Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    LDPAS to new domain controller

    Scheduled Pinned Locked Moved General pfSense Questions
    5 Posts 2 Posters 614 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sreece
      last edited by sreece

      I've got LDAPS over SSL (636) working on an old domain controller. I've transferred FSMO to a new domain controller, and I'm trying to get LDAPS working on it so that I can retire the old DC. I've created a new CA in pfSense (2.4.4-Release) and a new certificate with cn that matches the hostname of the new DC. I've exported both the CA and client certs, and I've imported the CA into Trusted Root Certs and client cert into Personal certs using mmc.exe.

      When I test authentication against the new DC (I created a new Auth server just for this, with the same settings as the old auth server but pointed to the new server) I can see the traffic come in, but pfSense sends the DC a message about an unknown CA.

      If I use OpenSSL to test the connection to 636, I can see the correct certificates in use by DC02. What have I missed? Using StartTLS or SSL doesn't matter...same error.

      One difference between old and new is that the old server (SBS 2011) had certificate authority role installed by default. However, there don't seem to be any issued certs that have anything to do with this. What am I missing?

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        When making any changes to LDAP certs in pfSense, you should go to the console or connect with ssh and run option 16 and then 11. That will ensure that the PHP environment for LDAP is consistent and complete. Do that, and then test again.

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        S 1 Reply Last reply Reply Quote 3
        • S
          sreece @jimp
          last edited by

          @jimp I can't believe that's all it was. Probably should have asked for help about 6 hours ago. While we're here, it only seems to work with SSL (686) and not StartTLS. Is that expected?

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            STARTTLS should work provided you have the right settings (it would be on port 389 with the transport set to STARTTLS). I've seen it work both ways.

            The PHP LDAP client is quirky, though, hence the need for that 16/11 dance. There are bugs in PHP which prevent the better-suited methods of setting up LDAP from working, too.

            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 1
            • S
              sreece
              last edited by

              Yep, making the change to StartTLS just required the 16/11 trick and it's up and running. Thanks for the hand!

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.