-
Notifications
You must be signed in to change notification settings - Fork 11k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow invalid and Self-Signed SSL not effective for oauth #919
Comments
I've tracked this down to to meteor's oath package. I don't think this can be solved easily with the existing configuration option. I've worked around it by adding NODE_TLS_REJECT_UNAUTHORIZED=0 as en environmental variable to the docker-compose.yml |
I am also having this problem. Where can I add that environmental variable on a regular install? |
This is what I am seeing in the error log. UNABLE_TO_VERIFY_LEAF_SIGNATURE |
I am facing the same problem. I have solved a similar issue when testing gitlab's embedded mattermost with gitlab as OAuth. My (legitimate) certificate' authority (RapidSSL) was not in their embedded cacert.pem file. I did not find a proper way of fixing this so I changed gitlab's cacert.pem file with this ugly trick:
Using the docker vesion of Rocket.Chat. Is there a way of achieving the same fix (or even a less ugly one) ? EDIT: @Shelnutt2 's solution is less ugly and works great too :
|
I'm having a related issue with an internal version of gitlab. Trying to oauth against gitlab yields the error SELF_SIGNED_CERT_IN_CHAIN, rather than the one (DEPTH_ZERO_SELF_SIGNED_CERT) listed above. Perhaps its related? |
I'm having a similar issue with LDAP settings (Using Rocket.Chat with docker). My LDAP server(openLDAP) using SSLMate wildcard certificate. But when I install Rocket.Chat manually on local server, it is working. Using same LDAP server and configurations. |
Have you tried setting the |
I am also facing a self signed certificate issue when trying to authenticate through a CAS server. I am running 0.45 with the official Docker image. I've supplied
Am I missing something obvious? UPDATE: I've traced this back all the way to https://github.com/kcbanner/node-cas/blob/master/lib/cas.js#L406. I assume the solution there completely ignores the value of |
I have problems too. Since my CAS idp uses self-signed certificates, when I try to authenticate my idp indicates that it was successful, but rocket.chat shows me the following error: rocketchat_cas rocketchat_cas.js:169 CAS ➔ error error when trying to validate: unable to verify the first certificate Who had to deal with the same problem ??? |
@ScOut3R Did you make any progress circumventing the new CAS limitations? I tried passing my root CA to the node-cas module with the Unfortunately, I still had no luck! |
@wcgcoder Well, I worked around the issue by buying a trusted certificate for our Rocket.Chat instance. |
@ScOut3R Unfortunately, some organizations have internal certificate authorities they're mandated to use (by law). In other environments, I'd just use let's encrypt to get my certs. |
Any plans to solve this issue? I've just encountered it when testing nextcloud oauth. |
Where in the Admin panel is that? |
I'm testing rocket.cat with gitlab oath. I've got a self signed cert on the gitlab server, and I'm unable to authenticate against it due to the self signed certificate.
Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.
The text was updated successfully, but these errors were encountered: