Then it looks like Debian's telnet does not support client
certificates.  I don't know what "telnet-ssl" is or was.  If this was
Tim Hudson's old implementation using the TELNET AUTH SSL hack then it
should be abandoned in favor of one that supports the IETF TELNET
START_TLS option.  The code that Peter Runestig and I wrote supports
START_TLS as well as the TELNET FORWARD-X option for securing X
Windows sessions.  It also supports TLS session reuse for improved
performance.

It also provides several sample implementations of the 

  X509_to_user() 

function so you can specify how your client's certificates once
verified should be mapped to userid's.  You can find it at:

  http://www.runestig.com/osp.html

It comes with a client as well.  However, the best TLS Telnet client
for *nix is C-Kermit 8.0:

  http://www.kermit-project.org/ckermit.html

Security description at

  http://www.kermit-project.org/security.html



> -----Mensaje original-----
> De: Jeffrey Altman [mailto:[EMAIL PROTECTED]]
> Enviado el: jueves, 06 de junio de 2002 19:58
> Para: [EMAIL PROTECTED]
> CC: [EMAIL PROTECTED]
> Asunto: Re: telnetd-ssl
> 
> 
> That depends on whose Telnetd you are using and how you want the
> client's to be authorized.
> 
> -I'm on a Debian 2.4.6 with telnetd-ssl and telnet-ssl (0.17), openssl =
> 0.9.6-c and their libs, latest libc6 and depending libs. This is testing =
> versi=F3n on Debian.
> 
> -I've talked with the responsible of package and he said that the =
> original sources are from telnetssl and he never tested the =
> authentication certificate client. I've tried to do this with this =
> config:
> 
> -CA root certificate installed and accessible.
> -Two x509 certs verified certs created with demoCa (signed by CA root =
> certificate):=20
> 
> *telnetd cert subject and issuer
> 
> subject=3D/C=3DES/ST=3DCastellon/L=3DCastellon/O=3DIN3 =
> S.A./OU=3DTelnet/CN=3Dzidane.in3.es
> issuer =3D/C=3DES/ST=3DCastellon/L=3DCastellon/O=3DIN3 Certificate =
> Authority/OU=3DIN3 Certificate Authority/CN=3DIN3
> 
> *newcert cert subject and issuer
> 
> subject=3D/C=3DES/ST=3DCastellon/L=3DCastellon/O=3DIN3 =
> S.A./OU=3Dstaff/CN=3D<user name>, where user name is valid user system
> issuer =3D/C=3DES/ST=3DCastellon/L=3DCastellon/O=3DIN3 Certificate =
> Authority/OU=3DIN3 Certificate Authority/CN=3DIN3
> 
> -telnetd entry on inetd.conf:
> 
> telnets         stream  tcp     nowait  telnetd.telnetd   /usr/sbin/tcpd =
>  /usr/sbin/in.telnetd -z cert=3D/etc/ssl/certs/telnetd.pem -z =
> key=3D/etc/ssl/private/telnetd.key -z certrequired -z secure -z =
> verify=3D1 -z certsok
> 
> -command line from bash:
> 
> telnet-ssl -z cert=3Dnewcert.pem -z debug -z verbose -z =
> key=3Dnewcert.key -z verify=3D1 zidane.in3.es 992
> 
> The exit during execeution of client:
> 
> [SSL - attempting to switch on SSL]
> [SSL - handshake starting]
> SSL_connect:UNKWN  before/connect initialization
> SSL_connect:23WCHA SSLv2/v3 write client hello A
> SSL_connect:3RSH_A SSLv3 read server hello A
> Certificate[0] subject=3D/C=3DES/ST=3DCastellon/L=3DCastellon/O=3DIN3 =
> S.A./OU=3DTelnet/CN=3Dzidane.in3.es
> Certificate[0] issuer =3D/C=3DES/ST=3DCastellon/L=3DCastellon/O=3DIN3 =
> Certificate Authority/OU=3DIN3 Certificate Authority/CN=3DIN3 =
> Certificate Authority
> SSL_connect:error in 3RSC_B SSLv3 read server certificate B
> SSL_connect:error in 3RSC_B SSLv3 read server certificate B
> [SSL - FAILED (-1)]
> telnet: Unable to ssl_connect to remote host: Success
> 3752:error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate =
> verify failed:s3_clnt.c:769:
> [SSL - SSL_accept error]
> Connection closed by foreign host.
> 
> 
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> 
> ------_=_NextPart_001_01C20DFE.B2E6AE54
> Content-Type: text/x-vcard;
>       name="Manuel Guerrero.vcf"
> Content-Description: Manuel Guerrero.vcf
> Content-Disposition: attachment;
>       filename="Manuel Guerrero.vcf"
> Content-Transfer-Encoding: base64
> 
> QkVHSU46VkNBUkQNClZFUlNJT046Mi4xDQpOOkd1ZXJyZXJvO01hbnVlbA0KRk46TWFudWVsIEd1
> ZXJyZXJvDQpFTUFJTDtQUkVGO0lOVEVSTkVUOm1ndWVycmVyb0BpbjMuZXMNClJFVjoyMDAxMDUy
> OVQxNjMxMTBaDQpFTkQ6VkNBUkQNCg==
> 
> ------_=_NextPart_001_01C20DFE.B2E6AE54--
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> 





 Jeffrey Altman * Sr.Software Designer     Kermit 95 2.0 GUI available now!!!
 The Kermit Project @ Columbia University  SSH, Secure Telnet, Secure FTP, HTTP
 http://www.kermit-project.org/            Secured with MIT Kerberos, SRP, and 
 [EMAIL PROTECTED]               OpenSSL.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to