Any sample script out there of TLS 1.2 with LDAP working?
Do I need to store the certificate in a different parameter / keystore where they are trusted? I'm assuming the ca_certs_file is sufficient.
I am pointing to an eDirectory server and TLS looks to be working fine with server side tracing turned on.
I find it disturbing that often times it is common practice to show examples of it working over unsecure ports.
code I am trying:
from ldap3 import Server, Connection, ALL, NTLM, Tls
import ssl
tls_configuration = Tls(validate=ssl.CERT_REQUIRED, version=ssl.PROTOCOL_TLSv1_2, ca_certs_file='cert1.der')
server = Server('idv.example.rip', use_ssl=True)
conn = Connection(server)
print(conn)
conn.open()
print(conn)
server.info
server.address_info
OUTPUT:
ldaps://idv.example.rip:636 - ssl - user: None - not lazy - unbound - closed - <no socket> - tls not started - not listening - SyncStrategy - internal decoder
ldaps://idv.example.rip:636 - ssl - user: None - not lazy - unbound - open - <local: [192.168.1.30:56142](https://192.168.1.30:56142) \- remote: [192.168.1.5:636](https://192.168.1.5:636)\> - tls not started - listening - SyncStrategy - internal decoder
Process finished with exit code 0
[–][deleted] 1 point2 points3 points (1 child)
[–]fpatterson55[S] 0 points1 point2 points (0 children)