So it seems the ldaps port is open and listening.
Both mail and nextcloud VMs are [on] that lan and the ufw firewall on the mail/ldaps VM is set allow ldaps from anywhere the ip of the nextcloud/ldap client.
nc -zvn <IP of VM1> 636
sudo ufw disable
<redacted>:~$ sudo ufw status[sudo] password for <redacted>: Status: activeTo Action From-- ------ ----636/tcp ALLOW Anywhere ...
<redacted>:~$ sudo ufw status[sudo] password for <redacted>: Status: activeTo Action From-- ------ ----636/tcp ALLOW <VPN Client Network/mask> 636/tcp ALLOW <IP of VM2> ...
sudo gufw
ufw allow in log proto tcp from 192.168.0.212 to any port ldaps
ufw allow in log proto tcp from 192.168.0.212 to any app "OpenLDAP LDAPS"
Just a couple of things:The rule looks right. Your profile could be odd... Maybe ufw status verbose might be more revealing than ufw status numbered.AFAIK, ufw is really just a management front-end for iptables. I'm pretty sure systemctl stop ufw won't disable the active rule-set, nor will systemctl disable ufw until after a reboot. It's possible that there's some outbound filtering happening so maybe try again after issuing ufw disable on both machines...[\quote]Yes systemctl disable ufw followed by systemctl stop ufw works.QuoteThe rule does look correct. You may want to add logging to see what happens to incoming connections:Code: [Select]ufw allow in log proto tcp from 192.168.0.212 to any port ldaps[\quote]Cheers. Done!QuoteIIRC, there is an OpenLDAP profile (which you can confirm by issuing ufw app list), so you could also use:Code: [Select]ufw allow in log proto tcp from 192.168.0.212 to any app "OpenLDAP LDAPS"[\quote]Will look into that.QuoteI don't think I have ever commissioned an LDAP server with port 389/tcp closed. Perhaps there is a dependency and you need both open (I think this unlikely but possible)...I think port 389 is unsecured unless used with tls and is mostly used for MS AD but it seems to be enable here on the mail/ldaps server anyway. I think perhaps it's there for outlook/AD compatibility.QuoteFinally, in relation to your concerns regarding name resolution, you could use an entry at /etc/hosts while troubleshooting. Perhaps reboot afterwards to be sure no lingering resolver issues exist.Do you mean entry in the host file (like 192.168.0.212 cloud3) on ldaps host and vice versa?
The rule does look correct. You may want to add logging to see what happens to incoming connections:Code: [Select]ufw allow in log proto tcp from 192.168.0.212 to any port ldaps[\quote]Cheers. Done!QuoteIIRC, there is an OpenLDAP profile (which you can confirm by issuing ufw app list), so you could also use:Code: [Select]ufw allow in log proto tcp from 192.168.0.212 to any app "OpenLDAP LDAPS"[\quote]Will look into that.QuoteI don't think I have ever commissioned an LDAP server with port 389/tcp closed. Perhaps there is a dependency and you need both open (I think this unlikely but possible)...I think port 389 is unsecured unless used with tls and is mostly used for MS AD but it seems to be enable here on the mail/ldaps server anyway. I think perhaps it's there for outlook/AD compatibility.QuoteFinally, in relation to your concerns regarding name resolution, you could use an entry at /etc/hosts while troubleshooting. Perhaps reboot afterwards to be sure no lingering resolver issues exist.Do you mean entry in the host file (like 192.168.0.212 cloud3) on ldaps host and vice versa?
IIRC, there is an OpenLDAP profile (which you can confirm by issuing ufw app list), so you could also use:Code: [Select]ufw allow in log proto tcp from 192.168.0.212 to any app "OpenLDAP LDAPS"[\quote]Will look into that.QuoteI don't think I have ever commissioned an LDAP server with port 389/tcp closed. Perhaps there is a dependency and you need both open (I think this unlikely but possible)...I think port 389 is unsecured unless used with tls and is mostly used for MS AD but it seems to be enable here on the mail/ldaps server anyway. I think perhaps it's there for outlook/AD compatibility.QuoteFinally, in relation to your concerns regarding name resolution, you could use an entry at /etc/hosts while troubleshooting. Perhaps reboot afterwards to be sure no lingering resolver issues exist.Do you mean entry in the host file (like 192.168.0.212 cloud3) on ldaps host and vice versa?
I don't think I have ever commissioned an LDAP server with port 389/tcp closed. Perhaps there is a dependency and you need both open (I think this unlikely but possible)...
Finally, in relation to your concerns regarding name resolution, you could use an entry at /etc/hosts while troubleshooting. Perhaps reboot afterwards to be sure no lingering resolver issues exist.
Yes systemctl disable ufw followed by systemctl stop ufw works.
I think port 389 is unsecured unless used with tls and is mostly used for MS AD but it seems to be enable here on the mail/ldaps server anyway. I think perhaps it's there for outlook/AD compatibility.
Do you mean entry in the host file (like 192.168.0.212 cloud3) on ldaps host and vice versa?