Hi there

We use client certs to access an Apache Web server. It all works well except
that if the user only a cert not signed by one of the Apache's
"trusted" CAs, they end up with this gross IE error page - which doesn't
tell the user what went wrong. 

If they don't have any client certs, then using "SSLVerifyClient optional"
can catch that (and I can use PHP to redirect to a nice error page), but it
can't catch having a cert signed by someone else.

So instead of using "SSLVerifyDepth 1", I thought I'd allow any client cert
to be accepted, then use PHP to veto it, etc. I can do this as I only look
for a client cert on a login page - I use cookies to actually do auth after
the initial check. 

Anyway, can some combination of Apache environment variables add up to the
same thing?

I'm concerned that someone could conceivably create a CA with the same
details contained within our CA's public key, then sign a cert with that,
then break through such a system. I know "SSLVerifyDepth" stops that, I just
want to find another way of doing the same thing...

Thanks! (and brickbats to Microsoft!)


-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to