[SAC] [OSGeo] #2295: Replace ldaps STAR cert with letsencrypt or single cert

OSGeo trac_osgeo at osgeo.org
Sat Apr 27 23:44:26 PDT 2019


#2295: Replace ldaps STAR cert with letsencrypt or single cert
---------------------------+---------------------------------------
 Reporter:  robe           |       Owner:  sac@…
     Type:  task           |      Status:  new
 Priority:  blocker        |   Milestone:  Sysadmin Contract 2019-I
Component:  Systems Admin  |  Resolution:
 Keywords:                 |
---------------------------+---------------------------------------

Comment (by robe):

 I tried tricking the system by sym-linking the letsencrypt cert files to
 the old names.
 That did not work on the old-secure container so I didn't bother with the
 actual secure.

 Sooo I've moved on to plan D - which was the eventual direction of
 scraping the old ldap and replacing with a new LDAP.

 I have a container on osgeo7 called new-secure - which has 636 open to
 OSUOSL domain and LXD subdomain.  I'm going to transcribe the rest of the
 whitelists to it once I've troubleshooted some things and tested on some
 other things.

 The new ldap is running Debian 9 and using letsencrypt wildcard cert.
 Took a lot of fumbling to figure out how to get this working.  I also
 restored the old ldap users database, but not the config.  config I
 rebuilt from scratch.

 I tested accessing it from web18a.osuosl.org VM (which is fairly new), the
 nextcloud container (swapping out old ldap with new ldap) and both worked:

 Here is a test

 {{{
 ldapsearch -x "uid=robe" -b "dc=osgeo,dc=org"  -H ldaps://ldap2.osgeo.org
 }}}


 Which shows my details.

 However this did not work on current secure or osgeo6 (I assume it will be
 an issue with all our old servers) -- I think just missing an intermediary
 cert for le, because when I run:


 {{{
 ldapsearch -d1 -x "uid=robe" -b "dc=osgeo,dc=org"  -H
 ldaps://ldap2.osgeo.org #d1 for debug details
 }}}

 on secure gives this:


 {{{
 TLS: peer cert untrusted or revoked (0x42)
 TLS: can't connect: (unknown error code).
 ldap_err2string
 ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
 }}}



 If I swap out the letsencrypt on ldap2 with the old ssl, secure can query
 it. So it's definitely the cert and not any firewall issue.

 I was disappointed this did not work out of the box on osgeo6 and gave the
 same notice


 {{{
 ldap_connect_to_host: Trying 140.211.15.57:636
 ldap_pvt_connect: fd: 4 tm: -1 async: 0
 attempting to connect:
 connect success
 TLS: peer cert untrusted or revoked (0x42)
 TLS: can't connect: (unknown error code).
 ldap_err2string
 ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
 }}}

 But it could be we've been copying the cert authorities across all the
 servers and they are just missing the newer ones.

 Anyway hoping it's simple as just copying newer certs as this describes:

 https://serverfault.com/questions/579131/some-systems-cannot-connect-to-
 ldap-via-ldaps-but-others-can-is-it-the-wildcar/579148

-- 
Ticket URL: <https://trac.osgeo.org/osgeo/ticket/2295#comment:3>
OSGeo <https://osgeo.org/>
OSGeo committee and general foundation issue tracker.


More information about the Sac mailing list