Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Ziir
Nov 20, 2004

by Ozmaugh

Bob Morales posted:

irssi + screen

ssh into your server, start a screen session. Run irssi, chat you heart out. Then when you're done, just disconnect the session, it will stay running in a virtual terminal. Then just ssh back into your server and re-attach to your screen session from home/work/starbucks.

http://lizzie.spod.cx/screenirssi.shtml

That's just what I'm looking for. Thanks!

Adbot
ADBOT LOVES YOU

Hughmoris
Apr 21, 2007
Let's go to the abyss!

brc64 posted:

God drat, scripting is like some kind of drug.

I now have my script emailing me the name and filesize of completed DVD rips. Currently in the process of converting super long and messy manually typed paths to clean and pretty variables.

Still wish I had a nicer solution for the title/chapter selection problem, but oh well.

By the time I get this script to completely awesome status I will be out of DVDs to rip.

Could you break it into simple-man terms on how you got the script to automatically email you? I wanted to write a small script that would snag the names of newly released DVDs from a website, and email me the names. I could never figure out how to handle the email.

Of course, I have almost zero practical experience in linux.

other people
Jun 27, 2004
Associate Christ
Ugh. Can some one tell me what all this poo poo in my error.log is? There is 5MB of this kind of stuff!

http://pastebin.com/gwtxbsH8

Lots of people coming from that shaolinpirates.com domain, and that last google search referer is the servers IP (I changed it).


What is more scary, is the poo poo in access.log. I don't even know where to begin :/.

http://pastebin.com/1gr04d5K

I am holding out a small hope that this is all some how "normal", but I can't imagine it is!

Is it time to :pt: and remove php forever?

brc64
Mar 21, 2008

I wear my sunglasses at night.

Hughmoris posted:

Could you break it into simple-man terms on how you got the script to automatically email you? I wanted to write a small script that would snag the names of newly released DVDs from a website, and email me the names. I could never figure out how to handle the email.

Of course, I have almost zero practical experience in linux.
I honestly don't know that I can, but I'll point you in some of the directions I went:

The first recommendation was ssmtp because it's pretty simple. Of course, you still need to know your server information, and if you use Gmail (which I use), there are some other required settings. "ssmtp gmail" brings up some helpful guides.

That said, I couldn't get ssmtp to work for me. From my searching, it looks like it chokes on sending special characters in passwords, so it would never actually authenticate. That led me to sendEmail (notice the E, completely different from sendmail). Once installed, that wouldn't work at first, complaining about some perl libraries needed for SSL. I figured out how to install those (libnet-ssleay-perl and libio-socket-ssl with apt-get install), then finally used a guide to send a test email.

The main downside to this, which can probably be worked around somehow, is that my password is stored in plaintext in my script. Normally that would be a big deal, but since this is not a public facing server and I'm the only one with access, the convenience outweighs the concern.

SynVisions
Jun 29, 2003

Kaluza-Klein posted:

Ugh. Can some one tell me what all this poo poo in my error.log is? There is 5MB of this kind of stuff!

http://pastebin.com/gwtxbsH8

Lots of people coming from that shaolinpirates.com domain, and that last google search referer is the servers IP (I changed it).


What is more scary, is the poo poo in access.log. I don't even know where to begin :/.

http://pastebin.com/1gr04d5K

I am holding out a small hope that this is all some how "normal", but I can't imagine it is!

Is it time to :pt: and remove php forever?

I didn't read through it all thoroughly, but at a glance that's mostly normal. I get the same type of traffic to my web servers.

It's just people doing drive by exploit testing.

Be drat sure that you don't have any webapps with known exploits exposed to the internet, because they will end up biting you in the end.

