I forgot to add one thing, and you didn't paste the whole certificate PEM 
so I can't check this.

Recent versions of Go won't verify the certificate unless it contains a 
subjectAltName; matching against only the CN is no longer supported.  So if 
you do get your vendor to re-issue the cert, make sure it also includes a 
DNS SAN, if it doesn't already.  It doesn't matter if it's just a string 
like "EEBUS"; you can specify the ServerName at connection time.

On Thursday, 9 June 2022 at 17:38:04 UTC+1 Brian Candler wrote:

> On Thursday, 9 June 2022 at 14:27:04 UTC+1 cpu...@gmail.com wrote:
>
>> We receive an alert 40 (Handshake failure ) when using openssl. So the 
>> cert is definitively faulty in some way. 
>>
>>  :~/wallbox/hack$ openssl s_client  -connect 192.168.1.180:4712 
>>
> Certainly it will report a failed verification, but s_client should 
> continue (i.e. allow you to send and receive data), if the TLS connection 
> was established.  That is: it won't drop the connection on the floor unless 
> you've specified "-verify_return_error"
>
> Have you tried adding "-servername EEBUS" and/or "-verify 0" to the 
> command line?  And/or "-CAFile <path_to_file.pem>" where this file contains 
> a copy of the (self-signed) certificate itself.
>
>
> Seems that in this case- if we regard openssl as "the standard" it's 
>> obsolete to talk about Go.
>>
>
> Go doesn't use openssl internally.  I was only trying to establish whether 
> this vendor has *any* claim of their implementation interoperating with any 
> sort of TLS client.  If openssl won't talk to it, then you can pretty much 
> argue they're not talking TLS at all.
>
> However if openssl s_client does talk to it, then you have another 
> workaround: you could exec.Cmd <https://pkg.go.dev/os/exec> an instance 
> of openssl s_client, and pipe data to and from it.
>
> But really I would question the wisdom of dealing with any vendor who (a) 
> doesn't follow standards for certificates, and (b) will not allow you to 
> replace the device certificate, or won't replace it themselves, when given 
> direct evidence of its brokenness and non-compliance to standards.  How 
> exactly do you think this vendor will respond when you find a more serious 
> security violation, or some other failing in their product?
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/f8f1b1ca-c2a5-40e8-b4a0-c5733b06da2fn%40googlegroups.com.

Reply via email to