You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description of problem:
nsslapd-minssf valid value range is not clear
Version-Release number of selected component (if applicable):
389-ds-base-1.4.0.19-1.module+el8+1+a8d5e036.x86_64
How reproducible:
Always
Steps to Reproduce:
In Admin Guide, It is written - "The default nsslapd-minssf attribute value is 0, which means there is no minimum SSF for server connections. The value can be set to any reasonable positive integer. The value represents the required key strength for any secure connection."
But -
[root@server /]# dsconf -D "cn=Directory Manager" ldap://server.example.com config replace nsslapd-minssf=130
Enter password for cn=Directory Manager on ldap://server.example.com:
Error: {'desc': 'Server is unwilling to perform', 'info': 'Minimum SSF not met.'}
[root@server /]# dsconf -D "cn=Directory Manager" ldap://server.example.com config replace nsslapd-minssf=0
Enter password for cn=Directory Manager on ldap://server.example.com:
Error: {'desc': 'Server is unwilling to perform', 'info': 'Minimum SSF not met.'}
Expected results:
Valid value range should be defined for the attribute.
The text was updated successfully, but these errors were encountered:
The entire concept of minssf is a complete disaster and makes no actual sense. It is meant to mean "the required number of encryption bits to allow operations to proceed".
However, there are flaws that mean ldap leaks data plaintext anyway when you use this, and the representation of bits has not been accurately reported by libraries for a long time.
As a result, the only secure option is to use LDAPS. StartTLS and GSSAPI both have other issues that can continue to confuse and cause dataleaks.
So your error here is that you do the ldap operation as plaintext, so your encryption is 0, so you don't meet the minssf requiremnt. Try LDAPS instead.
Cloned from Pagure issue: https://pagure.io/389-ds-base/issue/50049
Description of problem:
nsslapd-minssf valid value range is not clear
Version-Release number of selected component (if applicable):
389-ds-base-1.4.0.19-1.module+el8+1+a8d5e036.x86_64
How reproducible:
Always
Steps to Reproduce:
In Admin Guide, It is written - "The default nsslapd-minssf attribute value is 0, which means there is no minimum SSF for server connections. The value can be set to any reasonable positive integer. The value represents the required key strength for any secure connection."
But -
[root@server /]# dsconf -D "cn=Directory Manager" ldap://server.example.com config replace nsslapd-minssf=130
Enter password for cn=Directory Manager on ldap://server.example.com:
Error: {'desc': 'Server is unwilling to perform', 'info': 'Minimum SSF not met.'}
[root@server /]# dsconf -D "cn=Directory Manager" ldap://server.example.com config replace nsslapd-minssf=0
Enter password for cn=Directory Manager on ldap://server.example.com:
Error: {'desc': 'Server is unwilling to perform', 'info': 'Minimum SSF not met.'}
Expected results:
Valid value range should be defined for the attribute.
The text was updated successfully, but these errors were encountered: