SimpleSAML_Error_Error: UNHANDLEDEXCEPTION
Backtrace: 0 /var/simplesamlphp/www/module.php:170 (N/A) Caused by: SimpleSAML_Error_Exception: Library - LDAP __construct(): Unable to force TLS Backtrace: 6 /var/simplesamlphp/lib/SimpleSAML/Auth/LDAP.php:147 (SimpleSAML_Auth_LDAP::makeException) 5 /var/simplesamlphp/lib/SimpleSAML/Auth/LDAP.php:112 (SimpleSAML_Auth_LDAP::__construct) 4 /var/simplesamlphp/modules/ldap/lib/ConfigHelper.php:188 (sspmod_ldap_ConfigHelper::login) 3 /var/simplesamlphp/modules/ldap/lib/Auth/Source/LDAP.php:51 (sspmod_ldap_Auth_Source_LDAP::login) 2 /var/simplesamlphp/modules/core/lib/Auth/UserPassBase.php:253 (sspmod_core_Auth_UserPassBase::handleLogin) 1 /var/simplesamlphp/modules/core/www/loginuserpass.php:67 (require) 0 /var/simplesamlphp/www/module.php:127 (N/A)
I've done a few thing to verify this issue using ldapsearch utility (with the -ZZ and -d1 option). At first, ldapsearch failed to connect to ldap server with error message "can't connect to server" but after copying certificate from ldap I managed to connect to ldap but still got error "peer cert is untrusted or revoked". Next step I edit the /etc/ldap/ldap.conf and add "TLS_REQCERT allow" in there. After this step ldapsearch with -ZZ option run just find but simplesamlphp still complaining with error "Unable to force TLS". Am I missing something here ?. Is there any step that I need to do in order to tell simplesamlphp to trust the certificate ?
Thanks in advance for your help,
regards,
Sholikhin sy
Might need to create an ldaprc file for the user the web server runs as.
http://manpages.ubuntu.com/manpages/hardy/man5/ldap.conf.5.html
IIRC php doesn't pick up the system ldap.conf sometimes.
Mearl
--
You received this message because you are subscribed to the Google Groups "SimpleSAMLphp" group.
To unsubscribe from this group and stop receiving emails from it, send an email to simplesamlph...@googlegroups.com.
To post to this group, send email to simple...@googlegroups.com.
Visit this group at https://groups.google.com/group/simplesamlphp.
For more options, visit https://groups.google.com/d/optout.
Your ldap problem is with the php ldap apis. It's not specifically a simplesamlphp issue. I don't think any changes in the ssp config will help the ldap issue you are experiencing.
--
Might need to create an ldaprc file for the user the web server runs as.
http://manpages.ubuntu.com/manpages/hardy/man5/ldap.conf.5.html
IIRC php doesn't pick up the system ldap.conf sometimes.
Mearl
Have you tried port 636 on the ldap server rather than forcing TLS on 389?
What ldap server are you using?
Have you tried port 636 on the ldap server rather than forcing TLS on 389?
What ldap server are you using?
That's all I have.
Sorry, maybe someone else will have an answer.
Create a directory within /etc/openldap/certs and put in a certificate file that hold the complete certificate chain for your LDAP-store.
Edit /etc/openldap/ldap.conf and change te following:
#TLS_CACERTDIR /etc/openldap/certs <- comment this line
TLS_REQCERT allow <- Uncomment this line
TLS_CACERT
/etc/openldap/certs/ldap/ldap-chain.crt <- Uncomment this line and fill in the right path
Save the file and run the following command:
/usr/sbin/cacertdir_rehash /etc/openldap/certs/ldap
Restart Apache:
service httpd restart'AD-LDAP' => array(
'ldap:LDAP',
[...]
// The hostname of the LDAP server.
'hostname' => 'ldaps://<FQDN-LDAP-STORE>',
// The port used when accessing the LDAP server.
// The default is 389.
'port' => 636,
// Whether SSL/TLS should be used when contacting the LDAP server.
'enable_tls' => TRUE,
[...]
* sholikhin sy <sholi...@gmail.com> [2016-03-17 08:50]:
> Just realized that LDAP in initial connection still need port 389
> and not 636 (this port will be used after succesfull
> initialization).
No, that doesn't even make any sense. LDAP is connection based, there
is nothing you could do on LDAP port 389 (with or without StartTLS
there) that would change one bit of what happens if you connect to the
(non-standard) LDAPS port afterwards.
So I'd say whatever you think that change did, the above is not an
adequat description of what happens, so the fix is not what you think
it is (but something else).
* sholikhin sy <sholi...@gmail.com> [2016-03-17 05:17]:
> My LDAP server is on centos 5.11
I'm shocked to see that such ancient software is still kept alive (and
for another year). 5.0 was released 9 years ago.
-peter