Bug 206436 - devel/bugzilla50: OpenLDAP Login failed: stronger confidentiality required
Summary: devel/bugzilla50: OpenLDAP Login failed: stronger confidentiality required
Status: Open
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Many People
Assignee: bz-ports
Keywords: needs-qa, regression
Depends on:
Reported: 2016-01-20 18:00 UTC by O. Hartmann
Modified: 2021-01-06 12:18 UTC (History)
7 users (show)

See Also:
bugzilla: maintainer-feedback? (bz-ports)


Note You need to log in before you can comment on or make changes to this bug.
Description O. Hartmann 2016-01-20 18:00:47 UTC
Port devel/bugzilla50 fails to authenticate users via OpenLDAP (openldap-sasl-server-2.4.43). OpenLDAP is configured using ssf=256.
Comment 1 Kubilay Kocak freebsd_committer freebsd_triage 2016-01-20 18:09:25 UTC
miwi@ reported a weird login issue today that may be related. If it is, we have a limited amount of time before existing @FreeBSD.org accounts (ldap based) login sessions begin to expire
Comment 2 Olli Hauer freebsd_committer 2016-01-21 17:22:53 UTC
Hm, that's strange.

Bugzilla itself uses perl::ldap for the connection to the LDAP server, and perl-ldap depends on IO::Socket(::SSL) and Net::SSLeay.

At the moment it is a miracle to me, but I suspect the issue is in one of the perl modules (perl-ldap, IO::Socket(::SSL), Net::SSLeay)
Comment 3 Walter Schwarzenfeld freebsd_triage 2018-01-31 23:27:34 UTC
I don't think this is still relevant. Overcame by events and could be closed?