Thanks all, for the info in this thread. I'm seeing the same issue on 10.9.1 and using an InCommon/Comodo cert.
@ Peter-Erik. (I'm not picking just trying to understand this better) If you have your web server running and run "sudo openssl s_client -connect 127.0.0.1:443" you should see the same error as for LDAPS .
verify error:num=19:self signed certificate in certificate chain
I believe that is actually the correct and expected output. See http://stackoverflow.com/questions/4103472/ssl-handshake-fails-with-a-verisign-c hain-certificate-that-contains-two-ca-s
Also from the openssl command I'm seeing "Secure Renegotiation IS supported" and "Verify return code: 0 (ok)" So I think the cert is actually there and working for LDAP?
*** The one issue I see when I run the command is that the session doesn't close properly when run against 636. I have to ^C to get it to drop the connection. For port 443 it closes fine. I'm not sure what's going on there.
Also whenever I try to set the InCommon cert for OD I get the following note in the "Configuration Log" for OD.
2014-02-05 19:08:56 +0000 slapconfig -setldapconfig
2014-02-05 19:08:56 +0000 Provided SSL Identity server.example.com is already configured for OD.
It looks like it's all working but something isn't showing up in the GUI. If we could get someone not seeing the issue to run "sudo openssl s_client -connect 127.0.0.1:636" then we might see what the differences are. Here is my output with key info redacted.
$ sudo openssl s_client -connect 127.0.0.1:636
Password:
CONNECTED(00000003)
depth=2 /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
verify error:num=19:self signed certificate in certificate chain
verify return:0
---
Certificate chain
0 s:/C=US/postalCode=12345/ST=ST/L=City/street=7th St./street= M005/O=My University/OU=DEPT/CN=server.example.com
i:/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA
1 s:/C=US/postalCode=12345/ST=IST/L=City/street=7th St./street= M005/O=My University/OU=DEPT/CN=server.example.com
i:/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA
2 s:/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA
i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
3 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
---
Server certificate
-----BEGIN CERTIFICATE-----
xxx
xxx
-----END CERTIFICATE-----
subject=/C=US/postalCode=12345/ST=ST/L=City/street=7th St./street= M005/O=My University/OU=DEPT/CN=server.example.com
issuer=/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA
---
No client certificate CA names sent
---
SSL handshake has read 5217 bytes and written 456 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1
Cipher : AES256-SHA
Session-ID: xxx
Session-ID-ctx:
Master-Key: xxxx
Key-Arg : None
Start Time: 1391629409
Timeout : 300 (sec)
Verify return code: 0 (ok)
---