fqdn?
>>>>> No, no hostname validation is done on the CA cert, only on the 
>>>>> LDAP server cert.
>>>>>
>>>>> Did you configure openldap to use the new CA cert?  
>>>>> http://directory.fedora.redhat.com/wiki/Howto:SSL#Configure_LDAP_clients 
>>>>>
>>>>
>>>> Yes.
>>>>
>>>> This is what the access log says
>>>>
>>>> [02/Jun/2006:14:58:41 -0700] conn=2 op=462 RESULT err=0 tag=101 
>>>> nentries=0 etime=0
>>>> [02/Jun/2006:14:58:47 -0700] conn=124 fd=68 slot=68 connection from 
>>>> 127.0.0.1 to 127.0.0.1
>>>> [02/Jun/2006:14:58:47 -0700] conn=124 op=0 EXT 
>>>> oid="1.3.6.1.4.1.1466.20037" name="startTLS"
>>>> [02/Jun/2006:14:58:47 -0700] conn=124 op=0 RESULT err=0 tag=120 
>>>> nentries=0 etime=0
>>>> [02/Jun/2006:14:58:47 -0700] conn=124 op=-1 fd=68 closed - Peer 
>>>> does not recognize and trust the CA that issued your certificate.
>>>
>>> This means that the CA cert that /etc/openldap/ldap.conf is using is 
>>> not the cert of the CA that issued the Fedora DS server cert.
>> OK.  I had the old cert in there.
>>
>> I followed the instructions and did a
>>
>> cp cacert.asc /etc/openldap/cacerts/`openssl x509 -noout -hash -in 
>> cacert.asc`.0
>>
>> and set TLS_CACERT to /etc/openldap/cacerts/cacert.asc. I still get 
>> the same error
> But does the file /etc/openldap/cacerts/cacert.asc exist?  If not, you 
> need to copy that file in there.  I guess the docs are not explicit 
> enough - if you use TLS_CACERTDIR, you must have the file <hash>.0 in 
> the cacerts directory.  If you use TLS_CACERT, you must have the file 
> /etc/openldap/cacerts/cacert.asc.

It does exist, and I'm using TLS_CACERT /etc/openldap/cacerts/cacert.asc

Same error.
[02/Jun/2006:15:34:53 -0700] conn=30 fd=68 slot=68 connection from 
127.0.0.1 to 127.0.0.1
[02/Jun/2006:15:34:53 -0700] conn=30 op=0 EXT 
oid="1.3.6.1.4.1.1466.20037" name="startTLS"
[02/Jun/2006:15:34:53 -0700] conn=30 op=0 RESULT err=0 tag=120 
nentries=0 etime=0
[02/Jun/2006:15:34:53 -0700] conn=30 op=-1 fd=68 closed - Peer does not 
recognize and trust the CA that issued your certificate.

I also put the same info in /etc/ldap.conf

Also, here are the certs

../shared/bin/certutil -L -P slapd-server- -d .
CA certificate                                               CTu,u,u
server-cert                                                  u,u,u
Server-Cert                                                  u,u,u

Does that look right?

>>
>> [02/Jun/2006:15:24:47 -0700] conn=10 fd=67 slot=67 connection from 
>> 127.0.0.1 to 127.0.0.1
>> [02/Jun/2006:15:24:47 -0700] conn=10 op=0 EXT 
>> oid="1.3.6.1.4.1.1466.20037" name="startTLS"
>> [02/Jun/2006:15:24:47 -0700] conn=10 op=0 RESULT err=0 tag=120 
>> nentries=0 etime=0
>> [02/Jun/2006:15:24:47 -0700] conn=10 op=-1 fd=67 closed - Peer does 
>> not recognize and trust the CA that issued your certificate.
>>
>>
>>
>>
>>>>>
>>>>>>
>>>>>> This is all that the errors log says
>>>>> How about the access log?
>>>>>>
>>>>>> [02/Jun/2006:14:21:01 -0700] - No symmetric key found for cipher 
>>>>>> AES in backend userRoot, attempting to create one...
>>>>>> [02/Jun/2006:14:21:01 -0700] - Key for cipher AES successfully 
>>>>>> generated and stored
>>>>>> [02/Jun/2006:14:21:01 -0700] - No symmetric key found for cipher 
>>>>>> 3DES in backend userRoot, attempting to create one...
>>>>>> [02/Jun/2006:14:21:01 -0700] - Key for cipher 3DES successfully 
>>>>>> generated and stored
>>>>>> [02/Jun/2006:14:21:01 -0700] - No symmetric key found for cipher 
>>>>>> AES in backend NetscapeRoot, attempting to create one...
>>>>>> [02/Jun/2006:14:21:01 -0700] - Key for cipher AES successfully 
>>>>>> generated and stored
>>>>>> [02/Jun/2006:14:21:01 -0700] - No symmetric key found for cipher 
>>>>>> 3DES in backend NetscapeRoot, attempting to create one...
>>>>>> [02/Jun/2006:14:21:01 -0700] - Key for cipher 3DES successfully 
>>>>>> generated and stored
>>>>>> [02/Jun/2006:14:21:01 -0700] - slapd started.  Listening on All 
>>>>>> Interfaces port 389 for LDAP requests
>>>>>> [02/Jun/2006:14:21:01 -0700] - Listening on All Interfaces port 
>>>>>> 636 for LDAPS requests
>>>>>>
>>>>>> Thanks for your help
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> Jeff Gamsby
>>>>>> Center for X-Ray Optics
>>>>>> Lawrence Berkeley National Laboratory
>>>>>> (510) 486-7783
>>>>>>
>>>>>>
>>>>>>
>>>>>> Richard Megginson wrote:
>>>>>>> Jeff Gamsby wrote:
>>>>>>>> OK, now I have a different error.
>>>>>>>>
>>>>>>>> I ran ../shared/bin/certutil -A -n cert-name -t "C,C,C" -i 
>>>>>>>> /etc/certs/ca-cert.pem -P slapd-server- -d .
>>>>>>>>
>>>>>>>> and
>>>>>>>>
>>>>>>>> ln -s ca-cert.pem `openssl x509 -noout -hash -in ca-cert.pem`.0
>>>>>>>>
>>>>>>>> Now, I get this error:
>>>>>>>>
>>>>>>>> TLS: can't connect.
>>>>>>>> ldap_perror
>>>>>>>> ldap_start_tls: Connect error (-11)
>>>>>>>>        additional info: Start TLS request accepted.Server 
>>>>>>>> willing to negotiate SSL.
>>>>>>> What OS and version are you running?  RHEL3 
>>>>>>> /etc/openldap/ldap.conf does not like the TLS_CACERTDIR 
>>>>>>> directive - you must use the TLS_CACERT directive with the full 
>>>>>>> path and filename of the cacert.pem file (e.g. 
>>>>>>> /etc/openldap/cacerts/cacert.pem).  What does it say in the 
>>>>>>> fedora ds access and error log for this request?
>>>>>>>
>>>>>>> For a successful startTLS request with ldapsearch, you should 
>>>>>>> see something like the following in your fedora ds access log:
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 fd=64 slot=64 connection 
>>>>>>> from 127.0.0.1 to 127.0.0.1
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=0 EXT 
>>>>>>> oid="1.3.6.1.4.1.1466.20037" name="startTLS"
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=0 RESULT err=0 tag=120 
>>>>>>> nentries=0 etime=0
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 SSL 256-bit AES
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=1 BIND dn="" method=128 
>>>>>>> version=3
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=1 RESULT err=0 tag=97 
>>>>>>> nentries=0 etime=0 dn=""
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=2 SRCH 
>>>>>>> base="dc=example,dc=com" scope=0 filter="(objectClass=*)" attrs=ALL
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=2 RESULT err=0 tag=101 
>>>>>>> nentries=1 etime=0
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=3 UNBIND
>>>>>>> [02/Jun/2006:15:31:48 -0600] conn=11 op=3 fd=64 closed - U1
>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> Jeff Gamsby
>>>>>>>> Center for X-Ray Optics
>>>>>>>> Lawrence Berkeley National Laboratory
>>>>>>>> (510) 486-7783
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> Richard Megginson wrote:
>>>>>>>>> Jeff Gamsby wrote:
>>>>>>>>>>
>>>>>>>>>> Jeff Gamsby
>>>>>>>>>> Center for X-Ray Optics
>>>>>>>>>> Lawrence Berkeley National Laboratory
>>>>>>>>>> (510) 486-7783
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Richard Megginson wrote:
>>>>>>>>>>> Jeff Gamsby wrote:
>>>>>>>>>>>>
>>>>>>>>>>>> Jeff Gamsby
>>>>>>>>>>>> Center for X-Ray Optics
>>>>>>>>>>>> Lawrence Berkeley National Laboratory
>>>>>>>>>>>> (510) 486-7783
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Richard Megginson wrote:
>>>>>>>>>>>>> Jeff Gamsby wrote:
>>>>>>>>>>>>>> I am trying to get FDS 1.0.2 working in SSL mode. I am 
>>>>>>>>>>>>>> using a OpenSSL CA, I have installed the Server Cert and 
>>>>>>>>>>>>>> the CA Cert, can start FDS in SSL mode, but when I run
>>>>>>>>>>>>>> ldapsearch -x -ZZ  I get TLS trace: SSL3 alert 
>>>>>>>>>>>>>> write:fatal:unknown CA.
>>>>>>>>>>>>> Did you follow this - 
>>>>>>>>>>>>> http://directory.fedora.redhat.com/wiki/Howto:SSL
>>>>>>>>>>>> I did, but that didn't work for me. The only thing that I 
>>>>>>>>>>>> did this time was generate a request from the "Manage 
>>>>>>>>>>>> Certificates", sign the request using my OpenSSL CA, and 
>>>>>>>>>>>> install the Server and CA Certs. Then I turned on SSL in 
>>>>>>>>>>>> the Admin console, and restarted the server.
>>>>>>>>>>>>
>>>>>>>>>>>> When I followed the instructions from the link, I couldn't 
>>>>>>>>>>>> even get FDS to start in SSL mode.
>>>>>>>>>>> One problem may be that ldapsearch is trying to verify the 
>>>>>>>>>>> hostname in your server cert, which is the value of the cn 
>>>>>>>>>>> attribute in the leftmost RDN in your server cert's subject 
>>>>>>>>>>> DN.  What is the subject DN of your server cert?  You can 
>>>>>>>>>>> use certutil -L -n Server-Cert as specified in the Howto:SSL 
>>>>>>>>>>> to print your cert.
>>>>>>>>>>
>>>>>>>>>> Sorry. I missed the -P option.
>>>>>>>>>>
>>>>>>>>>> running ../shared/bin/certutil -L -d . -P slapd-server- -n 
>>>>>>>>>> "server-cert" returns the Subject *CN* as FQDN of FDS and 
>>>>>>>>>> OpenSSL CA host (ran on same machine)
>>>>>>>>> Hmm - try ldapsearch with the -v (or -d?) option to get some 
>>>>>>>>> debugging info.
>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> In /etc/ldap.conf, I have put in
>>>>>>>>>>>>>> TLS_CACERT /path/to/cert
>>>>>>>>>>>>> Is this the same /path/to/cacert.pem as below?
>>>>>>>>>>>> Yes
>>>>>>>>>>>>>> TLSREQCERT allow
>>>>>>>>>>>>>> ssl on
>>>>>>>>>>>>>> ssl start_tls
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> If I run
>>>>>>>>>>>>>> openssl s_client -connect localhost:636 -showcerts -state 
>>>>>>>>>>>>>> -CAfile /path/to/cacert.pem
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> It looks OK
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Please help
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Thanks
>>>>>>>>>>>>>>
>>>>>>>>>>>>> ------------------------------------------------------------------------ 
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> -- 
>>>>>>>>>>>>> Fedora-directory-users mailing list
>>>>>>>>>>>>> Fedora-directory-users at redhat.com
>>>>>>>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users 
>>>>>>>>>>>>>
>>>>>>>>>>>>>   
>>>>>>>>>>>>
>>>>>>>>>>>> -- 
>>>>>>>>>>>> Fedora-directory-users mailing list
>>>>>>>>>>>> Fedora-directory-users at redhat.com
>>>>>>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>>>>>>>> ------------------------------------------------------------------------ 
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> -- 
>>>>>>>>>>> Fedora-directory-users mailing list
>>>>>>>>>>> Fedora-directory-users at redhat.com
>>>>>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>>>>>>>>   
>>>>>>>>>>
>>>>>>>>>> -- 
>>>>>>>>>> Fedora-directory-users mailing list
>>>>>>>>>> Fedora-directory-users at redhat.com
>>>>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>>>>>> ------------------------------------------------------------------------ 
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -- 
>>>>>>>>> Fedora-directory-users mailing list
>>>>>>>>> Fedora-directory-users at redhat.com
>>>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>>>>>>   
>>>>>>>>
>>>>>>>> -- 
>>>>>>>> Fedora-directory-users mailing list
>>>>>>>> Fedora-directory-users at redhat.com
>>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>>>> ------------------------------------------------------------------------ 
>>>>>>>
>>>>>>>
>>>>>>> -- 
>>>>>>> Fedora-directory-users mailing list
>>>>>>> Fedora-directory-users at redhat.com
>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>>>>   
>>>>>>
>>>>>> -- 
>>>>>> Fedora-directory-users mailing list
>>>>>> Fedora-directory-users at redhat.com
>>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>> ------------------------------------------------------------------------ 
>>>>>
>>>>>
>>>>> -- 
>>>>> Fedora-directory-users mailing list
>>>>> Fedora-directory-users at redhat.com
>>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>>>   
>>>>
>>>> -- 
>>>> Fedora-directory-users mailing list
>>>> Fedora-directory-users at redhat.com
>>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>> ------------------------------------------------------------------------ 
>>>
>>>
>>> -- 
>>> Fedora-directory-users mailing list
>>> Fedora-directory-users at redhat.com
>>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>   
>>
>> -- 
>> Fedora-directory-users mailing list
>> Fedora-directory-users at redhat.com
>> https://www.redhat.com/mailman/listinfo/fedora-directory-users
> ------------------------------------------------------------------------
>
> --
> Fedora-directory-users mailing list
> Fedora-directory-users at redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-directory-users
>   




More information about the Fedora-directory-users mailing list