> It looks like it just a client connection that is using AES GCM, it > hasn't got to process the ldap request yet. I think that the following > should work: > > openssl s_client -connect LDAPHOSTNAME:636 -cipher ECDHE-RSA-AES256- > GCM-SHA384 > > Should be able to reproduce it. Else, you can wait patiently for the > crash to happen again. > > Perhaps try unsetting the variables Noriko mentioned, test that the > openssl command does indeed cause a crash, then re-apply the > environment variables to see if that prevents it? > Hello, when I try to connect from Centos7 machine to the ldap server and there is no NSS export in the dirsrv file, it crashes. I am not using the cipher option in this case.: $ openssl version; rpm -qa openssl OpenSSL 1.0.1e-fips 11 Feb 2013 openssl-1.0.1e-51.el7_2.2.x86_64 $ openssl s_client -connect ldap:636 CONNECTED(00000003) depth=1 DC = X, CN = CA cert verify error:num=19:self signed certificate in certificate chain verify return:0 140122355623840:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:184: --- Certificate chain 0 s:/CN=ds1 i:/DC=X/CN=CA cert 1 s:/DC=X/CN=CA cert i:/DC=X/CN=CA cert --- Server certificate -----BEGIN CERTIFICATE----- ZZZ -----END CERTIFICATE----- subject=/CN=ds1 issuer=/DC=X/CN=CA cert --- Acceptable client certificate CA names /DC=X/CN=CA cert /DC=X/CN=DS2 CA cert --- SSL handshake has read 1360 bytes and written 202 bytes --- New, TLSv1/SSLv3, Cipher is AES128-GCM-SHA256 Server public key is 1024 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1.2 Cipher : AES128-GCM-SHA256 Session-ID: 464F740F8FAF113738A1AF18487D382AA5C7B9DA202FD7ADA644A75FD63BC291 Session-ID-ctx: Master-Key: ZZZ Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1453966206 Timeout : 300 (sec) Verify return code: 19 (self signed certificate in certificate chain) --- Same happens from Fedora23 and Centos6 F23: $ openssl version;rpm -qa openssl OpenSSL 1.0.2e-fips 3 Dec 2015 openssl-1.0.2e-3.fc23.x86_64 C6: $ openssl version; rpm -qa openssl OpenSSL 1.0.1e-fips 11 Feb 2013 openssl-1.0.1e-30.el6_6.5.x86_64 >From Centos5 is OK: $ openssl version;rpm -qa openssl OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008 openssl-0.9.8e-32.el5_11 with "export NSS_DISABLE_HW_GCM=1", there are no crashes, with and without the cipher option. Moreover, with the cipher option it says: CONNECTED(00000003) 139960478934944:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:744: --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 7 bytes and written 119 bytes --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE With "export NSS_DISABLE_HW_AES=1" there are no crashes. I have a secondary LDAP server, who has the following software versions: 389-admin-1.1.35-1.el6.x86_64 389-adminutil-1.1.19-1.el6.x86_64 389-ds-console-1.2.6-1.el6.noarch 389-ds-1.2.2-1.el6.noarch 389-dsgw-1.1.11-1.el6.x86_64 389-console-1.1.7-1.el6.noarch 389-admin-console-1.1.8-1.el6.noarch 389-ds-console-doc-1.2.6-1.el6.noarch 389-ds-base-1.2.11.15-48.el6_6.x86_64 389-ds-base-libs-1.2.11.15-48.el6_6.x86_64 389-admin-console-doc-1.1.8-1.el6.noarch nss-3.16.2.3-3.el6_6.x86_64 It was OK with all the stuff I was throwing on it. After the update to the following versions: 389-admin-1.1.35-1.el6.x86_64 389-adminutil-1.1.19-1.el6.x86_64 389-ds-console-1.2.6-1.el6.noarch 389-ds-1.2.2-1.el6.noarch 389-dsgw-1.1.11-1.el6.x86_64 389-ds-base-1.2.11.15-68.el6_7.x86_64 389-console-1.1.7-1.el6.noarch 389-admin-console-1.1.8-1.el6.noarch 389-ds-console-doc-1.2.6-1.el6.noarch 389-ds-base-libs-1.2.11.15-68.el6_7.x86_64 389-admin-console-doc-1.1.8-1.el6.noarch nss-3.19.1-8.el6_7.x86_64 it started crashing. Many thanks for your help -- 389 users mailing list 389-users@%(host_name)s http://lists.fedoraproject.org/admin/lists/389-users@xxxxxxxxxxxxxxxxxxxxxxx