Package: libpam-ldap
Version: 184-4.2
Severity: important


After migrating from etch to lenny I can no longer use the the stanza

  uri ldaps://10.76.195.82
  tls_checkpeer yes
  tls_cacertfile /etc/ssl/certs/jp09_cert.pem

in /etc/pam_ldap.conf. If I do the authentication of users fails with the following messages
in /var/log/auth.log

Oct 10 04:37:23 p2 sshd[13066]: pam_ldap: ldap_simple_bind Can't contact LDAP server
Oct 10 04:37:23 p2 sshd[13066]: pam_ldap: reconnecting to LDAP server...
Oct 10 04:37:23 p2 sshd[13066]: pam_ldap: ldap_simple_bind Can't contact LDAP server
Oct 10 04:37:26 p2 sshd[13066]: Failed password for jprenze from ...

With

 tls_checkpeer no

it works, but seems less secure.

But the certificate works with the server:

=========================================================
p2:/etc/ssl/certs# gnutls-cli -p 636 --x509cafile /etc/ssl/certs/jp09_cert.pem 10.76.195.82
Processed 1 CA certificate(s).
Resolving '10.76.195.82'...
Connecting to '10.76.195.82:636'...
- Certificate type: X.509
- Got a certificate list of 2 certificates.

- Certificate[0] info:
# The hostname in the certificate matches '10.76.195.82'.
# valid since: Fri Oct  9 18:57:47 CEST 2009
# expires at: Thu Jul  5 18:57:47 CEST 2012
# fingerprint: 9B:B2:63:7E:33:47:61:99:C1:9E:5C:59:A9:B0:5B:77
# Subject's DN: CN=10.76.195.82,ST=Niedersachsen,C=DE,email=jpre...@gwdg.de,O=University Goettingen,OU=Buesgen
Institute
# Issuer's DN: CN=Juergen Prenzel,ST=Niedersachsen,C=DE,email=jpre...@gwdg.de,O=University Goettingen,OU=Buesgen
Institute

- Certificate[1] info:
# valid since: Fri Oct  9 18:56:59 CEST 2009
# expires at: Thu Jul  5 18:56:59 CEST 2012
# fingerprint: 3C:40:EF:D2:BC:35:71:57:0A:77:56:CA:9B:A0:54:AB
# Subject's DN: CN=Juergen Prenzel,ST=Niedersachsen,C=DE,email=jpre...@gwdg.de,O=University Goettingen,OU=Buesgen
Institute
# Issuer's DN: CN=Juergen Prenzel,ST=Niedersachsen,C=DE,email=jpre...@gwdg.de,O=University Goettingen,OU=Buesgen
Institute


- Peer's certificate is trusted
- Version: TLS1.0
- Key Exchange: RSA
- Cipher: AES-128-CBC
- MAC: SHA1
- Compression: NULL
- Handshake was completed

- Simple Client Mode:
==============================================

I guess that libpam-ldap somehow ignores the tls_cacertfile parameter.

 Juergen Prenzel

-- System Information:
Debian Release: 5.0.3
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpam-ldap depends on:
ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy ii libc6 2.7-18 GNU C Library: Shared libraries
ii  libldap-2.4-2             2.4.11-1       OpenLDAP libraries
ii libpam0g 1.0.1-5+lenny1 Pluggable Authentication Modules l

libpam-ldap recommends no packages.

Versions of packages libpam-ldap suggests:
ii libnss-ldapd [libnss-ldap] 0.6.7.1 NSS module for using LDAP as a nam

-- debconf information:
* shared/ldapns/base-dn: dc=example,dc=net
* shared/ldapns/ldap-server: ldapi:///
libpam-ldap/pam_password: crypt
libpam-ldap/binddn: cn=proxyuser,dc=example,dc=net
* libpam-ldap/rootbinddn: cn=manager,dc=example,dc=net
* libpam-ldap/dbrootlogin: true
libpam-ldap/override: true
* shared/ldapns/ldap_version: 3
* libpam-ldap/dblogin: false




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to