-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v1.3.0 worked, but v1.3.2 gives error "automatic start_tls befored bind not successful" #186
Comments
|
This is not enough grounds to assume it is an issue of the JupyterHub Helm chart, so it may be caused by the the https://github.com/jupyterhub/ldapauthenticator which is installed in the hub pod, which has updated from version 1.3.0 to 1.3.2. It could also be that the ldapauthenticator doesn't support the feature used in conjunction with a more modern JupyterHub version or similar. |
Thank you for opening your first issue in this project! Engagement like this is essential for open source projects! 🤗 |
The following patch may fix the issue.
|
Thanks so much for your reply , may I know how to change the JupyterHub file "config.yaml" since I using the configuration like this : cat config.yaml proxy:
secretToken: "redacted-secret-string"
auth:
type: ldap
ldap:
server:
address: ldaps://xxxx.com
port: 636
dn:
lookup: False
search:
filter: 'cn=uid'
user: 'username'
password: 'userpassword'
templates:
- 'uid={username},dc=opulan,dc=com'
user:
searchBase: 'ou=users,dc=opulan,dc=com'
escape: False
attribute: 'sAMAccountName'
dnAttribute: 'cn'
allowedGroups:
- 'cn=test-group,ou=groups,dc=opulan,dc=com' |
@evenye Can you try setting @1kastner would you mind taking a look at this? However I'm now wondering if that would break LDAP servers that don't support TLS?
Should this instead always be |
Well, in the config it says As far as I have understood the discussion at cannatag/ldap3#855 (comment) including some screening of the code of ldap3 and ldapauthenticator, the ldapauthenticator has never supported the full spectrum of ldap servers as we only use a subset of the configuration in ldaptauthenticaotr that is available in ldap3. One such decision was that there always MUST be SOME kind of encryption between the client and the server because we use ldap for exchanging usernames and passwords. Here, I am not sure whether this authenticator should support unsave behavior. Usually the encryption should be either START_TLS or TLS. The author of ldap3 explained why his suggestion for the ldapauthenticator is reasonable. If somebody wants a more custom setup, they can setup their own authenticator, e.g. by using the default authenaticator and using something like https://wiki.debian.org/LDAP/PAM in the background. My idea of ldapauthenticator is that here only setups using encryption are supported and by that we guide the admins to apply best practices. As my contribution to this repo is very small, of course the main contributors should feel free to take any path of their liking. For my part, currently I focus more on OAuth2 instead of ldap so that I can accept any changes in the library. PS: I am sure that the two constants are set correctly according to the discussion at cannatag/ldap3#855 |
This issue has been mentioned on Jupyter Community Forum. There might be relevant details there: https://discourse.jupyter.org/t/ldap-not-working-ldapstarttlserror/11047/2 |
Closing in favor of #259 |
new version 10.6 ldap can't work with error "automatic start_tls befored bind not successful"
but working well for 0.9.1 version
The text was updated successfully, but these errors were encountered: