Closed
Bug 698787
Opened 13 years ago
Closed 13 years ago
Cannot connecto to LDAP Server in Thunderbird 10.0 - TB 8.0 and 9.0 are working fine.
Categories
(MailNews Core :: LDAP Integration, defect)
Tracking
(Not tracked)
RESOLVED
DUPLICATE
of bug 723551
People
(Reporter: wisspur, Unassigned)
References
Details
(Keywords: regression, Whiteboard: [regression:v10])
User Agent: Mozilla/5.0 (Windows NT 5.1; rv:8.0) Gecko/20100101 Firefox/8.0
Build ID: 20111026191032
Steps to reproduce:
LDAP failed to connect as I upgraded to version 10.0
Comment 1•13 years ago
|
||
Wisspur can you find the regression date using http://www.rumblingedge.com/2009/02/24/howto-find-regression-windows-through-manual-binary-search/ ?
What exact message do you get when it fails ?
Can you log what's happening as described at https://wiki.mozilla.org/MailNews:Logging and attach the log on the bug ?
Component: General → LDAP Integration
Keywords: regression,
regressionwindow-wanted
Product: Thunderbird → MailNews Core
QA Contact: general → ldap-integration
Have been using the same Directory Server Properties for all Thunderbird versions. It only works in version 8, and failed in both version 9 and 10. It used to work in version 9, until the recent update (11/8/2011).
When running the offline replication, the message indicates that the replication process is failed. Same thing when you conmpose a new message, and it can't connect to the LDAP Server and retrieve the address.
Comment 3•13 years ago
|
||
wisspur,
do you still see this issue if you use newer build - trunk, aurora or beta?
if you do, can you find regression using nightly/daily builds?
Severity: normal → major
Whiteboard: [regression:v10]
This issue remains, no matter what version (trunk, aurora or beta) I used. The latest version I've tried was 13.00a1 from http://ftp.mozilla.org/pub/mozilla.org/thunderbird/nightly/latest-comm-central/
The best Thunderbird version that was working well for me with Kerio Connect 7.3.2 is 9.0.1
:-(
Comment 5•13 years ago
|
||
Rough regression window by posted comments.
Good : Tb 8, Tb 9.0.1, Tb 9 before update on 2011/11/08
Bad : Tb 9 after update on 2011/11/08, Tb 10, Tb 13.00a1
May be similar issue to Bug 723109 if SSL is used(problem of Bug 702111 in SSL after fix of bug 665814.)
Can you get LDAP log? (see bug 402793 comment #28 for getting protocol log)
Is your LDAP server accessed via SSL?
If SSL is used, try setting NSS_SSL_CBC_RANDOM_IV=0 in your environment variable(see bug 723109 comment #22.)
LDAP log (TB version 13.00a1)
-----------------------------------------------------------------------------
2012-03-10 05:06:50.515000 UTC - 0[200f140]: nsLDAPOperation::SimpleBind(): called; bindName = 'user@domain.com';
2012-03-10 05:06:50.578000 UTC - 0[200f140]: pending operation added; total pending operations now = 1
2012-03-10 05:06:58.531000 UTC - 0[200f140]: nsLDAPConnection::RemovePendingOperation(): operation removed
2012-03-10 05:06:58.531000 UTC - 0[200f140]: nsLDAPConnection::RemovePendingOperation(): operation removed; total pending operations now = 0
2012-03-10 05:06:58.531000 UTC - 0[200f140]: unbinding
2012-03-10 05:06:58.531000 UTC - 0[200f140]: unbound
------------------------------------------------------------------
Yes, the LDAP server is accessed via SSL.
TB 13.00a1 will work with setting NSS_SSL_CBC_RANDOM_IV=0, but I think that will defeat the security purpose.
Comment 7•13 years ago
|
||
(In reply to wisspur from comment #6)
> Yes, the LDAP server is accessed via SSL.
> TB 13.00a1 will work with setting NSS_SSL_CBC_RANDOM_IV=0,
> but I think that will defeat the security purpose.
(i) NSS_SSL_CBC_RANDOM_IV=0 is to bypass bug of your LDAP server when change by bug 665814 for CVE-2011-3389 is applied to Tb.
(ii) If Tb is started from BAT, NSS_SSL_CBC_RANDOM_IV=0 is used only for Tb and other applications are not affected.
TB.BAT
SET NSS_SSL_CBC_RANDOM_IV=0
" ...\thunderbird.exe" -P "prof_name" ...
(iii) If NSS_SSL_CBC_RANDOM_IV=0 is used for Tb, securiy risk of CVE-2011-3389 is not removed for other Tb's servers accesses via SSL.
(iv) securiyu risk of CVE-2011-3389 currently exist actually in many applications including Tb and many servers.
(a) "securiyu risk of CVE-2011-3389 in other server access by Tb"
(b) "failed LDAP server access due to solution of CVE-2011-3389 by bug 665814"
If (a), which currently does exist, is far important than (b) for you, don't use the "bypass of your LDAP server's bug by NSS_SSL_CBC_RANDOM_IV=0".
If (a), which currently does exist, is acceptable until bug of your LDAP server will be fixed, and if (b) is very important problem for you, use the "bypass of your LDAP server's bug by NSS_SSL_CBC_RANDOM_IV=0" until bug of your LDAP server will be fixed.
To use bypass of NSS_SSL_CBC_RANDOM_IV=0 for LDAP access, or not to use bypass of NSS_SSL_CBC_RANDOM_IV=0 for secutity risk, is up to you.
Depends on: 723109
Thank you for the info.
I've decided to stay with TB 9.0.1 since it's working extremely well for me. I'll wait for Kerio to fix the LDAP bug to accomodate the changes Mozilla (CVE-2011-3389) made to TB 10.00 and 13.00a1, then I'll switch. The only wish I've for TB is the capability to automatically resize, to fit, the in-line bitmaps in preview windows (it does resize the the attached bitmaps, however, but not in-line).
A question I forgot to ask. Has Mozilla informed Kerio about this LDAP bug?
Comment 10•13 years ago
|
||
(In reply to wisspur from comment #9)
> A question I forgot to ask. Has Mozilla informed Kerio about this LDAP bug?
We have notified them about the SLL issue (it also affects imap and smtp). But getting it from their customers helps too.
Updated•13 years ago
|
Status: UNCONFIRMED → RESOLVED
Closed: 13 years ago
Resolution: --- → DUPLICATE
Updated•9 years ago
|
Keywords: regressionwindow-wanted
You need to log in
before you can comment on or make changes to this bug.
Description
•