Guest

Preview Tool

Cisco Bug: CSCun57897 - Application faults when LDAPS connections are reset by peer

Last Modified

Mar 06, 2018

Products (1)

  • Cisco Email Security Appliance

Known Affected Releases

8.0.0-671 8.0.1-023 8.5.6-074 8.5.6-092

Description (partial)

Symptom:
You may receive critical application fault alerts from the appliance similar to the following:

An application fault occurred: ('egg/coro_ssl.py _non_blocking_retry|140', "<class 'sslip.Error'>", "(67686504, 'error:0408D068:rsa routines:FIPS_RSA_VERIFY:bad signature')", '[egg/ldap_client.py sg_thread_bootstrap|1132] [egg/ldap_client.py sg_thread_worker|1237] [egg/ldap_cmd.py run|136] [egg/ldap_cmd.py shutdown_connection|132] [egg/coro_ssl.py close|238] [egg/coro_ssl.py shutdown|218] [egg/coro_ssl.py _non_blocking_retry|140]')

Conditions:
These application faults are only known to occur when using LDAPS (LDAP over SSL).

The application fault occurs when the connection is reset by peer while our SSL library is still attempting to use the connection.

The incidence of these application faults has been shown to be very low.  In the field, we are seeing application faults occurring in less than 1% of all connection reset by peer events for LDAPS.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.