Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an option to disable LDAPS Certificate verification #30

Merged
merged 1 commit into from
Jun 23, 2022

Conversation

Augustin-FL
Copy link
Contributor

By default, DotNet (which SharpHound uses) perform strong verification of LDAPS TLS certificates.
This is unlike bloodhound-python which does not verify SSL on its queries.

DotNet TLS verification is notoriously tricky, and sometimes fail even trough the certificate is perfectly valid (For instance, because the CRL cannot be reached or because TLS 1.3 can't be used..). This can be a problem when running bloodhound in LDAPS-only environments.

This PR add an option to disable verification of the TLS certificate when doing LDAPS queries

(Related to SpecterOps/SharpHound#24)

@rvazarkar
Copy link
Contributor

Thanks for the PR, I'll merge this in once checks pass!

@rvazarkar rvazarkar merged commit 74e22d5 into SpecterOps:master Jun 23, 2022
@ddlees
Copy link
Contributor

ddlees commented Sep 2, 2022

recheck

@github-actions
Copy link

github-actions bot commented Sep 2, 2022

CLA Assistant Lite bot All contributors have signed the CLA ✍️ ✅

@ddlees
Copy link
Contributor

ddlees commented Sep 2, 2022

@Augustin-FL In an attempt to accept contributions the "right" way and be the best stewards we can be to the FOSS community we have recently published a Contributor License Agreement. Would you please consider reading and signing the CLA linked in the comment above? Thank you!

@Augustin-FL
Copy link
Contributor Author

I have read the CLA Document and I hereby sign the CLA

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants