Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LDAPS with self signed certs broken in 21.7.4 #5328

Closed
2 tasks done
rene-bayer opened this issue Oct 31, 2021 · 2 comments
Closed
2 tasks done

LDAPS with self signed certs broken in 21.7.4 #5328

rene-bayer opened this issue Oct 31, 2021 · 2 comments
Labels
support Community support

Comments

@rene-bayer
Copy link
Contributor

rene-bayer commented Oct 31, 2021

Important notices

Before you add a new report, we ask you kindly to acknowledge the following:

Describe the bug

LDAPS authentication for VPN dialin worked without any problems before updating.
after updating I had to switch back to LDAP only (without encryption) to get it back working again.

opnsense-revert would also work - but I cant install plugins then.

To Reproduce

Steps to reproduce the behavior:

  1. setup LDAP server with SSL (for example an Univention LDAP server)
  2. add CA certificate (used for the ldap server certificate) under Trust -> Certificates -> Authorities
  3. setup LDAPS accounting server
  4. test Login

Error:
image

Expected behavior

Login succeed

Describe alternatives you considered

This worked with 21.7.3 - after upgrade to 21.7.4 this is broken.
Tested with two different setups

Screenshots

NaN

Relevant log files

NaN

Additional context

NaN

Environment

Software version used and hardware type if relevant, e.g.:

OPNsense 21.7.4-amd64
OpenSSL 1.1.1l 24 Aug 2021
Intel(R) Xeon(R) E-2224 CPU @ 3.40GHz (4 cores)

@fichtner fichtner added the support Community support label Oct 31, 2021
@AdSchellevis
Copy link
Member

duplicate #5314, might also be fixed with #5323

@rene-bayer
Copy link
Contributor Author

Oh god .... missed that one, sorry :-)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
support Community support
Development

No branches or pull requests

3 participants