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

Kaluza-Klein posted:

Ugh. Can some one tell me what all this poo poo in my error.log is? There is 5MB of this kind of stuff!

http://pastebin.com/gwtxbsH8

That's all part of being on the internet. You can have your firewall not allow traffic from places like South America, China, and Russia and that will cut it down by quite a bit.

angrytech
Jun 26, 2009
I've been running Zimbra for email/calendar/etc for the past few weeks and it's been a total dream. Why have I never heard about it before? Does it just suck in the enterprise?

spankmeister
Jun 15, 2008






BnT posted:

This is probably a little more security than you're looking for. After running VPS systems for a number of years, I've decided that the only way to prevent the endless onslaught of brute-force SSH attempts while allowing me to travel and SSH in from random IP addresses is to disable password authentication in SSH, and ratelimit new SSH connections with iptables.

Yeah I use pub/privkey auth as well. I configured SSH to only accept that type of authentication, I also disallowed root logins.

For the bots ( it's quite amazing how bots seem to find your machine and start ssh attacks) I use fail2ban with -1 ban time (= unlimited, unfortunately the ban list doesn't survive reboots but the bots change ip adresses anyway)

Ziir
Nov 20, 2004

by Ozmaugh
Speaking of pub/privkey auth, should I be using rsa or dsa, and how many bits should I specify?

e: Also, if I'm SSH'd into a system and want to open a new tab, is there a way to do this without having to login again? That's what I'm doing right now so sometimes I'll have 5+ SSH connections to a single system, but I'm sure there must be a bette way to do this?

Ziir fucked around with this message at 23:03 on Jun 30, 2011

spankmeister
Jun 15, 2008






Ziir posted:

Speaking of pub/privkey auth, should I be using rsa or dsa, and how many bits should I specify?
Doesn't really matter, DSA is supposed to be more secure but it takes longer to verify.

1024 bits should be fine for both RSA and DSA. 2K or 4K keys are fine too but only if you're really paranoid.

Remember that the key is only used for authentication, after that a block cipher is used like AES, Blowfish or 3DES (usually AES).

ToxicFrog
Apr 26, 2008


Ziir posted:

I want to set up a permanently on/connected IRC client on my server and then somehow access it from other PCs by SSHing into it (irc client could exist purely in the terminal or be x11 based, doesn't matter) and starting the client. The idea is I want a single persistent connection so that I could move from PC to PC to my iPhone's SSH app and everything is still logged nice and neat in one place and nobody knows the difference).

Is this possible and how?

Not only is it possible, I've been doing it for years.

For tty IRC clients such as weechat or irssi, screen is the program you want.

For X11 clients, NoMachine NX is basically screen for X11 and is free for personal use (and free-as-in-GPL unofficial builds exist, too). Note that this will preclude the use of an iPhone to connect to it, since as far as I know there is no NX client (or X server software of any kind) for the iPhone.

For anything, you could run it normally and then tunnel VNC (a remote desktop protocol) over SSH. This will give you worse performance than either ssh+screen or NX, though.

There's also Quassel, which is an IRC client that's divided into client and server halves and would probably work for this; however, it's relatively new and I don't know how well it works.

dont skimp on the shrimp
Apr 23, 2008

:coffee:

ToxicFrog posted:

There's also Quassel, which is an IRC client that's divided into client and server halves and would probably work for this; however, it's relatively new and I don't know how well it works.
I've tried this one, it's pretty simple to set up and use, and works rather well surprisingly. So yeah, if you want a GUI, this is a pretty good option.

doesn't beat screen and irssi though

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

IRC dudes: You can use screen+irssi and if you set it up as a proxy, you can connect to your saved session with mIRC or whatever the gently caress you want.


Ziir posted:

Speaking of pub/privkey auth, should I be using rsa or dsa, and how many bits should I specify?

e: Also, if I'm SSH'd into a system and want to open a new tab, is there a way to do this without having to login again? That's what I'm doing right now so sometimes I'll have 5+ SSH connections to a single system, but I'm sure there must be a bette way to do this?

A new 'tab'? You mean another console window? You could just make another screen session (assuming you're using screen).

dont skimp on the shrimp
Apr 23, 2008

:coffee:

Bob Morales posted:

A new 'tab'? You mean another console window? You could just make another screen session (assuming you're using screen).
You don't even need to make a new screen session, you could just make another window with ctrl+a and ctrl+c, then you can switch between them with ctrl+a and ctrl+a. :)

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

Zom Aur posted:

You don't even need to make a new screen session, you could just make another window with ctrl+a and ctrl+c, then you can switch between them with ctrl+a and ctrl+a. :)

That's what I'm talking about. Session, window, whatever.

ExcessBLarg!
Sep 1, 2001

Ziir posted:

That's what I'm doing right now so sometimes I'll have 5+ SSH connections to a single system, but I'm sure there must be a bette way to do this?
Screen has already been mentioned, but that's not what you want if you want to be able to run multiple ssh sessions in different terminals (windows) or something.

An alternative is OpenSSH's control socket feature. For you first ssh session, run:
code:
ssh -MS /tmp/bar.sock foo@bar.org
which starts a regular shell session, where you have to authenticate as usual. But it also creates a /tmp/bar.sock socket. Now, when you want to open subsequent shells:
code:
ssh -S /tmp/bar.sock whatever
which opens another shell session to foo@bar.org. Note you don't have to put the user and hostname in again, but you'll have to put something (anything) in as a hostname, "whatever" is perfectly valid. This second (and any subsequent) session is multiplexed over the first ssh, so you don't have to authenticate again.

Now, if you kill the first ssh session, all subsequent sessions die. One way around that is to open a terminal, run:
code:
ssh -NMS /tmp/bar.sock foo@bar.org
which authenticates you, but doesn't start a shell. Then you can minimize this terminal but leave ssh running until you're done or the day or whatever. At that point, any "ssh -S /tmp/bar.sock"s will work without further authentication. This is also great for scp, rsync, etc.

ExcessBLarg! fucked around with this message at 01:05 on Jul 1, 2011

dont skimp on the shrimp
Apr 23, 2008

:coffee:
You can also add
code:
Host *
ControlMaster auto 
ControlPath /tmp/%r@%h:%p
to your ~/.ssh/config

All the ssh connections to the same host will run through the same socket with this.

IIRC, you only have to login on the first one, but was a while since I used this.

SynVisions
Jun 29, 2003

Why not just use key based authentication?

I use public keys and ssh-agent to handle my private key file so I don't need to enter in my password when logging in anyway.

I don't see how having all of your sessions dependent upon a single parent session is an upside. So you have less sockets open to the server... who cares?

Not trying to be a dick about it, just curious if there's something I'm missing here.

Ziir
Nov 20, 2004

by Ozmaugh

SynVisions posted:

Why not just use key based authentication?

I use public keys and ssh-agent to handle my private key file so I don't need to enter in my password when logging in anyway.

I don't see how having all of your sessions dependent upon a single parent session is an upside. So you have less sockets open to the server... who cares?

Not trying to be a dick about it, just curious if there's something I'm missing here.

I do use key based authentication. I just wasn't sure if relying on one connection was good or bad, but now that I think about it it doesn't seem to be that good of an idea.

dont skimp on the shrimp
Apr 23, 2008

:coffee:

SynVisions posted:

Why not just use key based authentication?

I use public keys and ssh-agent to handle my private key file so I don't need to enter in my password when logging in anyway.

I don't see how having all of your sessions dependent upon a single parent session is an upside. So you have less sockets open to the server... who cares?

Not trying to be a dick about it, just curious if there's something I'm missing here.
Yeah, pubkey is way better and was pointed out earlier, this was just discussed as an alternative. :)

I think you might save on some overhead by doing it this way, so if you have really limited bandwidth, it might make a small difference, but I don't actually know.

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

SynVisions posted:

I don't see how having all of your sessions dependent upon a single parent session is an upside. So you have less sockets open to the server... who

You don't have to authenticate/negotiate a connection each time. Probably more of an issue a long time ago on older, slower servers and clients.

BnT
Mar 10, 2006

spankmeister posted:

Yeah I use pub/privkey auth as well. I configured SSH to only accept that type of authentication, I also disallowed root logins.

For the bots ( it's quite amazing how bots seem to find your machine and start ssh attacks) I use fail2ban with -1 ban time (= unlimited, unfortunately the ban list doesn't survive reboots but the bots change ip adresses anyway)

This little bit of iptables goodness has reduced the brute forcing attempts by quite a bit. It's funny, even though I don't accept password authentication people still try on a daily basis.

code:
# SSH with 3 --state NEW connection limit per 3 minute window per IP:
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --set --name DEFAULT --rsource
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 --state NEW -m recent --update --seconds 180 --hitcount 4 --name DEFAULT --rsource -j LOG --log-level debug
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 --state NEW -m recent --update --seconds 180 --hitcount 4 --name DEFAULT --rsource -j DROP
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 --state NEW -j ACCEPT
On occasion I'll lock myself out by opening three connections within the three minute window, but any current sessions are fine. It works especially well against bots since they just keep resetting the timer all day long with each attempt.

BnT fucked around with this message at 13:43 on Jul 1, 2011

ryo
Jan 15, 2003
Is there anything in the default installation of Ubuntu 11.04 server that might stop outgoing LDAP connections?

I've got a simple PHP script that's just trying to make an LDAP connection to my university's server. It works fine on my Mac running MAMP, but the script fails on an Ubuntu server (same subnet, subject to identical firewall rules).

ldap_connect() is successful, but ldap_bind() gives the error "Can't contact LDAP server" in ldap_error().
At the command line, ldapsearch returns:

code:
ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
Any ideas?

evol262
Nov 30, 2010
#!/usr/bin/perl
ldapsearch -x -d5 ${whatever}

Post results.

Check ldap.conf to make sure it's not pointing at something stupid (like localhost).

Is IPv6 enabled?

ExcessBLarg!
Sep 1, 2001

SynVisions posted:

Why not just use key based authentication?
1. Some equipment I use doesn't/can't do pubkey auth. Actually, this is on two extremes. The first are secure machines where the only allowed login method is two-factor, PIN + OTP token--typing in a new password after every rsync is extremely annoying. The second are APC console servers which, to my knowledge, only do password auth, although I don't think these guys support multiplexing of sessions over the same socket either.

2. Pubkey auth doesn't always play nice with single-sign on (e.g., Kerberos) systems. Ideally I already have Kerberos tickets on the machine I'm using, so any ssh connections are password-less anyways (GSSAPI auth). However, if I'm on an old machine whose ssh doesn't have proper GSSAPI support, or if I'm working on machines in two realms, sometimes it's easier to just use password auth then it is to use kpagsh to setup a second credentials cache.

3. When working with a temporary machine, or a machine that gets replaced about as often as I log into it, or some other infrequently used riff-raff hardware, it's easier to setup a control socket with password auth for the few minutes I need to do work on it, then it is to setup an authorized_keys file I'm never going to use again.

4. Key exchange is really slow on old Sun hardware, like "30 seconds" slow. Although I haven't had to use them in some years, any (secure) mechanism to avoid unnecessary key exchange is a blessing on these guys.

Most of the time I do use pubkey or GSSAPI, and I don't really care about the number of sockets I have outstanding. But there are some odd-ball scenarios where having the ability to multiplex sessions is nice for whatever reason.

spankmeister
Jun 15, 2008






BnT posted:

This little bit of iptables goodness has reduced the brute forcing attempts by quite a bit. It's funny, even though I don't accept password authentication people still try on a daily basis.

code:
# SSH with 3 --state NEW connection limit per 3 minute window per IP:
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --set --name DEFAULT --rsource
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 --state NEW -m recent --update --seconds 180 --hitcount 4 --name DEFAULT --rsource -j LOG --log-level debug
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 --state NEW -m recent --update --seconds 180 --hitcount 4 --name DEFAULT --rsource -j DROP
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 --state NEW -j ACCEPT
On occasion I'll lock myself out by opening three connections within the three minute window, but any current sessions are fine. It works especially well against bots since they just keep resetting the timer all day long with each attempt.

Great, I'll probably use that. :)

BTW: If you put a rule with your own IP address with ACCEPT above those rules, it will always accept traffic from your IP and you won't lock yourself out anymore.

(iptables uses a top-down approach and if a rule matches, it stops checking.)

ryo
Jan 15, 2003
I've replaced hostnames/IP addresses
code:
user@intranetvm:/etc/ldap$ ldapsearch -x -d5 -H ldaps://ldap.university.org
ldap_url_parse_ext(ldaps://ldap.university.org)
ldap_create
ldap_url_parse_ext(ldaps://ldap.university.org:636/??base)
ldap_sasl_bind
ldap_send_initial_request
ldap_new_connection 1 1 0
ldap_int_open_connection
ldap_connect_to_host: TCP ldap.university.org:636
ldap_new_socket: 3
ldap_prepare_socket: 3
ldap_connect_to_host: Trying <public IP address>:636
ldap_pvt_connect: fd: 3 tm: -1 async: 0
TLS: peer cert untrusted or revoked (0x42)
TLS: can't connect: (unknown error code).
ldap_err2string
ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)

on my Mac I get a ton of info back.

ldap.conf is all commented out:
code:
#
# LDAP Defaults
#

# See ldap.conf(5) for details
# This file should be world readable but not world writable.

#BASE	dc=example,dc=com
#URI	ldap://ldap.example.com ldap://ldap-master.example.com:666

#SIZELIMIT	12
#TIMELIMIT	15
#DEREF		never
I haven't explicitly enabled IPv6 so I assume it's doing everything on IPv4

evol262
Nov 30, 2010
#!/usr/bin/perl
You'll probably want to actually configure ldap.conf, but does this look like a problem to you?

quote:

Some text
TLS: peer cert untrusted or revoked (0x42)
TLS: can't connect: (unknown error code).

ldap_err2string
ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
What if you don't bind with TLS/SSL?

Is there a cert out there somewhere from your university that you can grab?

bort
Mar 13, 2003

This isn't adequate security by itself, but: I changed my SSH port to a non-default port and I haven't had a log entry from an SSH bot in more than a year. Lockout rules and pubkey authentication are still the right idea, but it impressed me that one little change foiled 'em.

dont skimp on the shrimp
Apr 23, 2008

:coffee:

bort posted:

This isn't adequate security by itself, but: I changed my SSH port to a non-default port and I haven't had a log entry from an SSH bot in more than a year. Lockout rules and pubkey authentication are still the right idea, but it impressed me that one little change foiled 'em.
There's nothing really wrong with this, IMO, as long as you don't make it your only security measure.

It's basically just a really neat way to keep your logs from being flooded. :shobon:

spankmeister
Jun 15, 2008






bort posted:

This isn't adequate security by itself, but: I changed my SSH port to a non-default port and I haven't had a log entry from an SSH bot in more than a year. Lockout rules and pubkey authentication are still the right idea, but it impressed me that one little change foiled 'em.

Yes, but my main use for it is surfing at work without anybody putting their nose into what I look at. (Not looking at anything shocking, I just like my privacy)

Since I'm behind a corporate firewall that basically only lets through certain ports (20/21, 22, 80, 443 + some others) I am "stuck" using a well known port. I can switch to 443 or something but I'm sure the bots'll find me just as easily there.

JHVH-1
Jun 28, 2002
If you are using apache and really want to secure it, you can put on mod_security. You just have to get a decent started ruleset and then allow exceptions for whatever particular web app you are running. It would prevent some vulnerabilities you otherwise may be exposed to till you are aware and update/patch that particular piece of code.

The phpmyadmin thing was common. The scanners started showing up 6 months after they had already fixed it, but a lot of people still had older self installed copies of phpmyadmin sitting on their sites.

