-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LDAPS auth against AD #30
Comments
Original comment by |
Original comment by |
I'm experiencing the same issue. It looks like it can't create a connection with ldaps is specified. I get a |
Same issue here. |
While I wasn't able to make the ldap query use ldaps, the issue of transferring unencrypted ldap data over the network can be resolved with a little workaround: Using autossh and upstart I created a ssh tunnel to the ldap port of the ldap server that is created automatically on startup of the server providing openvpn. While the setup is a bit more complicated than replacing "ldap" with "ldaps", it works quite well. |
Shouldn't |
'TLSEnable yes' is supposed to enable STARTTLS, so you connect first on port 389 and start TLS second. Using the Debian 2.0.3 distro package this works fine. Using the Amazon Linux 2.0.3 distro package this setting seems to get entirely ignored, it connects on port 389 and just never tries to STARTTLS. There is no error or other message in the openvpn logs from the plug-in. Binding fails because TLS hasn't been started. The 'TLSEnable yes' setting is in the example config so you would think it was also in the code? Removing the TLSEnable and using and 'ldaps://' instead works fine as a workaround, but STARTTLS would be better if it worked. |
Was anybody able to make it work? My setup:
I have my own CA that issued certificate for AD server (keysize 4096, sha512) I tried: I temporarily switched SELinux to permissive mode. I got: I can see in WireShark, that OpenVPN server sends fatal TLS error Unknown CA. It seems that TLSCACertFile file option is ignored. When I use openssl s_client with -CAfile options, it properly verifies AD server's certificate and connects to it. |
My workaround on #65 may help |
DId anyone get this working with ldaps? I would appreciate even a hint on why it doesn't work as the openvpn guys say they support ldaps. I exported a CA file fro the AD Server to the OpenVPN Server and I could connect using openssl s_client just fine. LDAP bind failed immediately: Can't contact LDAP server |
@softwareinfojam I am not sure if you have the same problem as myself but I end up fixing it with this: #65 (comment) |
I was able to work around this by adding the CA cert to the system truststore (which I believe shows that the issue is that the TLSCACertFile setting is effectively ignored). More details here: #65 (comment) |
Original issue reported on code.google.com by
ugo...@gmail.com
on 16 May 2012 at 10:26The text was updated successfully, but these errors were encountered: