The following input errors were detected:Authentication failed.
LDAP bind error [error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed (unable to get local issuer certificate),error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed (unable to get local issuer certificate),Can't contact LDAP server]
hican you try to press Select button on "Authentication containers" row on ldap-server config and look for new error in general log (should be something like "LDAP bind error")?
Is there a limitation on the length of input passwords?
When I do that there is a delay and then eventually I get an empty popup headed "Please select which containers to Authenticate against:". I don't get anything showing up in the General log section
} else { $this->logLdapError("User DN not found"); }
QuoteIs there a limitation on the length of input passwords? tested with 80-character AD password. works
QuoteWhen I do that there is a delay and then eventually I get an empty popup headed "Please select which containers to Authenticate against:". I don't get anything showing up in the General log sectionso bind is successful?
can you try to add test user to 'Bind credentials' and request "Authentication containers" again? maybe then something will appear in the log?
Why don't you do what I suggested? You will see all LDAP errors in full that way.
foreach ($authenticator->getLastAuthProperties() as $attr_name => $attr_value) { if (is_array($attr_value)) { $attr_value = implode(",", $attr_value); } $input_errors[] = "{$attr_name}: {$attr_value}"; }
$input_errors[] = gettext("Authentication failed.");
$this->lastAuthProperties['error'] = $error_string; $this->lastAuthProperties['ldap_error'] = ldap_error($this->ldapHandle);
syslog(LOG_ERR, sprintf($message . " [%s,%s]", $error_string, ldap_error($this->ldapHandle)));
else { $this->lastAuthProperties['error'] = "User DN not found"; }
if ($result !== false && count($result) > 0) { $user_dn = $result[0]['dn']; $ldap_is_connected = $this->connect($this->ldapBindURL, $result[0]['dn'], $password); }
The stunnel part is optional. It's just a way to get an unencrypted connection without transferring everything in the plain over the wire. If this is a small controlled environment you can of course just use plain LDAP on port 389.I just tried to recreate the config I suggested to send you a screenshot and embarrassingly enough stunnel on OPNsense does not support client mode. Sorry! In pfSense it does.OK, now I know which plugin I am working on next. This is essential.So you are really stuck with using plain text LDAP if you want to use tcpdump.