Could it be possible to not provide Certificate path? I use Redmine and the only thing required is specifying that we use LDAPS by checking a box and specifying the port... I have look a little bit at the code and it seems that this is realize by the help of Perl module "IO::Socket::SSL" (http://search.cpan.org/~sullr/IO-Socket-SSL-2.020/lib/IO/Socket/SSL.pod) and socket...
The equivalent library in python seems to be ssl ( https://docs.python.org/2/library/ssl.html) Can it be use to allow LDAPS with ldap_auth.py ?? Richard On Thu, Jul 24, 2014 at 4:58 PM, Shane Tzen <sh...@faultymonk.org> wrote: > On Thu, Dec 19, 2013 at 4:30 PM, Maggs <maggs.csom....@gmail.com> wrote: > > > > Yes secure ldap is causing a lot of problems. I hope it gets sorted out > eventually. For now I'm having to modify the framework for my needs. > > Somewhat related issue here. Using a self-signed cert and especially > for testing, it seems expedient to add an option to ignore certificate > errors by setting ldap.OPT_X_TLS_REQUIRE_CERT which ldap_auth.py > doesn't provide. > > My modification is below: > > --- ldap_auth.py.orig 2014-07-24 13:23:25.791901259 -0700 > +++ ldap_auth.py 2014-07-24 13:43:34.467896371 -0700 > @@ -18,6 +18,7 @@ > base_dn='ou=users,dc=domain,dc=com', > mode='uid', secure=False, cert_path=None, cert_file=None, > bind_dn=None, bind_pw=None, filterstr='objectClass=*', > + cert_require=True, > username_attrib='uid', > custom_scope='subtree', > allowed_groups=None, > @@ -78,6 +79,8 @@ > If ldap is using GnuTLS then you need cert_file="..." instead > cert_path > because cert_path isn't implemented in GnuTLS :( > > + If using self-signed certificates, set cert_require=False. > + > If you need to bind to the directory with an admin account in order to > search it then specify bind_dn & bind_pw to use for this. > - currently only implemented for Active Directory > @@ -170,6 +173,7 @@ > secure=secure, > cert_path=cert_path, > cert_file=cert_file, > + cert_require=cert_require, > filterstr=filterstr, > username_attrib=username_attrib, > custom_scope=custom_scope, > @@ -568,7 +572,8 @@ > ldap_mode=mode, > secure=secure, > cert_path=cert_path, > - cert_file=cert_file): > + cert_file=cert_file, > + cert_require=cert_require): > """ > Inicialize ldap connection > """ > @@ -582,6 +587,8 @@ > con.set_option(ldap.OPT_X_TLS_CACERTDIR, cert_path) > if cert_file: > con.set_option(ldap.OPT_X_TLS_CACERTFILE, cert_file) > + if not cert_require: > + con.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, > ldap.OPT_X_TLS_NEVER) > else: > if not ldap_port: > ldap_port = 389 > > -- > Resources: > - http://web2py.com > - http://web2py.com/book (Documentation) > - http://github.com/web2py/web2py (Source code) > - https://code.google.com/p/web2py/issues/list (Report Issues) > --- > You received this message because you are subscribed to the Google Groups > "web2py-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to web2py+unsubscr...@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. > -- Resources: - http://web2py.com - http://web2py.com/book (Documentation) - http://github.com/web2py/web2py (Source code) - https://code.google.com/p/web2py/issues/list (Report Issues) --- You received this message because you are subscribed to the Google Groups "web2py-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to web2py+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.