Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an option to disable LDAPS Certificate verification #24

Closed
wants to merge 1 commit into from
Closed

Add an option to disable LDAPS Certificate verification #24

wants to merge 1 commit into from

Conversation

Augustin-FL
Copy link

By default, DotNet (which SharpHound uses) perform strong verification of LDAPS TLS certificates.
This is unlike bloodhound-python which does not verify SSL on its queries.

DotNet TLS verification is notoriously tricky, and sometimes fail even trough the certificate is perfectly valid (For instance, because the CRL cannot be reached or because TLS 1.3 can't be used..). This can be a problem when running bloodhound in LDAPS-only environments.

This PR add an option to disable verification of the TLS certificate when doing LDAPS queries

(Related to SpecterOps/SharpHoundCommon#30)

@rvazarkar
Copy link
Contributor

Please rebase against the most recent build

@Augustin-FL
Copy link
Author

Done

@rvazarkar
Copy link
Contributor

Not sure why, but the build is still failing. I updated the CommonLib to include the new param, but its not showing up.

@rvazarkar
Copy link
Contributor

I'm just going to go ahead and do the work myself and credit you. I'll close this MR afterwards. Thanks for the work!

@rvazarkar rvazarkar closed this Jun 23, 2022
rvazarkar added a commit that referenced this pull request Jun 23, 2022
@Augustin-FL
Copy link
Author

Hi @rvazarkar,

Thanks for the commit !
Just a question: I'm seeing you you didn't update src/Client/Flags.cs. Is it intentional ?

@Augustin-FL Augustin-FL deleted the certValidation branch June 24, 2022 12:51
@rvazarkar
Copy link
Contributor

Yep, its not needed since we're just passing it directly into the LDAPConfig, and we're not using it elsewhere

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants