-
Notifications
You must be signed in to change notification settings - Fork 11k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LDAPS UNABLE_TO_VERIFY_LEAF_SIGNATURE #1395
Comments
I think there is a way in most operating systems to add CA's to be trusted. What OS? We need to handle these errors regardless. |
Not sure but it looks like nodejs dosn't use OS trust store (already tried). Linux (CentOS 7). Perhaps functionality to add own certificate for ldapjs? Or a global trust store for Rocket.Chat (didn't quite get if this would also work with ldapjs as examples are for node https server). |
@litewhatever so looks like we might need to add the ability to add a trusted certificate then. Probably a good idea anyways |
Mostly posting so I can find this thread again easier. Meteor does appear to handle CA's separately from the OS, I did have a look into this a while back when looking to get my rocket chat instance running on a self signed cert properly without having to enable the flag to allow all self signed/invalid certs. I did get it but was far too messy for anything to share. |
@emcguinness alright good to know. So we might want to add this ability. If you come across that info feel free to post back. Its always helpful to have info associated with the resolution of the issue in it. |
Well i just went to find the bit of code I modified but seems one of the virtual disks for my VM has corrupted so can't get to it right now (not that it was much in the end). Still have some of the resource pages I found. First for background it appears that old version of NPM that was the issue, see here The best page I found was here - Starts off with how to generate the certs which helps knowing which bit is which when they get onto the implementation further down(evne included client certs. Really it just comes down to passing some options when making your ssl request. I was looking into the image previews for self signed certs so I added in the certifcate options here if I remember right. |
Hello
Tried to configure LDAP connection over SSL/TLS with following configuration parameters:
From err-0.log:
I'm not an expert but I think the probem is that nodejs (?) isn't trusting ldaps server certificate as it is issued by untrusted CA (self-signed, in-house PKI etc).
http://stackoverflow.com/questions/25171613/ldap-bind-error-using-node-js-and-ldapjs
A quick and ugly workaround - an option to allow setting NODE_TLS_REJECT_UNAUTHORIZED to false? I personally think it's a bad idea.
A better solution would be to setup some kind of CA store as it's in java (looks like nodejs isn't implementing currently anything like this - it only has some built in trusted CA -s which are in nodejs source code).
Or perhaps it's possible to configure nodejs/application to trust operating system trust store?
And finally one more stackoverflow link :)
http://stackoverflow.com/questions/15254976/how-do-i-use-the-node-js-request-module-to-make-an-ssl-call-with-my-own-certific
Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.
The text was updated successfully, but these errors were encountered: