<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CIFS/LDAPS in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138385#M8993</link>
    <description>&lt;P&gt;Guys,&lt;/P&gt;
&lt;P&gt;it was incorrect certificate. They insisted that the cert is correct and there is no other. Then they found another cert and it worked.&lt;/P&gt;
&lt;P&gt;The error "Additional info: error:14090086:lib(20):func(144):reason(134)"&amp;nbsp; means that the cert is not trusted. You can also see in the log above that the Netapp connects successfuly to DC on port 389. The initial connection is in plain text and after that it tries to upgrade to encrypted connection using the cert. And it fails if the cert is wrong.&lt;/P&gt;
&lt;P&gt;That's it.&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Feb 2018 08:46:53 GMT</pubDate>
    <dc:creator>maskajan09</dc:creator>
    <dc:date>2018-02-23T08:46:53Z</dc:date>
    <item>
      <title>CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138116#M8977</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;I have a A200 with ONTAP 9.3 and I need to add it to AD which uses LDAPS. I have enabled the&amp;nbsp;Use start_tls for AD LDAP connection: true and we also imported the certificate. But the CIFS setup process fails&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Error: Machine account creation procedure failed

  [  7810] Loaded the preliminary configuration.
  [  7865] Successfully connected to ip 149.x.x.x, port 88
           using TCP
  [  8056] Successfully connected to ip 149.x.x.x, port 389
           using TCP
  [  8134] Unable to start TLS: Connect error
  [  8134] Additional info: error:14090086:lib(20):func(144):reason(1
           34)
  [  8134] Unable to connect to LDAP (Active Directory) service on
           dc01.ad.neco.com
**[  8134] FAILURE: Unable to make a connection (LDAP (Active
**         Directory):AD.NECO.COM), result: 7652

Error: command failed: Failed to create the Active Directory machine account "FILE99". Reason: LDAP Error: Cannot establish a connection to the server.
&lt;/PRE&gt;
&lt;P&gt;What could be wrong? The time is in sync.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 14:01:57 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138116#M8977</guid>
      <dc:creator>maskajan09</dc:creator>
      <dc:date>2025-06-04T14:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138218#M8978</link>
      <description>&lt;P&gt;Hi Jan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you found a Solution for this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TIA&lt;/P&gt;
&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 12:13:38 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138218#M8978</guid>
      <dc:creator>brauntisc</dc:creator>
      <dc:date>2018-02-19T12:13:38Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138219#M8979</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check the CIFS security option "&lt;EM&gt;&lt;STRONG&gt;Use start_tls for AD LDAP connection&lt;/STRONG&gt;&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;"cifs security show -vserver &amp;lt;svm&amp;gt;"&amp;nbsp;&lt;/EM&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that is enabled, try disabling it and re-running cifs setup. Alternately check the certificate is valid.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Matt&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 12:54:26 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138219#M8979</guid>
      <dc:creator>mbeattie</dc:creator>
      <dc:date>2018-02-19T12:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138221#M8980</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use start_tls for AD LDAP connection was enabled and the certificate&amp;nbsp;is imported. Before the upgrade from 8.3xxx to 9.1P9 it worked without Problems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our Workaround was to enable LDAP signing/sealing (Client Session Security = seal) and disable the options "start_tls for AD LDAP connection".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the access works, but our DC admins see sometimes following error in the event log:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Event Description: The following client performed a SASL (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing (integrity verification), or performed a simple bind over a clear text (non-SSL/TLS-encrypted) LDAP connection. &lt;BR /&gt; &lt;/P&gt;
&lt;P&gt;So my thoughts was to enable "start_tls for AD LDAP connection" simultaneously to elimate the DC errors, but when I enable this I can't connect to DC anymore.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cifs security modify -vserver svm1 -use-start-tls-for-ad-ldap true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;diag secd authentication get-dc-info -node&amp;nbsp;node1 -vserver svm1&lt;/P&gt;
&lt;P&gt;Error: command failed: RPC call to SecD failed. RPC: "SecD Error: no server available".&amp;nbsp; Reason: "".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 13:38:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138221#M8980</guid>
      <dc:creator>brauntisc</dc:creator>
      <dc:date>2018-02-19T13:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138228#M8981</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We&amp;nbsp;have found our Problem:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the DC we seen following Error:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.netapp.com/t5/image/serverpage/image-id/8118iE81AA801EA73B07F/image-size/original?v=1.0&amp;amp;px=-1" border="0" alt="Unbenannt.png" title="Unbenannt.png" width="353" height="312" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the DCs more than one certificate is&amp;nbsp;installed.&amp;nbsp;I installed the second&amp;nbsp;certificate on the svm (security certificate install -type server-ca -vserver svm1).&lt;/P&gt;
&lt;P&gt;After that i&amp;nbsp;have reenabled the Option "use-start-tls-for-ad-ldap" and voila it worked again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 16:43:00 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138228#M8981</guid>
      <dc:creator>brauntisc</dc:creator>
      <dc:date>2018-02-19T16:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138233#M8982</link>
      <description>&lt;P&gt;Hi Thomas,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That makes sense, I looked into some internal KB articles which suggested a mismatched Server CA certificate between what the LDAP servers are using and the one that is installed for the SVM/CIFS server. If TLS is required then check the SVM certificate is correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Matt&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 22:55:16 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138233#M8982</guid>
      <dc:creator>mbeattie</dc:creator>
      <dc:date>2018-02-19T22:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138339#M8990</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;how to check that the certificate is correct? We have deleted and installed the cert again. It didn't help.&lt;/P&gt;
&lt;P&gt;If you seatch for error message&lt;/P&gt;
&lt;P&gt;Additional info: error:14090086:lib(20):func(144):reason(134)&lt;/P&gt;
&lt;P&gt;it is about the cert trust. How to trouble shoot it on both sides - netapp and AD?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 10:42:56 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138339#M8990</guid>
      <dc:creator>maskajan09</dc:creator>
      <dc:date>2018-02-22T10:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138354#M8991</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have following Situation:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.netapp.com/t5/image/serverpage/image-id/8126i4B95C5681E2DE5EC/image-size/original?v=1.0&amp;amp;px=-1" border="0" alt="certi.png" title="certi.png" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the personal certification store on the DC server&amp;nbsp;we have certificates issued&amp;nbsp;by the &lt;STRONG&gt;company CA&lt;/STRONG&gt;, which we have installed also in the svm (security certificate install). With this combination we encountered "Additional info: error:14090086:lib(20):func(144):reason(134)" Errors. S&lt;SPAN&gt;ubsequently we installed also the certificate issued&amp;nbsp;by &lt;STRONG&gt;Domain CA&amp;nbsp;&lt;/STRONG&gt;in the svm. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;security certificate show -vserver svm1&lt;BR /&gt;Vserver&amp;nbsp;&amp;nbsp;&amp;nbsp; Serial Number&amp;nbsp;&amp;nbsp; Common Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&lt;BR /&gt;---------- --------------- -------------------------------------- ------------&lt;BR /&gt;svm1&amp;nbsp;06FFCFFAC88CB9B34454E628858B0FC2&amp;nbsp;&lt;STRONG&gt;company CA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt; server-ca&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Certificate Authority:&amp;nbsp;&lt;STRONG&gt;company CA&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Expiration Date:&lt;/P&gt;
&lt;P&gt;svm1&amp;nbsp;5F4CC1BFA244B7BF4301062863ABF4A2 &lt;STRONG&gt;domain CA&lt;/STRONG&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server-ca&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Certificate Authority:&amp;nbsp;&lt;STRONG&gt;domain CA&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Expiration Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;After that LDAP over TLS works without problems. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I hope this helps&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thomas&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 15:18:10 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138354#M8991</guid>
      <dc:creator>brauntisc</dc:creator>
      <dc:date>2018-02-22T15:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS/LDAPS</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138385#M8993</link>
      <description>&lt;P&gt;Guys,&lt;/P&gt;
&lt;P&gt;it was incorrect certificate. They insisted that the cert is correct and there is no other. Then they found another cert and it worked.&lt;/P&gt;
&lt;P&gt;The error "Additional info: error:14090086:lib(20):func(144):reason(134)"&amp;nbsp; means that the cert is not trusted. You can also see in the log above that the Netapp connects successfuly to DC on port 389. The initial connection is in plain text and after that it tries to upgrade to encrypted connection using the cert. And it fails if the cert is wrong.&lt;/P&gt;
&lt;P&gt;That's it.&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 08:46:53 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-LDAPS/m-p/138385#M8993</guid>
      <dc:creator>maskajan09</dc:creator>
      <dc:date>2018-02-23T08:46:53Z</dc:date>
    </item>
  </channel>
</rss>

