Project

General

Profile

Bug #9858

Updated by Dominic Cleal over 9 years ago

*This issue is currently embargoed and may not be discussed in public.    Keep comments to this ticket or the foreman-security mailing list.* Cloned from https://bugzilla.redhat.com/show_bug.cgi?id=1194393  
  Description of problem: 


 Version-Release number of selected component (if applicable): 
 Red Hat Satellite 6.0.7 
 Active Directory 

 When making an SSL connection How reproducible: 


 Steps to an Reproduce: 
 1. Setup up a LDAP authentication Authentication source to Active Directory 
 2. Create a user in Foreman, AD 
 3. Login with the remote server certificate is accepted without any verification against known certificate authorities. AD user on satellite 6 webUI 

 This can allow the LDAP connection between Foreman Actual results: 
 Fails with incorrect user and the LDAP server to be attacked, and a different LDAP server could be contacted to authenticate users to Foreman. task is hung at Actions::Pulp::User::Create (error) Actions::Pulp::Superuser::Add (pending) 

 Expected behaviour is that the certificate authority for the results: 
 AD authentication with Satellite 6 should work with LDAP server should be stored and trusted somewhere, e.g. the system trust store (/etc/pki/tls/certs/ca-bundle.crt, or via update-ca-certificates). 

 Affects Foreman 1.3.0 or higher - since Puppet was removed as a dependency, the default SSL behaviour went back to no verification. LDAP+TLS  

 Additional info:

Back