[Date Prev][Date Next] [Chronological] [Thread] [Top]

Netscape and SSL OpenLDAP



Hi,

I try to query my OpenLDAP 2.0.7 with Netscape Communicator 4.72 over SSL.

First of all it works fine when I dont select secure and connect to 389 
without SSL. When I select secure I can query the OpenLDAP server exactly one 
time. The first query is answered, the next query does not show up an error 
message but says connecting to server all the time.

The strange thing is when I wait 5 Minutes or so I can send the next query. 
After that I have to wait again.

I dont know if this is a client side problem or a server sided one.
Are there other clients capable of querying over ssl?

I attached a log file and a debug outout of the failure situation.

Regards,
Timo

-- 
-----------------------------------------------------------------------
Timo Fischer                                   mailto:fischer@wytech.de
wytech GbR                                            http://wytech.de/
Peter-Bauer-Str.17                                   
67549 Worms                                     
connection_get(9)
connection_get(9): got connid=4
connection_read(9): checking for input on id=4
ber_get_next
ber_get_next on fd 9 failed errno=104 (Connection reset by peer)
connection_read(9): input error=-2 id=4, closing.
connection_closing: readying conn=4 sd=9 for close
connection_close: conn=4 sd=9
connection_get(9)
connection_get(9): got connid=5
connection_read(9): checking for input on id=5
TLS trace: SSL_accept:before/accept initialization
TLS trace: SSL_accept:SSLv3 read client hello A
TLS trace: SSL_accept:SSLv3 write server hello A
TLS trace: SSL_accept:SSLv3 write change cipher spec A
TLS trace: SSL_accept:SSLv3 write finished A
TLS trace: SSL_accept:SSLv3 flush data
TLS trace: SSL_accept:error in SSLv3 read finished A
TLS trace: SSL_accept:error in SSLv3 read finished A
connection_get(9)
connection_get(9): got connid=5
connection_read(9): checking for input on id=5
TLS trace: SSL_accept:error in SSLv3 read finished A
connection_get(9)
connection_get(9): got connid=5
connection_read(9): checking for input on id=5
TLS trace: SSL_accept:SSLv3 read finished A
Feb  9 14:19:34 dirk slapd[18398]: slapd starting
Feb  9 14:19:41 dirk slapd[18400]: daemon: conn=0 fd=9 connection from IP=195.127.98.91:11538 (IP=:: 636) accepted.
Feb  9 14:19:41 dirk slapd[18401]: conn=0 op=0 BIND dn="" method=128
Feb  9 14:19:41 dirk slapd[18401]: conn=0 op=0 RESULT tag=97 err=0 text=
Feb  9 14:19:42 dirk slapd[18401]: conn=0 op=1 SRCH base="dc=biz-worms,dc=de" scope=2 filter="(cn=*Fischer*)"
Feb  9 14:19:42 dirk slapd[18401]: conn=0 op=1 SEARCH RESULT tag=101 err=0 text=
Feb  9 14:19:42 dirk slapd[18401]: conn=0 op=2 UNBIND
Feb  9 14:19:42 dirk slapd[18401]: conn=-1 fd=9 closed
Feb  9 14:21:29 dirk slapd[18400]: daemon: conn=1 fd=9 connection from IP=195.127.98.91:11554 (IP=:: 636) accepted.
Feb  9 14:21:38 dirk slapd[18400]: deferring operation
Feb  9 14:21:38 dirk slapd[18401]: conn=1 op=0 BIND dn="" method=128
Feb  9 14:21:38 dirk slapd[18401]: conn=1 op=0 RESULT tag=97 err=0 text=
Feb  9 14:31:14 dirk slapd[18400]: conn=-1 fd=9 closed
Feb  9 14:31:14 dirk slapd[18400]: daemon: conn=2 fd=9 connection from IP=195.127.98.91:11682 (IP=:: 636) accepted.
Feb  9 14:31:15 dirk slapd[18401]: conn=2 op=0 BIND dn="" method=128
Feb  9 14:31:15 dirk slapd[18401]: conn=2 op=0 RESULT tag=97 err=0 text=
Feb  9 14:31:15 dirk slapd[18415]: conn=2 op=1 SRCH base="dc=biz-worms,dc=de" scope=2 filter="(cn=*Fischer*)"
Feb  9 14:31:15 dirk slapd[18415]: conn=2 op=1 SEARCH RESULT tag=101 err=0 text=
Feb  9 14:31:15 dirk slapd[18401]: conn=2 op=2 UNBIND
Feb  9 14:31:15 dirk slapd[18401]: conn=-1 fd=9 closed
Feb  9 14:31:20 dirk slapd[18400]: daemon: conn=3 fd=9 connection from IP=195.127.98.91:11684 (IP=:: 636) accepted.