> From: owner-openssl-us...@openssl.org On Behalf Of Carroll, Diana C
> Sent: Tuesday, 15 June, 2010 19:36

> I have a scenario where a certificate was generated using a 
> 2048-bit key, and was signed by a CA using a 1024-bit key.  
> The certificate is verified "OK" by openSSL, however when 
> attempting a TLS or TTLS authentication the server fails with 
> the following debug output:
> 
> Debug output (FreeRADIUS version 2.1.8.)
> Error: TLS_accept:failed in SSLv3 read client certificate A 
> Error: rlm_eap: SSL error error:14094438:SSL 
> routines:SSL3_READ_BYTES:tlsv1 alert internal error
> Error: SSL: SSL_read failed inside of TLS (-1), TLS session fails.
> 
The *client* says *it* failed. Did/can you get any error or log 
information from the client? Do/can you (re)create the problem 
with a known client? Can you try openssl s_client using the same 
client key&cert, or if that's unavailable a similar one? (s_client 
probably won't be able to do Radius stuff, but it should connect.)

> The same error sequence occurs regardless of whether we use 
> TLS or TTLS. 
> 
I don't know EAP-TTLS myself, but according to wikipedia it 
"can but does not have to" use (TLS) client authentication. 
(Distinct from the app/user auth that is the point of EAP.)
Do you? That may be important, because it is exactly at 
the client auth step (client cert) that you're failing.

> I'm wondering if the mismatched certificate sizes could be a 
> problem, and whether anyone else has seen this?  
> When using a different set of certificates, but an otherwise 
> unchanged server configuration, authentication is successful.
> 
There should be no technical problem signing a child cert with 
a different keylength, or algorithm. It's even fairly common for 
a child cert to have a smaller/weaker key than the CA. It's 
somewhat silly for the child to be larger/stronger, because 
you get no benefit: your authentication could be compromised 
(about) as effectively by breaking *either* level. But at least 
for a few years yet, the difference between 1k and 2k discrete 
(i.e. RSA or DSA, not ECDSA) is only theoretical. And you could 
be ready for multiple or future CAs some of which are stronger.



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to