On Tue, Jun 17, 2014 at 06:48:28PM -0700, Nelson wrote:

> Perfectly working VM running Amazon Linux with Apache and mod_ssl
> configured for client certificates.
> 
> Ran yum update to get the latest openssl (OpenSSL 1.0.1h-fips 5
> Jun 2014)/mod_ssl(2.2.27 )/httpd(2.2.27) security updates from
> Amazon's yum repository.

Did Apache get upgraded too?  Did the upgrade change the default
cipherlist?

> Now the client certificate checks are failing and I am getting:

What is the key size of the client certificates?  What is the
signature algorithm?

> "Certificate Verification: Error (7): certificate signature
> failure" in the Apache log.

Are they signed with MD5?  Did Apache disable support for MD5
signed certs?

>       SSLVerifyClient require
>       SSLVerifyDepth 1
>       SSLCACertificateFile /etc/ssl/certs/clientca_master

Have you tried a VerifyDepth of 2 or more?

Do the client certs in question work with "openssl s_server" as
the server?

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to