Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

enable TLS hostname validation #279

Merged
merged 39 commits into from
Aug 24, 2016
Merged

Conversation

tmaher
Copy link
Collaborator

@tmaher tmaher commented Aug 23, 2016

This PR is a continuation of #259 and fixes #258. The major additions to @JPvRiel 's work are...

  • Fix Vagrant integration tests - TestBindIntegration#test_bind_timeout relies on an iptables-blackhole'd port (tcp/8389). I switched the iptable invocation in script/install-openldap so that blockage extends to the hypervisor. Also I updated the docs a bit.
  • New test/fixtures/ca files - For Vagrant testing to work, the hypervisor & guest need to both agree on a CA. The previous cacert.pem didn't have a corresponding private key in the repo, which made that hard. This PR adds a new CA & key, and extends script/install-openldap to use them.
  • A bunch of TLS tests - test/integration/test_bind.rb already included test_bind_tls_with_cafile, so I added the new TLS cert verification tests there. I also refactored that file a teeny bit because of all the repetition: mostly adding some default hashes.

The first CI run is going to fail, because I'm not entirely sure what the right value is for test_bind_tls_with_multiple_bogus_hosts's exception. Once the PR is created and CI runs, I should be able to get that and add it. - FIXED

/cc @jch @etdsoft

@tmaher
Copy link
Collaborator Author

tmaher commented Aug 23, 2016

Ack, what happened to CI???

@tmaher
Copy link
Collaborator Author

tmaher commented Aug 23, 2016

and it's back... huh

@tmaher
Copy link
Collaborator Author

tmaher commented Aug 23, 2016

(((size - n_results) < 126) ? (size - n_results) : 0)
else
size
end
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No behavioral change, just fiddling with syntax

This was referenced Jan 24, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

LDAPS vulnerable to MITM - failure to validate hostname against CN or SAN in X509 Cert
6 participants