If you have the server's key and certificate, the command will be smth like

openssl s_server -key key -cert cert -CAfile
file_with_ca -verify_return_error

file_with_ca should contain a concatenation of the certs of the CAs that
should issue the client's certificate.

if you don't have the server keypair, try to understand smth from the
command

openssl s_client -connect host:port -cert clicert -key clikey.

At least you'll hopefully see the list of allowed client certificate
issuers.

Please read the manuals of s_client/s_server apps for more details.

On Fri, Feb 7, 2020 at 11:18 PM Bashin, Vladimir <vbas...@empirix.com>
wrote:

> Thanks Dmitry!
>
> Do I need the server certificate in order to run those commands?
>
> Also , could you please point me to the exact commands that I’d need to
> execute in order to reproduce the tls handshake ?
>
>
>
> Regards,
>
> VB
>
>
>
> *From:* Dmitry Belyavsky <beld...@gmail.com>
> *Sent:* Friday, February 7, 2020 3:07 PM
> *To:* Bashin, Vladimir <vbas...@empirix.com>
> *Cc:* openssl-users@openssl.org
> *Subject:* Re: TLS 1.2 handshake issue (Server Certificate request)
>
>
>
> Hello Vladimir,
>
>
>
> It's worth trying to reproduce the situation using openssl
> s_client/s_server command-line apps.
>
>
>
> On Fri, Feb 7, 2020 at 9:25 PM Bashin, Vladimir <vbas...@empirix.com>
> wrote:
>
> Hello, OpenSSL experts !
>
>
>
> We need your help in better understanding a below behavior -
>
>
>
> We are experiencing issue during the initial TLS handshake :
>
> We have the customer-issued TLS certificate that we deploy on our TLS
> client system
>
> The certs  have been generated with a CSR that was generated on customer’s
>  FIPS compliant server
>
> The CSR was then signed by CA hosted on SMGR
>
>
>
> During the endpoint registration with the server we have an endpoint
> initiated TLS handshake – during that handshake the TLS server requests the
> client Certificate but our TLS client responds with the Certificates Length
> 0 that causes the TLS server to respond with the Handshake Failure.
>
>
>
>
>
> The Google search gives some generic ideas on why that might be happening
> – something along the following lines - that could be happening in case the
> client’s certificate does not match the server certificate – for example,
> due to a signing authority mismatch, or due to the encryption cipher type
> mismatch, or maybe due to some other factors.
>
>
>
> Could you please help us in better understanding this issue – what else
> could be wrong or missing in the Server and Client certificates ?
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Thanks,
>
> Vladimir Bashin
>
>
>
>
>
>
> --
>
> SY, Dmitry Belyavsky
>


-- 
SY, Dmitry Belyavsky

Reply via email to