Hello, Is anyone using self-signed certificates using X509v3 extensions?
To be clear: I am not trying to make use of X509v3 extensions for any particular purpose - A recent upgrade to the tool I am using recently started X509v3 extensions I ask because so far I have been unable to get TLS working when using X509v3 extensions on a certificate used by bacula-fd If I use a certificate with X509v3 extensions bacula-fd, I get these types of messages: 08-Sep 12:47 bacula-dir JobId 358290: Error: tls.c:96 Error with certificate at depth: 0, issuer = /C=US/ST=PA/L=Media/O=BSD Cabal Headquarters/CN=BSD Cabal Headquarters/emailAddress=d...@langille.org <mailto:Headquarters/emailAddress=d...@langille.org>, subject = /C=US/ST=PA/O=BSD Cabal Headquarters/CN=r730-03.int.unixathome.org/emailAddress=d...@langille.org <mailto:Headquarters/CN=r730-03.int.unixathome.org/emailAddress=d...@langille.org>, ERR=26:unsupported certificate purpose 08-Sep 12:47 bacula-dir JobId 358290: Error: openssl.c:68 Connect failure: ERR=error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed 08-Sep 12:47 bacula-dir JobId 358290: Fatal error: TLS negotiation failed with FD at "r730-03.int.unixathome.org:9102 <http://r730-03.int.unixathome.org:9102/>". 08-Sep 12:47 bacula-dir JobId 358290: Fatal error: bsock.c:520 Packet size=386073346 too big from "Client: r730-03-fd:r730-03.int.unixathome.org:9102 <http://r730-03.int.unixathome.org:9102/>". Maximum permitted 1000000. Terminating connection. If I move back to certificate without X509v3 extensions, the backups succeed. At first, I thought "unsupported certificate purpose" meant client versus server type certs, but no that was not it. That brought in a new type of error. See https://dan.langille.org/2023/09/09/getting-the-right-type-of-certificate/ <https://dan.langille.org/2023/09/09/getting-the-right-type-of-certificate/> What X509v3 extensions you might ask? These. X509v3 extensions: X509v3 Basic Constraints: CA:FALSE X509v3 Key Usage: Digital Signature, Non Repudiation, Key Encipherment, Key Agreement X509v3 Extended Key Usage: TLS Web Client Authentication X509v3 CRL Distribution Points: Full Name: URI:http://CRL_URI <http://crl_uri/> Ideas welcome. -- Dan Langille d...@langille.org <mailto:d...@langille.org>
_______________________________________________ Bacula-users mailing list Bacula-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bacula-users