[jira] [Created] (DIRAPI-375) Add TLSv1.3 to default protocols

2021-06-20 Thread Stefan Seelmann (Jira)
Stefan Seelmann created DIRAPI-375:
--

 Summary: Add TLSv1.3 to default protocols
 Key: DIRAPI-375
 URL: https://issues.apache.org/jira/browse/DIRAPI-375
 Project: Directory Client API
  Issue Type: Improvement
Reporter: Stefan Seelmann
 Fix For: 2.0.3






--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@directory.apache.org
For additional commands, e-mail: dev-h...@directory.apache.org



[jira] [Resolved] (DIRSTUDIO-761) GSSAPI Authentication fails when using ADS LDAP Client API

2021-06-20 Thread Stefan Seelmann (Jira)


 [ 
https://issues.apache.org/jira/browse/DIRSTUDIO-761?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stefan Seelmann resolved DIRSTUDIO-761.
---
Resolution: Fixed

This has been fixed in scope of the linked issues and tests have been added.

> GSSAPI Authentication fails when using ADS LDAP Client API
> --
>
> Key: DIRSTUDIO-761
> URL: https://issues.apache.org/jira/browse/DIRSTUDIO-761
> Project: Directory Studio
>  Issue Type: Bug
>  Components: studio-connection
>Affects Versions: 2.0.0-M1 (2.0.0.v20120111)
> Environment: Debian Wheezy
>Reporter: Bill MacAllister
>Priority: Minor
> Fix For: 2.0.0-M17
>
>
> GSSAPI connections to an OpenLDAP server fail when using ADS LDAP Client API 
> with the following error message:
>  Error while opening connection
>   - Missing schema location in RootDSE, using default schema.
>  Missing schema location in RootDSE, using default schema.
> The connection succeeds when the connection is changed to use JNDI.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@directory.apache.org
For additional commands, e-mail: dev-h...@directory.apache.org



[jira] [Commented] (DIRSTUDIO-1219) Directory Studio doesn't StartTLS before authenticating

2021-06-20 Thread Stefan Seelmann (Jira)


[ 
https://issues.apache.org/jira/browse/DIRSTUDIO-1219?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17366162#comment-17366162
 ] 

Stefan Seelmann commented on DIRSTUDIO-1219:


Changed usage of {{useTls}} flag in the LDAP API: 
https://issues.apache.org/jira/browse/DIRAPI-374
https://github.com/apache/directory-ldap-api/commit/bf32f0e902ffb08839defcaf3c1de5164d83e092

Call {{startTls()}} always after connect, verify that the connection is 
secured. Also add various tests where the server requries confidentiality:
https://github.com/apache/directory-studio/commit/b53667ab3b87afcfcd6f1b1df90d733636cfc888

> Directory Studio doesn't StartTLS before authenticating
> ---
>
> Key: DIRSTUDIO-1219
> URL: https://issues.apache.org/jira/browse/DIRSTUDIO-1219
> Project: Directory Studio
>  Issue Type: Bug
>  Components: studio-connection
>Affects Versions: 2.0.0-M16
> Environment: Apache Directory Studio is running on Mac OS 10.14 with 
> jdk1.8.0_201.
>Reporter: Hugh Cole-Baker
>Assignee: Stefan Seelmann
>Priority: Blocker
> Fix For: 2.0.0-M17
>
>
> There is an issue connecting to an OpenLDAP server configured with 
> olcSaslSecProps: noplain,noanonymous,minssf=1
> i.e. The server requires some form of transport encryption. I have chosen 
> StartTLS and SASL GSSAPI authentication, but Directory Studio doesn't 
> actually do StartTLS before binding - I can see this by looking at the 
> network traffic using Wireshark. I would have expected it to start TLS before 
> attempting to bind.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@directory.apache.org
For additional commands, e-mail: dev-h...@directory.apache.org



[jira] [Resolved] (DIRSTUDIO-1219) Directory Studio doesn't StartTLS before authenticating

2021-06-20 Thread Stefan Seelmann (Jira)


 [ 
https://issues.apache.org/jira/browse/DIRSTUDIO-1219?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stefan Seelmann resolved DIRSTUDIO-1219.

Resolution: Fixed

> Directory Studio doesn't StartTLS before authenticating
> ---
>
> Key: DIRSTUDIO-1219
> URL: https://issues.apache.org/jira/browse/DIRSTUDIO-1219
> Project: Directory Studio
>  Issue Type: Bug
>  Components: studio-connection
>Affects Versions: 2.0.0-M16
> Environment: Apache Directory Studio is running on Mac OS 10.14 with 
> jdk1.8.0_201.
>Reporter: Hugh Cole-Baker
>Assignee: Stefan Seelmann
>Priority: Blocker
> Fix For: 2.0.0-M17
>
>
> There is an issue connecting to an OpenLDAP server configured with 
> olcSaslSecProps: noplain,noanonymous,minssf=1
> i.e. The server requires some form of transport encryption. I have chosen 
> StartTLS and SASL GSSAPI authentication, but Directory Studio doesn't 
> actually do StartTLS before binding - I can see this by looking at the 
> network traffic using Wireshark. I would have expected it to start TLS before 
> attempting to bind.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@directory.apache.org
For additional commands, e-mail: dev-h...@directory.apache.org



[jira] [Commented] (DIRSTUDIO-1220) Directory Studio doesn't use the SASL confidentiality layer after negotiating its use

2021-06-20 Thread Stefan Seelmann (Jira)


[ 
https://issues.apache.org/jira/browse/DIRSTUDIO-1220?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17366138#comment-17366138
 ] 

Stefan Seelmann commented on DIRSTUDIO-1220:


Implemented SASL security layer in the LDAP API 
https://issues.apache.org/jira/browse/DIRAPI-373:
https://github.com/apache/directory-ldap-api/commit/2cf66a14c58d4c0ddd3dd3700566a4e72cdb3518

Use that LDAP API version and added tests:
https://github.com/apache/directory-studio/commit/18ad16e89deb2998ee0fef0f16a9a85a0df1ddd2

> Directory Studio doesn't use the SASL confidentiality layer after negotiating 
> its use
> -
>
> Key: DIRSTUDIO-1220
> URL: https://issues.apache.org/jira/browse/DIRSTUDIO-1220
> Project: Directory Studio
>  Issue Type: Bug
>  Components: studio-connection
> Environment: Apache Directory Studio is running on Mac OS 10.14 with 
> jdk1.8.0_201.
>Reporter: Hugh Cole-Baker
>Priority: Major
> Fix For: 2.0.0-M17
>
>
> There is an issue connecting to an OpenLDAP server configured with 
> olcSaslSecProps: noplain,noanonymous,minssf=1
> i.e. The server requires some form of transport encryption. Having a 
> different issue with StartTLS (DIRSTUDIO-1219), I tried relying on the SASL 
> confidentiality layer that SASL's GSSAPI mechanism can provide, to meet the 
> requirement for encryption. I have chosen "No encryption" i.e. no SSL or 
> StartTLS, in the Network Parameters, and then GSSAPI authentication method 
> and Quality of Protection: Authentication with integrity and privacy 
> protection in the SASL settings.
> When connecting to the server, what I can see happening when looking at the 
> network traffic with Wireshark is:
>  # Client obtains a Kerberos service ticket for the LDAP server and passes it 
> in the bind request for SASL GSSAPI authentication
>  # Server replies with a bind response, continuing SASL GSSAPI 
> authentication, result code 14 (SASL bind in progress), with a 4 byte message 
> wrapped using GSS_Wrap. The 4 bytes are 0x06 0x01 0x00 0x00 - referring to 
> RFC4752, the first byte indicates the server supports "Integrity protection" 
> and/or "Confidentiality protection" but not "No security layer", as expected.
>  # Client replies with a bind request, continuing SASL GSSAPI authentication, 
> with a 4 byte message wrapped using GSS_Wrap. The 4 bytes are 0x04 0x01 0x00 
> 0x00 - again referring to RFC4752, the first byte indicates the client has 
> selected "Confidentiality protection".
>  # Server replies with a bind response with result code 0 (success).
>  # Client sends a search request with base DN: "", scope: base, filter: 
> (objectClass=*), for attributes: subschemaSubentry, **with no confidentiality 
> protection**. This is the point where the client violates the protocol 
> described in RFC4752 - after negotiating confidentiality protection, the 
> client needs to actually use it!
>  # Server interprets the lack of confidentiality protection as an error and 
> immediately drops the connection (this makes sense from the server's POV as 
> it could indicate an attempted man-in-the-middle attack)
>  # Client immediately re-connects to the server, **doesn't bother to bind at 
> all** and then issues more search requests on the base object, cn=Subschema, 
> etc.
>  # An error message appears in Directory Studio "Error while opening 
> connection
>  - Missing schema location in RootDSE, using default schema" - this is 
> presumably because the connection isn't bound, and the server limits what it 
> will disclose to un-bound clients.
>  # Directory Studio can't browse the directory at all because it's not 
> properly bound.
> As you can see, there's possibly two issues here - definitely an issue with 
> the SASL GSSAPI mechanism, and possibly also an issue with the reconnect 
> logic.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@directory.apache.org
For additional commands, e-mail: dev-h...@directory.apache.org



[jira] [Resolved] (DIRSTUDIO-1220) Directory Studio doesn't use the SASL confidentiality layer after negotiating its use

2021-06-20 Thread Stefan Seelmann (Jira)


 [ 
https://issues.apache.org/jira/browse/DIRSTUDIO-1220?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stefan Seelmann resolved DIRSTUDIO-1220.

  Assignee: Stefan Seelmann
Resolution: Fixed

> Directory Studio doesn't use the SASL confidentiality layer after negotiating 
> its use
> -
>
> Key: DIRSTUDIO-1220
> URL: https://issues.apache.org/jira/browse/DIRSTUDIO-1220
> Project: Directory Studio
>  Issue Type: Bug
>  Components: studio-connection
> Environment: Apache Directory Studio is running on Mac OS 10.14 with 
> jdk1.8.0_201.
>Reporter: Hugh Cole-Baker
>Assignee: Stefan Seelmann
>Priority: Major
> Fix For: 2.0.0-M17
>
>
> There is an issue connecting to an OpenLDAP server configured with 
> olcSaslSecProps: noplain,noanonymous,minssf=1
> i.e. The server requires some form of transport encryption. Having a 
> different issue with StartTLS (DIRSTUDIO-1219), I tried relying on the SASL 
> confidentiality layer that SASL's GSSAPI mechanism can provide, to meet the 
> requirement for encryption. I have chosen "No encryption" i.e. no SSL or 
> StartTLS, in the Network Parameters, and then GSSAPI authentication method 
> and Quality of Protection: Authentication with integrity and privacy 
> protection in the SASL settings.
> When connecting to the server, what I can see happening when looking at the 
> network traffic with Wireshark is:
>  # Client obtains a Kerberos service ticket for the LDAP server and passes it 
> in the bind request for SASL GSSAPI authentication
>  # Server replies with a bind response, continuing SASL GSSAPI 
> authentication, result code 14 (SASL bind in progress), with a 4 byte message 
> wrapped using GSS_Wrap. The 4 bytes are 0x06 0x01 0x00 0x00 - referring to 
> RFC4752, the first byte indicates the server supports "Integrity protection" 
> and/or "Confidentiality protection" but not "No security layer", as expected.
>  # Client replies with a bind request, continuing SASL GSSAPI authentication, 
> with a 4 byte message wrapped using GSS_Wrap. The 4 bytes are 0x04 0x01 0x00 
> 0x00 - again referring to RFC4752, the first byte indicates the client has 
> selected "Confidentiality protection".
>  # Server replies with a bind response with result code 0 (success).
>  # Client sends a search request with base DN: "", scope: base, filter: 
> (objectClass=*), for attributes: subschemaSubentry, **with no confidentiality 
> protection**. This is the point where the client violates the protocol 
> described in RFC4752 - after negotiating confidentiality protection, the 
> client needs to actually use it!
>  # Server interprets the lack of confidentiality protection as an error and 
> immediately drops the connection (this makes sense from the server's POV as 
> it could indicate an attempted man-in-the-middle attack)
>  # Client immediately re-connects to the server, **doesn't bother to bind at 
> all** and then issues more search requests on the base object, cn=Subschema, 
> etc.
>  # An error message appears in Directory Studio "Error while opening 
> connection
>  - Missing schema location in RootDSE, using default schema" - this is 
> presumably because the connection isn't bound, and the server limits what it 
> will disclose to un-bound clients.
>  # Directory Studio can't browse the directory at all because it's not 
> properly bound.
> As you can see, there's possibly two issues here - definitely an issue with 
> the SASL GSSAPI mechanism, and possibly also an issue with the reconnect 
> logic.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@directory.apache.org
For additional commands, e-mail: dev-h...@directory.apache.org



[jira] [Resolved] (DIRSERVER-1670) DIGEST-MD5 authentication mechanism must support encryption

2021-06-20 Thread Stefan Seelmann (Jira)


 [ 
https://issues.apache.org/jira/browse/DIRSERVER-1670?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stefan Seelmann resolved DIRSERVER-1670.

Fix Version/s: (was: 2.0.0-RC1)
   2.0.0.AM27
   Resolution: Fixed

Fixed in https://issues.apache.org/jira/browse/DIRSERVER-1632


> DIGEST-MD5 authentication mechanism must support encryption
> ---
>
> Key: DIRSERVER-1670
> URL: https://issues.apache.org/jira/browse/DIRSERVER-1670
> Project: Directory ApacheDS
>  Issue Type: Bug
>  Components: authn
>Affects Versions: 1.5.7
> Environment: all
>Reporter: Hendy Irawan
>Priority: Major
> Fix For: 2.0.0.AM27
>
>
> While DIGEST-MD5 should work, encryption doesn't work currently.
> A workaround is to disable data security at the client side:
> ldapsearch -O "maxssf=0" ... 
> However, this doesn't work for all clients. (e.g. Thunderbird)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@directory.apache.org
For additional commands, e-mail: dev-h...@directory.apache.org



[jira] [Resolved] (DIRSERVER-1632) Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP API fails and throws a decoder exception

2021-06-20 Thread Stefan Seelmann (Jira)


 [ 
https://issues.apache.org/jira/browse/DIRSERVER-1632?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stefan Seelmann resolved DIRSERVER-1632.

Resolution: Fixed

> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception
> --
>
> Key: DIRSERVER-1632
> URL: https://issues.apache.org/jira/browse/DIRSERVER-1632
> Project: Directory ApacheDS
>  Issue Type: Bug
>  Components: authn
>Affects Versions: 2.0.0-M1
>Reporter: Pierre-Arnaud Marcelot
>Priority: Critical
> Fix For: 2.0.0.AM27
>
>
> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception.
> This only happens when we use the Apache LDAP API to connect to the server.
> It works fine using JNDI (with Studio for example).
> Two test cases have been added to the 
> org.apache.directory.server.operations.bind.SaslBindIT class:
> - testSaslDigestMd5BindSaslQoPAuthInt()
> - testSaslDigestMd5BindSaslQoPAuthConf()
> These two tests have been ignored at the moment to avoid build breakage.
> Here's the complete stacktrace:
> #
> org.apache.mina.filter.codec.ProtocolDecoderException: 
> org.apache.directory.shared.ldap.codec.api.ResponseCarryingException: 
> ERR_1_BAD_TRANSITION_FROM_STATE Bad transition from state START_STATE, 
> tag 0x00 (Hexdump: 30 36 02 01 02 61 31 0A 01 00 04 00 04 00 87 28 72 73 70 
> 61 75 74 68 3D 63 34 31 63 34 35 65 34 37 31 39 63 33 62 66 37 63 38 63 63 39 
> 37 61 64 33 66 32 66 61 37 39 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 

[jira] [Commented] (DIRSERVER-1632) Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP API fails and throws a decoder exception

2021-06-20 Thread Stefan Seelmann (Jira)


[ 
https://issues.apache.org/jira/browse/DIRSERVER-1632?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17366127#comment-17366127
 ] 

Stefan Seelmann commented on DIRSERVER-1632:


Added additional tests using openldap cmdline tools: 
https://github.com/apache/directory-server/commit/77a842e7442936903141ad031eeabdd7ffb0573f

> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception
> --
>
> Key: DIRSERVER-1632
> URL: https://issues.apache.org/jira/browse/DIRSERVER-1632
> Project: Directory ApacheDS
>  Issue Type: Bug
>  Components: authn
>Affects Versions: 2.0.0-M1
>Reporter: Pierre-Arnaud Marcelot
>Priority: Critical
> Fix For: 2.0.0.AM27
>
>
> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception.
> This only happens when we use the Apache LDAP API to connect to the server.
> It works fine using JNDI (with Studio for example).
> Two test cases have been added to the 
> org.apache.directory.server.operations.bind.SaslBindIT class:
> - testSaslDigestMd5BindSaslQoPAuthInt()
> - testSaslDigestMd5BindSaslQoPAuthConf()
> These two tests have been ignored at the moment to avoid build breakage.
> Here's the complete stacktrace:
> #
> org.apache.mina.filter.codec.ProtocolDecoderException: 
> org.apache.directory.shared.ldap.codec.api.ResponseCarryingException: 
> ERR_1_BAD_TRANSITION_FROM_STATE Bad transition from state START_STATE, 
> tag 0x00 (Hexdump: 30 36 02 01 02 61 31 0A 01 00 04 00 04 00 87 28 72 73 70 
> 61 75 74 68 3D 63 34 31 63 34 35 65 34 37 31 39 63 33 62 66 37 63 38 63 63 39 
> 37 61 64 33 66 32 66 61 37 39 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 

[jira] [Commented] (DIRSERVER-1632) Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP API fails and throws a decoder exception

2021-06-20 Thread Stefan Seelmann (Jira)


[ 
https://issues.apache.org/jira/browse/DIRSERVER-1632?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17366109#comment-17366109
 ] 

Stefan Seelmann commented on DIRSERVER-1632:


https://github.com/apache/directory-server/commit/e71b7260dcdddf8611701384cfe0559c53ec03a5

> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception
> --
>
> Key: DIRSERVER-1632
> URL: https://issues.apache.org/jira/browse/DIRSERVER-1632
> Project: Directory ApacheDS
>  Issue Type: Bug
>  Components: authn
>Affects Versions: 2.0.0-M1
>Reporter: Pierre-Arnaud Marcelot
>Priority: Critical
> Fix For: 2.0.0.AM27
>
>
> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception.
> This only happens when we use the Apache LDAP API to connect to the server.
> It works fine using JNDI (with Studio for example).
> Two test cases have been added to the 
> org.apache.directory.server.operations.bind.SaslBindIT class:
> - testSaslDigestMd5BindSaslQoPAuthInt()
> - testSaslDigestMd5BindSaslQoPAuthConf()
> These two tests have been ignored at the moment to avoid build breakage.
> Here's the complete stacktrace:
> #
> org.apache.mina.filter.codec.ProtocolDecoderException: 
> org.apache.directory.shared.ldap.codec.api.ResponseCarryingException: 
> ERR_1_BAD_TRANSITION_FROM_STATE Bad transition from state START_STATE, 
> tag 0x00 (Hexdump: 30 36 02 01 02 61 31 0A 01 00 04 00 04 00 87 28 72 73 70 
> 61 75 74 68 3D 63 34 31 63 34 35 65 34 37 31 39 63 33 62 66 37 63 38 63 63 39 
> 37 61 64 33 66 32 66 61 37 39 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 

[jira] [Updated] (DIRSERVER-1632) Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP API fails and throws a decoder exception

2021-06-20 Thread Stefan Seelmann (Jira)


 [ 
https://issues.apache.org/jira/browse/DIRSERVER-1632?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stefan Seelmann updated DIRSERVER-1632:
---
Fix Version/s: (was: 2.0.0-RC1)
   2.0.0.AM27

> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception
> --
>
> Key: DIRSERVER-1632
> URL: https://issues.apache.org/jira/browse/DIRSERVER-1632
> Project: Directory ApacheDS
>  Issue Type: Bug
>  Components: authn
>Affects Versions: 2.0.0-M1
>Reporter: Pierre-Arnaud Marcelot
>Priority: Critical
> Fix For: 2.0.0.AM27
>
>
> Setting SASL QoP to 'auth-int' or 'auth-conf' while connecting using the LDAP 
> API fails and throws a decoder exception.
> This only happens when we use the Apache LDAP API to connect to the server.
> It works fine using JNDI (with Studio for example).
> Two test cases have been added to the 
> org.apache.directory.server.operations.bind.SaslBindIT class:
> - testSaslDigestMd5BindSaslQoPAuthInt()
> - testSaslDigestMd5BindSaslQoPAuthConf()
> These two tests have been ignored at the moment to avoid build breakage.
> Here's the complete stacktrace:
> #
> org.apache.mina.filter.codec.ProtocolDecoderException: 
> org.apache.directory.shared.ldap.codec.api.ResponseCarryingException: 
> ERR_1_BAD_TRANSITION_FROM_STATE Bad transition from state START_STATE, 
> tag 0x00 (Hexdump: 30 36 02 01 02 61 31 0A 01 00 04 00 04 00 87 28 72 73 70 
> 61 75 74 68 3D 63 34 31 63 34 35 65 34 37 31 39 63 33 62 66 37 63 38 63 63 39 
> 37 61 64 33 66 32 66 61 37 39 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00