Sir Sidney Poitier
Aug 14, 2006

My favourite actor


Does anyone know of a program that will help me with this:

I've got a VM, which runs on a SAN pair using iSCSI. I have been making the SAN more reliable and testing its failover and I'd like to get a good visual indication of the disc activity from the perspective of the VM. What program can I use which will let me test and visualise the disc activity whilst I'm failing the SAN over? Something that tries to write to disc every 0.5s and displays 1 symbol on success, or another on failure. Is that possible?

spankmeister
Jun 15, 2008






Anjow posted:

Does anyone know of a program that will help me with this:

I've got a VM, which runs on a SAN pair using iSCSI. I have been making the SAN more reliable and testing its failover and I'd like to get a good visual indication of the disc activity from the perspective of the VM. What program can I use which will let me test and visualise the disc activity whilst I'm failing the SAN over? Something that tries to write to disc every 0.5s and displays 1 symbol on success, or another on failure. Is that possible?

Uhm well there's iotop and you can use bonnie++ for load testing I guess.

xPanda
Feb 6, 2003

Was that me or the door?
I'm currently experimenting with Ubuntu 11.04 in preparation for migrating from Mac OS X to Linux. I've got 11.04 installed on a Gigabyte P67A-UD4-B3 and it's working great except for one thing: the network connection appears to drop for 10-120 seconds every 10 minutes or so. I'll run constant pings of the router on this machine and on another machine on the same network, side by side, and the Ubuntu machine will drop out whilst the other machine is fine.

I've tried googling the issue but I haven't found anything like this. Searching with respect to the motherboard or NIC chipset yields nothing. How should I go about troubleshooting this?

BnT
Mar 10, 2006

xPanda posted:

I've tried googling the issue but I haven't found anything like this. Searching with respect to the motherboard or NIC chipset yields nothing. How should I go about troubleshooting this?

Nothing in the log files (/var/log/messages)? Nothing in "dmesg"? That is strange indeed. I'd try to swap cables if you don't have any logged messages, if that doesn't fix it maybe try to force the speed and duplex settings on the NIC with ethtool/mii-diag.

I guess my next step would be making your own logs with ethtool to see if link is actually dropping or what. As root:
code:
while [ 1 ]; do OUT=`ethtool eth0 2>&1`; if [ $? -ne 0 ]; then echo; date; echo $OUT; fi; sleep 1; done

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

Network manager is scanning and dropping the connection

spankmeister
Jun 15, 2008






Bob Morales posted:

Network manager is scanning and dropping the connection

Probably yeah. I loving hate network manager.

As above, only check /var/log/syslog for ubuntu (and debian I guess)

Just to be sure, a simple ifconfig will tell you if there are problems with your cable or anything.
code:
eth0      Link encap:Ethernet  HWaddr 00:11:22:33:44:55
          inet addr:1.2.3.4  Bcast:1.2.3.255  Mask:255.255.255.0
          inet6 addr: fe80::123:4567:8910:1112/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:15196859 errors:0 dropped:0 overruns:0 frame:0
          TX packets:7844061 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:1510933080 (1.5 GB)  TX bytes:1770252653 (1.7 GB)
          Interrupt:17
errors and dropped are pretty obvious, frame is usually if the other end is doing stuff it's not supposed to but carrier is usually indicative of cable problems. Collisions rarely happen but if they do it's probably because you have a hub.

spankmeister fucked around with this message at 10:10 on Jul 3, 2011

ryo
Jan 15, 2003

evol262 posted:

You'll probably want to actually configure ldap.conf, but does this look like a problem to you?

What if you don't bind with TLS/SSL?

Is there a cert out there somewhere from your university that you can grab?

I connected with LDAP:// instead of LDAPS:// and it worked :)

Adbot
ADBOT LOVES YOU

spankmeister
Jun 15, 2008






ryo posted:

I connected with LDAP:// instead of LDAPS:// and it worked :)
Right now your connection with the ldap server is not encrypted, up to you to decide if that's a problem or not, but just FYI. :)

When you want bind with SSL you usually need to get the certificate from the server and install it in a specific way.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply