RE: client authentication status

2021-09-01 Thread Zeke Evans
Thanks for the explanation. I figured I was headed down a dead end. This will at least help me figure out how to handle things appropriately. Zeke Evans

Re: client authentication status

2021-09-01 Thread Matt Caswell
On 01/09/2021 16:36, Zeke Evans wrote: Is there any way to check the status of client authentication sent in a TLS 1.3 handshake after SSL_connect returns?  With TLS 1.2 SSL_connect seems to always capture the status and return an error code if it failed but not TLS 1.3.  I haven’t been able

Re: client authentication status

2021-09-01 Thread Benjamin Kaduk via openssl-users
On Wed, Sep 01, 2021 at 03:36:36PM +, Zeke Evans wrote: > Hi, > > Is there any way to check the status of client authentication sent in a TLS > 1.3 handshake after SSL_connect returns? With TLS 1.2 SSL_connect seems to > always capture the status and return an error code if it failed but no

Re: client authentication and tokens.

2010-03-19 Thread John R Pierce
Peter Gubis wrote: On 13. 3. 2010 0:37, John R Pierce wrote: our security auditors yanked the token out, and the client continues to work, .. you'll probably need to listen for token removal event and destroy this ssl session after that. It is working for us in this way. Session should be r

Re: client authentication and tokens.

2010-03-19 Thread Peter Gubis
On 13. 3. 2010 0:37, John R Pierce wrote: > we have a client-server application pair (ok, the server side is > tomcat), the client is using an Aladdin eToken w/ openssl and > engine_pkcs11 and aladdin's driver. thats all fine and working now. > the client application has long running persistenc

Re: Client-Authentication using Crypt::SSLeay

2009-01-14 Thread Olaf Gellert
Hi all, there was a little cut-n-paste error in my previous mail, I forgot one line in the script. The error remains the same... Olaf Gellert wrote: > $file=$ENV{HTTPS_PKCS12_FILE}; $pass=$ENV{HTTPS_PKCS12_PASSWORD}; > $ctx->use_pkcs12_file($file ,$pass) || die("failed to load $file: $!"); Chee

Re: Client authentication using Certificate chain.

2008-03-13 Thread kalyan janakiram
Hi Ma'm, I am a faculty in an Engg. College, AP. I need to teach my students abt OpenSSL. Can u help me with appropriate material and simple C programs to work on Windows. regards, kalyan On 3/13/08, Bhat, Jayalakshmi Manjunath <[EMAIL PROTECTED]> wrote: > > Hi All, > > If client authenticatio

Re: client authentication

2005-09-22 Thread Bernhard Froehlich
Frans Gunawan wrote: Hello, How to test client auth with the "openssl s_server" and "openssl s_client" to show that the authentication is using the client auth. Thank you, Frans Quoted from s_server-manpage (http://www.openssl.org/docs/apps/s_server.html): * **-verify depth*, *-Verify

Re: Client authentication problem

2005-07-14 Thread Gayathri Sundar
Hey can you try setting verify depth to Zero and not pointing to any CA cert i.e SSLCACertificatePath pointing to null? Thanks --Gayathri > Hi Again., > > This is what I found from the "log" file you sent..is this pointing to the > same CA cert "itcilo-ca.crt, I put it in ssl.crt" ? > > debug] ss

Re: Client authentication problem

2005-07-14 Thread Gayathri Sundar
Hi Again., This is what I found from the "log" file you sent..is this pointing to the same CA cert "itcilo-ca.crt, I put it in ssl.crt" ? debug] ssl_engine_init.c(1112): CA certificate: /C=IT/ST=Piemonte/L=Turin/O=ITCILO/OU=MIS/CN=ITCILO CA/[EMAIL PROTECTED] [Wed Jul 13 11:48:34 2005] [debug] ssl

Re: Client authentication problem

2005-07-13 Thread Gayathri Sundar
Hi. Have you imported the CA of the client cert on the server side? A verify depth of 1 has been set, which could mean that the client cert is self signed? Can you set it to some higher value and try? Also can you check whether the option "SSL_VERIFY_FAIL_IF_NO_PEER_CERT"? It looks to me a defini

Re: Client authentication problem

2005-07-13 Thread Gaël Lams
> The above indicates that. Make sure client cert > processing is done correctly on the server side. If it > is a program failure, then you need to get the > programmer to debug the program. > Thank you for your answer. I'm not sure what you intend with "program failure": the pages served by th

Re: Client authentication problem

2005-07-12 Thread Lincoln
Looks to me that client authentication failed. And this is most likely due to client cert processing on the server side: [notice] child pid 9192 exit signal Segmentation fault (11) The above indicates that. Make sure client cert processing is done correctly on the server side. If it is a progr

Re: Client Authentication

2005-04-18 Thread Joseph Bruni
On the Mac, you'll load your client certificate into your users' keychains. On Windows, you'll load it into the certificate store. In either case, simply having the user double-click on the certificate file will launch the appropriate tool. On Apr 18, 2005, at 9:17 PM, [EMAIL PROTECTED] wrote:

Re: Client Authentication

2005-04-18 Thread [EMAIL PROTECTED]
Hi Apart from Mac clients I also windows users. Regards and Thanks Mahesh S Kudva __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org

Re: Client Authentication

2005-04-18 Thread Joseph Bruni
This would be a feature of Safari rather than OpenSSL. I'm pretty sure that recent versions of Safari can do authentication using certs, but I'm not sure how to do it. You can try posting you question to one of Apple's lists. http://lists.apple.com/ On Apr 18, 2005, at 1:46 AM, [EMAIL PROTECTE

Re: Client Authentication and Private Key

2005-01-18 Thread Ken Goldman
Intuitively, you have to know that the client needs it's private key for something. Since the public key certificate is public, it alone can't prove that the client is you. Anyone can send your certificate to a server, right? In practice, the server walks the certificate chain, which proves that

Re: Client Authentication and Private Key

2005-01-18 Thread Chris Covell
As I understand it, the client signs data sent from the server in order to authenticate itself. Therefore yes it does need its private key. On Tue, 18 Jan 2005 11:17:01 +, Shaun Lipscombe <[EMAIL PROTECTED]> wrote: > > If the client sends the server its certificate (public key) and the > ser

Re: Client Authentication with Openssl - Apache - errror -12227

2004-02-24 Thread Bo Boe
Oeps there we do have some kind of a problem the response to: openssl s_client -connect www.bliek.org:443 -prexit Looks like: CONNECTED(0003) depth=0 /C=UK/ST=MyTown/L=Mylocation/O=mydomain.com/OU=Security/CN=www.mydomain.com/[EMAIL PROTECTED] verify error:num=18:self signed certificate veri

Re: Client Authentication with Openssl - Apache - errror -12227

2004-02-24 Thread Dr. Stephen Henson
On Tue, Feb 24, 2004, Bo Boe wrote: > My mozilla browser (version 1.6) returns the error. > When I install the client certificate in iexplorer > (version 6.0) I get a pop-up window asking me to > select a client certificate from an empty list. > > By the way I just tried to make the certificates

Re: Client Authentication with Openssl - Apache - errror -12227

2004-02-24 Thread Bo Boe
My mozilla browser (version 1.6) returns the error. When I install the client certificate in iexplorer (version 6.0) I get a pop-up window asking me to select a client certificate from an empty list. By the way I just tried to make the certificates as explained in the ssl cookbook on http://www.p

RE: Client Authentication with Openssl - Apache - errror -12227

2004-02-24 Thread Schoneman, Mark
I’ve only seen this error when in the SSL process the client is attempting to sign with the private key and errors out. This was with openssl and non-openssl certificates.       Mark S   -Original Message- From: Bo Boe [ma

Re: Client Authentication with IIS 5.0

2003-10-22 Thread Bernhard Froehlich
ES-SE wrote: [...] Hi Ted, thanx for your answer, but that doesn`t be the problem. If I uninstall the root certificate of verisign, I also kann connect and IE presents the verisign client certificate. My own root certificate, with which I signed the client certificate is valid till 2010 and instal

Re: Client authentication

2003-01-28 Thread Lutz Jaenicke
On Tue, Jan 28, 2003 at 11:38:25AM +0530, Chandrasekhar R S wrote: > In my server program, I use SSL_CTX_set_verity(ctx, SSL_VERIFY_PEER | > SSL_VERIFY_FAIL_IF_NO_PEER_CERT,0) to mandate that client cert should be > present. > If present, I use SSL_get_peer_certificate(ssl) to retrieve the client c

Re: Client Authentication Problem

2001-09-27 Thread Götz Babin-Ebell
Eric Rescorla wrote: > > Götz Babin-Ebell <[EMAIL PROTECTED]> writes: > > And how gets he the connection IP-Address <-> FQDN ? > > ->He uses DNS. > I think you need to reread his message since that's not > what he says. Hm: client authentication. After a successful SSL_accept() I have some lo

Re: Client Authentication Problem

2001-09-26 Thread David Schwartz
On Wed, 26 Sep 2001 15:21:09 -0700, Michael Sierchio wrote: >David Schwartz wrote: >> Sufficient for what? I may not want to send my credit card >>information to anyone who has a Verisign certificate, but I might be >>willing to send it to someone who has a Verisign certificate for >>'www.

Re: Client Authentication Problem

2001-09-26 Thread Michael Sierchio
David Schwartz wrote: > Sufficient for what? I may not want to send my credit card information to > anyone who has a Verisign certificate, but I might be willing to send it to > someone who has a Verisign certificate for 'www.amazon.com' or has that > listed as one of the alternate names.

Re: Client Authentication Problem

2001-09-26 Thread Götz Babin-Ebell
Don Zick wrote: Hello Don, > I'm not actually using DNS at all. For the application I'm working with > the TLS clients and servers must be statically configured with a Fully > Qualified Domain Name. I match up the statically configured FQDN for a > client with the DNS name from the client's ce

Re: Client Authentication Problem

2001-09-26 Thread David Schwartz
On Wed, 26 Sep 2001 09:43:02 -0700, Michael Sierchio wrote: >Don Zick wrote: >> I have recently started using OpenSSL. (I have found the "SSL and TLS" >>book by Eric Rescorla to be invaluable.) I am having a problem with >>client authentication. After a successful SSL_accept() I have some lo

Re: Client Authentication Problem

2001-09-26 Thread Eric Rescorla
Götz Babin-Ebell <[EMAIL PROTECTED]> writes: > And how gets he the connection IP-Address <-> FQDN ? > ->He uses DNS. I think you need to reread his message since that's not what he says. > If he wants to allow user XYZ presenting certificate C_XYZ to > do some things, all he has to do is look in

Re: Client Authentication Problem

2001-09-26 Thread Eric Rescorla
Michael Sierchio <[EMAIL PROTECTED]> writes: > Eric Rescorla wrote: > > > There are a number of situations where one wishes to authenticate > > clients based on their DNS names: > > > > (1) SMTP/TLS. > > (2) Secure remote backup. > > > > In such cases the clients often (though not always) have

Re: Client Authentication Problem

2001-09-26 Thread Götz Babin-Ebell
Eric Rescorla wrote: > > Götz Babin-Ebell <[EMAIL PROTECTED]> writes: > > > [1 ] > > Don Zick wrote: > > > > Hello Don, > > > > > I'm not actually using DNS at all. For the application I'm working with > > > the TLS clients and servers must be statically configured with a Fully > > > Qualified

Re: Client Authentication Problem

2001-09-26 Thread Michael Sierchio
Eric Rescorla wrote: > There are a number of situations where one wishes to authenticate > clients based on their DNS names: > > (1) SMTP/TLS. > (2) Secure remote backup. > > In such cases the clients often (though not always) have fixed IPs. Well, I'll be happy when IPv6 is ubiquitous (coming

Re: Client authentication

2001-04-24 Thread Lutz Jaenicke
On Tue, Apr 24, 2001 at 03:41:58PM +0200, Peter Lindsäth wrote: > Well, now there seems to be a problem making a intermediate CA using the self signed > CA. > I've been trying some different approaches but I don't seem to get it right. The most > commonly proposed method, in the mail-archive, woul

Re: Client authentication

2001-04-24 Thread Peter Lindsäth
Lutz Jaenicke wrote: > On Tue, Apr 24, 2001 at 12:27:28PM +0200, Peter Lindsäth wrote: > > I have the following certificates: > > > > root.cert - self signed CA > > node1root.cert - issued by root > > node2root.cert - issued by root > > daemon.cert - issued by node1root > > client1.cert - issued

Re: Client authentication

2001-04-24 Thread Lutz Jaenicke
On Tue, Apr 24, 2001 at 12:27:28PM +0200, Peter Lindsäth wrote: > I have the following certificates: > > root.cert - self signed CA > node1root.cert - issued by root > node2root.cert - issued by root > daemon.cert - issued by node1root > client1.cert - issued by node2root > > I have an SSL serve

Re: Client Authentication Windows NT

2001-04-06 Thread Oliver Bode
Thanks, I'm sure this will sort it out. It's the same problem we've experienced. Tell me on Win2000 and NT can you have client authentication that will check multiple root certificates? Oliver > Have a look in the archive: > http://marc.theaimsgroup.com/?l=openssl-users > > under the author 'Da

RE: Client Authentication Windows NT

2001-04-06 Thread Dale Peakall
Have a look in the archive: http://marc.theaimsgroup.com/?l=openssl-users under the author 'Dale Peakall' and look for the subject 'Client Auth in IE'. - Dale. __ OpenSSL Project http://w

RE: Client Authentication Windows NT

2001-04-05 Thread Toonstra, Gerard
Hi Oliver, You need to install the CA certificate on the webserver as well, but not in the normal registry location. It needs to be installed in the Local Machine folder of the "Trusted Root" or "Intermediate" folder. You can do this following the normal GUI, but selecting the Certificate Locati

Re: client authentication

2001-02-11 Thread dm
Hi, I used the following command to generate the client cert in PKCS12 format. And the browsers (IE55, Nav 4.08)accepted it and the server seem to authenticate the client. Is it possible that with PKCS12 the private key gets embedded into the file and that is how the browsers get it? Command: p

Re: Client authentication

2000-10-02 Thread Carlos Serrao
ISCTE - Av.Forcas Armadas 1600-082 LISBOA Portugal Tel.: +351217903064/+351217903901 Fax:  +351217935300     - Original Message - From: Robert Sandilands To: [EMAIL PROTECTED] Sent: Monday, October 02, 2000 9:29 AM Subject: Re: Client aut

Re: Client authentication

2000-10-02 Thread Robert Sandilands
Look at http://www.aquasecurity.com/protect/other/sslcli.cpp and http://www.aquasecurity.com/protect/other/sslsrv.cpp Robert Sandilands > Carlos Serrao wrote: > > Hi all, > > can someone provide me with a good example how to handle client > authentication on a SSL connection. I've already take

RE: client authentication

2000-08-16 Thread Hua Wu
option, SSL_OP_NETSCAPE_CA_DN_BUG. But I don't understand why? Hua -Original Message- From: Peter Kim [mailto:[EMAIL PROTECTED]] Sent: Tuesday, August 15, 2000 2:16 PM To: [EMAIL PROTECTED] Subject: Re: client authentication > Hi, friends, > > I try to add the client authentication into a clien

Re: client authentication

2000-08-15 Thread Peter Kim
> Hi, friends, > > I try to add the client authentication into a client application. > Two problems block me. > > 1. It is not allowed to use DER type files in SSL_CTX_use_PrivateKey_file. > It only accepts PEM files. > SSL_CTX_use_PrivateKey_ASN1(..) should accept a DER-encoded private key file.

Re: ATT: Robert Sandilands! (was Re: client authentication)

2000-08-01 Thread Vadim Fedukovich
Hi Albert, On Mon, 31 Jul 2000, Albert Serra wrote: > > a) The functions with "verify" in them is there to tell the server or > client where the public keys and the CA's public keys are for verifying > the other's keys. Those keys and the symbolic links associated with them > is pretty important

Re: Client Authentication!!! - help

2000-07-06 Thread Albert Serra
Hi, I don't understand your verify callback, I have used it and when my program worked, with your verify_callback not. Can you explain to me how works or why you use it? thanks   Shrikrishna Karandikar wrote: Hi,   I have been following the email exchanges regarding client certificate verificatio

Re: ATT: Robert Sandilands! (was Re: client authentication)

2000-06-30 Thread Robert Sandilands
I tested it under RedHat Linux 6.2 and Windows 9x. It worked for me :-} The RAND_??? functions is to make sure that there is a sufficients source of random numbers for generating the random session keys for SSL. The functions with "verify" in them is there to tell the server or client where the p

Re: ATT: Robert Sandilands! (was Re: client authentication)

2000-06-30 Thread Albert Serra
Does it work? Because what exact commands do you have to add if you want client authentication on serv.cpp and cli.cpp? I have tried it following the code I have found on sslcli.cpp and sslsrv.cpp and it doen't work. If somenone wants to help me, (I work on a Sun WS) , what is the mean of RAND_lo

Re: client authentication

2000-06-29 Thread Lutz Jaenicke
On Thu, Jun 29, 2000 at 11:52:54AM +0200, Albert Serra wrote: > Sorry, this mail will be long with a C code program attached. If you > don't want to read, it dooesn't matter, but if somebody want to help me > and read it and try to solve my problem, tkank you in advance. > > The question is: as

Re: client authentication

2000-06-28 Thread raggi
ubject:        Re: client authentication sorry for my english Albert Serra wrote: I'm modifying cli.cpp and serv.cpp to get client authentication. So I do it in the same way like server authentication but it doesn't work. Does somebody know how to get it? Ideas? Is there any espacial and im

Re: client authentication

2000-06-28 Thread Albert Serra
sorry for my english Albert Serra wrote: I'm modifying cli.cpp and serv.cpp to get client authentication. So I do it in the same way like server authentication but it doesn't work. Does somebody know how to get it? Ideas? Is there any espacial and important function that I can have forgotten? tha

Re: Client Authentication??

2000-04-29 Thread Gregory Stark
, Inc. [EMAIL PROTECTED] - Original Message - From: "Al Shaver" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, April 28, 2000 10:01 AM Subject: Re: Client Authentication?? > Michael - > > It's true that a cert won't function unles

Re: Client Authentication??

2000-04-28 Thread Al Shaver
Michael - It's true that a cert won't function unless the cert holder also has the corresponding private key, but the ongoing discussion about these certs was assuming that the owner of the private/public key pair would distribute everything (cert, BOTH keys, etc) to other parties. Several respo

RE: Client Authentication??

2000-04-25 Thread Al Shaver
multiple computer > (work/home) then this method wouldn't work... > > Any ideas? > Thanx, >brian > > > -Original Message- > > From: Al Shaver [mailto:[EMAIL PROTECTED]] > > Sent: Monday, April 24, 2000 10:59 PM > > To: [EMAIL PROTECTED

Re: Client Authentication??

2000-04-25 Thread Thomas Reinke
Hi Brian, I believe the security relies on the fact that you DON'T share the keys with your friends. Based on subsequent posts, let me clarify that for a certificate to be useful, there is both the private key and the public key. Verisign doesn't just "give" you a file. When you begin the certif

Re: Client Authentication??

2000-04-25 Thread Lutz Jaenicke
On Tue, Apr 25, 2000 at 10:25:01AM -0400, Brian Snyder wrote: > Al and others, > > Hi. Thanx for your response. I realize that gives an extra level of > security from the **SERVER** side. > What I am specifically referring to is the **client** authorization allowed > with SSL3.0 If you look at

RE: Client Authentication??

2000-04-25 Thread Brian Snyder
r [mailto:[EMAIL PROTECTED]] > Sent: Monday, April 24, 2000 10:59 PM > To: [EMAIL PROTECTED] > Subject: Re: Client Authentication?? > > > Brian, > > You're correct in that the certificate is just a file > - however, it's a file with certain information > encrypted

Re: Client Authentication??

2000-04-24 Thread Al Shaver
Brian, You're correct in that the certificate is just a file - however, it's a file with certain information encrypted into it that identifies the common name of the server that will be using it. For example, if Acme Corporation applies for and is issued a certificate, they must supply the server

Re: client authentication (SSL_CTX_set_verify)

1999-11-17 Thread Pinca George
- Original Message - From: Bodo Moeller <[EMAIL PROTECTED]> To: Claus Assmann <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Wednesday, November 17, 1999 9:37 AM Subject: Re: client authentication (SSL_CTX_set_verify) > On Tue, Nov 16, 1999 at 08:08:21PM -0800

Re: client authentication (SSL_CTX_set_verify)

1999-11-17 Thread Bodo Moeller
On Tue, Nov 16, 1999 at 08:08:21PM -0800, Claus Assmann wrote: > Thanks for the notification. A related question: > If the callback always returns 1, does > SSL_get_verify_result() > nevertheless return the correct value? > i.e., X509_V_OK iff the certificate could be verified? Yes, if the appli

Re: client authentication (SSL_CTX_set_verify)

1999-11-16 Thread Claus Assmann
On Tue, Nov 16, 1999, Bodo Moeller wrote: > On Sun, Aug 08, 1999 at 03:05:26PM +, Bodo Moeller wrote: > > Claus Assmann <[EMAIL PROTECTED]>: > >> how do I correctly set the verify_mode? Reading the code, > >> SSL_VERIFY_CLIENT_ONCE and SSL_VERIFY_PEER seem to be useful for > >> my purpose (tr

Re: client authentication (SSL_CTX_set_verify)

1999-11-16 Thread Bodo Moeller
On Sun, Aug 08, 1999 at 03:05:26PM +, Bodo Moeller wrote: > Claus Assmann <[EMAIL PROTECTED]>: [...] >> how do I correctly set the verify_mode? Reading the code, >> SSL_VERIFY_CLIENT_ONCE and SSL_VERIFY_PEER seem to be useful for >> my purpose (try to verify the client, but don't fail). [...]

Re: client authentication (SSL_CTX_set_verify)

1999-08-09 Thread Bodo Moeller
On Sun, Aug 08, 1999 at 06:24:04PM -0700, Claus Assmann wrote: > I use some slightly different code > than your example which worked for my tests: > > init: > SSL_CTX_set_verify(ctx, SSL_VERIFY_CLIENT_ONCE | SSL_VERIFY_PEER, verify_cb); > > static int verify_cb(int

Re: client authentication (SSL_CTX_set_verify)

1999-08-08 Thread Claus Assmann
On Sun, Aug 08, 1999, Bodo Moeller wrote: > Claus Assmann <[EMAIL PROTECTED]>: > >>> Question: is there some simple way to find out whether the client > >>> has been authenticated? I registered a callback with SSL_CTX_set_verify, > >>> but I don't completely understand it... Thanks again for you

Re: client authentication (SSL_CTX_set_verify)

1999-08-08 Thread Bodo Moeller
Bodo Moeller <[EMAIL PROTECTED]>: [...] > SSL_CTX_set_cert_verify_callback takes two arguments, the second of > which is never used. Obviously the idea was the second one would be > passed to the callback -- this will likely be done so in OpenSSL > 0.9.5. All your callback has to do is call X50

Re: client authentication (SSL_CTX_set_verify)

1999-08-08 Thread Bodo Moeller
Claus Assmann <[EMAIL PROTECTED]>: >>> Question: is there some simple way to find out whether the client >>> has been authenticated? I registered a callback with SSL_CTX_set_verify, >>> but I don't completely understand it... >> Do you have to use a callback? You can use SSL_get_verify_result >

Re: client authentication (SSL_CTX_set_verify)

1999-08-06 Thread Bodo Moeller
On Thu, Aug 05, 1999 at 01:28:56PM -0700, Claus Assmann wrote: > Question: is there some simple way to find out whether the client > has been authenticated? I registered a callback with SSL_CTX_set_verify, > but I don't completely understand it... Do you have to use a callback? You can use SSL_