1
General Discussion / Re: ldaps (636/tcp) won't work on internal lan VM's
« on: November 08, 2021, 05:23:25 pm »Quote
Just a couple of things:
The rule looks right. Your profile could be odd... Maybe ufw status verbose might be more revealing than ufw status numbered.
AFAIK, ufw is really just a management front-end for iptables. I'm pretty sure systemctl stop ufw won't disable the active rule-set, nor will systemctl disable ufw until after a reboot. It's possible that there's some outbound filtering happening so maybe try again after issuing ufw disable on both machines...
[\quote]
Yes systemctl disable ufw followed by systemctl stop ufw works.Quote
The rule does look correct. You may want to add logging to see what happens to incoming connections:Code: [Select]ufw allow in log proto tcp from 192.168.0.212 to any port ldaps
[\quote]
Cheers. Done!QuoteIIRC, there is an OpenLDAP profile (which you can confirm by issuing ufw app list), so you could also use:Code: [Select]ufw allow in log proto tcp from 192.168.0.212 to any app "OpenLDAP LDAPS"
[\quote]
Will look into that.QuoteI don't think I have ever commissioned an LDAP server with port 389/tcp closed. Perhaps there is a dependency and you need both open (I think this unlikely but possible)...
I think port 389 is unsecured unless used with tls and is mostly used for MS AD but it seems to be enable here on the mail/ldaps server anyway. I think perhaps it's there for outlook/AD compatibility.QuoteFinally, in relation to your concerns regarding name resolution, you could use an entry at /etc/hosts while troubleshooting. Perhaps reboot afterwards to be sure no lingering resolver issues exist.Do you mean entry in the host file (like 192.168.0.212 cloud3) on ldaps host and vice versa?