-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenLDAP certificates are signed with wrong CN #289
Comments
I traced the issue to this line L1301 and the value of self.gen_cert('openldap', self.openldapKeyPass, 'ldap', self.ldap_hostname) I think this was done to restrict the ldap access to the @yurem @nynymike I need inputs on this. How should we address this issue? |
Also one common pattern to generate multiple certificates is to use a central CACert and sign all the application CSRs with that one cert. The CACert is distributed to the clients and any new applicaiton certificate is automatically trusted since it is signed by the same CACert.
Any reason why |
Most customers will replace the https cert anyway. So it's really just LDAP we're talking about? |
Yes. The issue is really with LDAP. The OpenLDAP TLS page recommends using the CA cert way of doing it. |
Since we are employing |
When working with replication issues in 3.0.1 I discovered that the OpenLDAP certificates are wrongly signed. The CN is supposed to be the domain name, but it is
localhost
. The other certificates are properly signed with domain names.The text was updated successfully, but these errors were encountered: