Re: client certificate error

2021-07-01 Thread Jan Just Keijser
Hi, On 30/06/21 15:22, Paulo Wollny wrote: Hi, thank you for the answer. can you please point the right direction for solution, please? try  http://httpd.apache.org/userslist.html Regarding the "look suspicious - it means your client is connecting from 127.0.0.1 and your server is also li

Re: client certificate error

2021-06-30 Thread Paulo Wollny
nSSL 1.1.1f  31 Mar 2020 Ubuntu 20.04 Server version: Apache/2.4.41 (Ubuntu) Server built:   2021-06-17T18:27:53 My problem: connecting to a secure server requiring client certificate, i get the following error when presenting my certificate: ERR_BAD_SSL_CLIENT_AUTH_CERT It started to

Re: client certificate error

2021-06-30 Thread Jan Just Keijser
Hi, On 30/06/21 00:23, Paulo Wollny wrote: Dear @ll My environment: OpenSSL 1.1.1f  31 Mar 2020 Ubuntu 20.04 Server version: Apache/2.4.41 (Ubuntu) Server built:   2021-06-17T18:27:53 My problem: connecting to a secure server requiring client certificate, i get the following error when

client certificate error

2021-06-29 Thread Paulo Wollny
Dear @ll My environment: OpenSSL 1.1.1f 31 Mar 2020 Ubuntu 20.04 Server version: Apache/2.4.41 (Ubuntu) Server built: 2021-06-17T18:27:53 My problem: connecting to a secure server requiring client certificate, i get the following error when presenting my certificate

Re: Creating an X25519 client certificate

2021-03-18 Thread Robert Moskowitz
On 3/17/21 9:48 PM, tincanteksup wrote: On 18/03/2021 01:22, Robert Moskowitz wrote: On 3/17/21 8:17 PM, Viktor Dukhovni wrote: Well, CSRs are self-signed, and X25519 does not support signing, so you CANNOT have an X25519 CSR. Slap myself on the forehead Of course I know that.  Bu

Re: Creating an X25519 client certificate

2021-03-17 Thread tincanteksup
On 18/03/2021 01:22, Robert Moskowitz wrote: On 3/17/21 8:17 PM, Viktor Dukhovni wrote: Well, CSRs are self-signed, and X25519 does not support signing, so you CANNOT have an X25519 CSR. Slap myself on the forehead Of course I know that.  But did not stop to think this through.   :(

Re: Creating an X25519 client certificate

2021-03-17 Thread Robert Moskowitz
On 3/17/21 8:17 PM, Viktor Dukhovni wrote: On Wed, Mar 17, 2021 at 07:44:05PM -0400, Robert Moskowitz wrote: I have created my X25519 pub/priv keypair with: openssl genpkey -algorithm X25519\     -out $dir/private/$clientemail-X.key.$format Are you sure you didn't want ed25519 instead?

Re: Creating an X25519 client certificate

2021-03-17 Thread Viktor Dukhovni
On Wed, Mar 17, 2021 at 07:44:05PM -0400, Robert Moskowitz wrote: > >> I have created my X25519 pub/priv keypair with: > >> > >> openssl genpkey -algorithm X25519\ > >>     -out $dir/private/$clientemail-X.key.$format > > > Are you sure you didn't want ed25519 instead? X25519 is a key agreement

Re: Creating an X25519 client certificate

2021-03-17 Thread Robert Moskowitz
On 3/17/21 7:22 PM, Viktor Dukhovni wrote: On Wed, Mar 17, 2021 at 05:50:41PM -0400, Robert Moskowitz wrote: I have created my X25519 pub/priv keypair with: openssl genpkey -algorithm X25519\     -out $dir/private/$clientemail-X.key.$format Are you sure you didn't want ed25519 instead?

Re: Creating an X25519 client certificate

2021-03-17 Thread Viktor Dukhovni
On Wed, Mar 17, 2021 at 05:50:41PM -0400, Robert Moskowitz wrote: > I have created my X25519 pub/priv keypair with: > > openssl genpkey -algorithm X25519\ >     -out $dir/private/$clientemail-X.key.$format Are you sure you didn't want ed25519 instead? X25519 is a key agreement menthod, not a s

Creating an X25519 client certificate

2021-03-17 Thread Robert Moskowitz
I have created my X25519 pub/priv keypair with: openssl genpkey -algorithm X25519\     -out $dir/private/$clientemail-X.key.$format And displays properly with: openssl pkey -in $dir/private/$clientemail-X.key.$format -text -noout So now to make the csr with: openssl req -config $dir/openssl-

Re: Client certificate authentication

2021-03-15 Thread Robert Ionescu
Hmm ok I get it. So, to be able to get the fingerprint for the used certificates during a TLS handshake is possible by using the SSL_set_verify callbacks in the application or is the mentioned postfix useful for this purpose? _

Re: Client certificate authentication

2021-03-15 Thread Viktor Dukhovni
On Mon, Mar 15, 2021 at 12:23:54PM +0100, Robert Ionescu wrote: > I already found the callbacks for the verification process and I am > still trying to figure it out if it is possible to change them in a > way that they will print some certificate information to determine > which certificate was u

Re: Client certificate authentication

2021-03-15 Thread Robert Ionescu
I already found the callbacks for the verification process and I am still trying to figure it out if it is possible to change them in a way that they will print some certificate information to determine which certificate was used?

Re: Client certificate authentication

2021-03-12 Thread Viktor Dukhovni
On Fri, Mar 12, 2021 at 09:06:57AM +0100, Robert Ionescu wrote: > With "wrong" certificate I meant "invalid certificate". So the idea > was in a bigger environment with a lot of certificates, to make the > invalid certificate debugging easier by getting more information from > openssl to identify

Re: Client certificate authentication

2021-03-12 Thread Robert Ionescu
Thu, Mar 11, 2021 at 8:40 PM Michael Wojcik < michael.woj...@microfocus.com> wrote: > > From: openssl-users On Behalf Of > Viktor > > Dukhovni > > Sent: Thursday, 11 March, 2021 10:39 > > To: openssl-users@openssl.org > > Subject: Re: Client certificate a

RE: Client certificate authentication

2021-03-11 Thread Michael Wojcik
> From: openssl-users On Behalf Of Viktor > Dukhovni > Sent: Thursday, 11 March, 2021 10:39 > To: openssl-users@openssl.org > Subject: Re: Client certificate authentication > > > On Mar 11, 2021, at 2:16 PM, Robert Ionescu > wrote: > > > > I am searchi

Re: Client certificate authentication

2021-03-11 Thread Kyle Hamilton
If he's trying to muck with the library, he's probably struggling with a precompiled binary he doesn't have the source code to. -Kyle H On Thu, Mar 11, 2021, 11:48 Viktor Dukhovni wrote: > > On Mar 11, 2021, at 2:16 PM, Robert Ionescu > wrote: > > > > I am searching for the functions in openss

Re: Client certificate authentication

2021-03-11 Thread Viktor Dukhovni
> On Mar 11, 2021, at 2:16 PM, Robert Ionescu > wrote: > > I am searching for the functions in openssl used to verify the clients > certificate when using mutual authentication. The same code verifies peer certificate chains, whether client or server. > My intention is to find a way to log a w

Client certificate authentication

2021-03-11 Thread Robert Ionescu
Hi, I am searching for the functions in openssl used to verify the clients certificate when using mutual authentication. My intention is to find a way to log a wrong user certificate directly inside the openssl source. Any help would be highly appreciated _

RE: Client-Certificate blocking without conrolling the issuing CA

2020-12-04 Thread Michael Wojcik
your control, and then generated a CRL for the ones you want to exclude. Or actually you could just cross-sign only the ones you want to allow, and made your CA the only trust root for the TLS termination systems; that would work. But I'm guessing modifying every client certificate is n

AW: Client-Certificate blocking without conrolling the issuing CA

2020-12-04 Thread Vincent Truchsess - rockenstein AG
_ Von: openssl-users im Auftrag von Michael Wojcik Gesendet: Freitag, 4. Dezember 2020 15:07:02 An: openssl-users@openssl.org Betreff: RE: Client-Certificate blocking without conrolling the issuing CA > From: openssl-users On Behalf Of Vincent > Truchsess - rockenstein AG > Sent: Frid

RE: Client-Certificate blocking without conrolling the issuing CA

2020-12-04 Thread Michael Wojcik
> From: openssl-users On Behalf Of Vincent > Truchsess - rockenstein AG > Sent: Friday, 4 December, 2020 04:27 > > The organization legally responsible for the application maintains a > blocklist of certificate serials they consider to be invalidated. Also, this > organization does not bother to g

Client-Certificate blocking without conrolling the issuing CA

2020-12-04 Thread Vincent Truchsess - rockenstein AG
Hi, I am well aware that the usecase I'm going to describe is not how pki is intended to be implemented but unfortunally, the organizational architecture of ths particular application is out of my teach. We are operating an application that strongly relies on client certificates as the outer a

Re: Deleted client certificate trust expectations

2020-11-11 Thread Dan Freed
Thanks for the help. This got me on the right track. -Dan From: openssl-users Date: Wednesday, November 11, 2020 at 12:02 PM To: openssl-users@openssl.org Subject: Re: Deleted client certificate trust expectations External Mail. Careful of links / attachments. Submit Helpdesk if unsure. On

Re: Deleted client certificate trust expectations

2020-11-11 Thread Viktor Dukhovni
On Wed, Nov 11, 2020 at 04:28:40PM +, Dan Freed wrote: > I have a question/issue about how OpenSSL should handle a deleted > client certificate. It appears that once a trusted certificate is read > from the filesystem, it remains trusted throughout the lifespan of the > server p

Re: Deleted client certificate trust expectations

2020-11-11 Thread Jordan Brown
What you observe is indeed reality; we ran into it too.  (Though we ran into it in the context of a long-running client verifying server certificates.) My assumption is that it's for performance, and that's sensible, but it would sure be nice to figure out how to detect those changes.  If a stat()

Re: Deleted client certificate trust expectations

2020-11-11 Thread Dan Freed
Sorry I realized I didn't include the OpenSSL version I was using. This is with OpenSSL 1.1.1d 10 Sep 2019. -Dan From: openssl-users Date: Wednesday, November 11, 2020 at 10:29 AM To: openssl-users@openssl.org Subject: Deleted client certificate trust expectations External Mail. Caref

Deleted client certificate trust expectations

2020-11-11 Thread Dan Freed
Hello, I have a question/issue about how OpenSSL should handle a deleted client certificate. It appears that once a trusted certificate is read from the filesystem, it remains trusted throughout the lifespan of the server process. I wrote a small SSL web service that reproduces the issue I&#

Re: TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Jakob Bohm via openssl-users
/AKID ... Presumably a check for proper KU on the client certificate would be bypassed if the client cert is v1 - but then using a v1 certificate is another violation of RFC 5246 (7.4.2) that OpenSSL probably should not enforce. Yes, v1 certs would get a free ride. The reason to enforce KU in client certs

Re: TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Michael Richardson
Viktor Dukhovni wrote: > Yes, v1 certs would get a free ride. The reason to enforce KU > in client certs would be that client certs are not infrequently > (though not always) optional, and it can be better to not send > any client cert, than to send one the server will reject. 8

Re: TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Viktor Dukhovni
ck for proper KU on the > client certificate would be bypassed if the client cert is v1 - but then > using a v1 certificate is another violation of RFC 5246 (7.4.2) that OpenSSL > probably should not enforce. Yes, v1 certs would get a free ride. The reason to enforce KU in client certs wo

RE: TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of > Viktor Dukhovni > Sent: Tuesday, June 11, 2019 10:39 > A client certificate that cannot do digital signatures is not much use. There may be existing applications which use TLS entirely within an organiz

Re: TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Viktor Dukhovni
That said, the intention isn't to ignore all the requirements, just some of those that are not always a good idea to enforce, and perhaps should never have been mandated in the first place. Therefore, while we leave enforcing the certificate signature algorithms to the peer, enforcing keyUsa

RE: TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of > Jakob Bohm via openssl-users > Sent: Tuesday, June 11, 2019 08:19 > > On 11/06/2019 12:50, Hareesh D wrote: > > > > Is this behavior valid and according to RFC ? > > There's an overarching OpenSSL policy that certificat

Re: TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Jakob Bohm via openssl-users
On 11/06/2019 12:50, Hareesh D wrote: TLSv12 client is sending RSA certificate even when it dont have digitalSignature bit in keyUsage extension. But RFC5246 sectiin-7.4.6 says its MUST condition for client to send RSA certificate with digitalSignature bit set in keyUsage extension. 1. Though

TLSv12 Client Certificate Selection Behavior !!

2019-06-11 Thread Hareesh D
TLSv12 client is sending RSA certificate even when it dont have digitalSignature bit in keyUsage extension. But RFC5246 sectiin-7.4.6 says its MUST condition for client to send RSA certificate with digitalSignature bit set in keyUsage extension. 1. Though server is rejecting such certificates, not

Re: [openssl-users] 'No client certificate CA names sent'

2017-01-31 Thread Viktor Dukhovni
On Tue, Jan 31, 2017 at 08:07:16AM -0700, russellb...@gmail.com wrote: > It was on the client side. I'm running sendmail as a client > to relay mail that originates on my computer through gmail. Gmail's SMTP server, correctly, does not suggest any preferred client CAs. > When I > request

Re: [openssl-users] 'No client certificate CA names sent'

2017-01-31 Thread russellbell
Quoth Mr Benjamin Kaduk: 'That's generally the default server behavior when no CAs are configured for that purpose. But, (1) I thought you were looking at the client side, and (2) how to configure the server depends on what software is used on the server, so there's not much more

Re: [openssl-users] 'No client certificate CA names sent'

2017-01-30 Thread Viktor Dukhovni
> On Jan 30, 2017, at 11:44 AM, russellb...@gmail.com wrote: > >> it is often wise to send an empty list when requesting client certificates. > > How does one send an empty list? https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_set_client_CA_list.html Just pass a NULL stack. -- Vikt

Re: [openssl-users] 'No client certificate CA names sent'

2017-01-30 Thread Benjamin Kaduk via openssl-users
On 01/30/2017 10:44 AM, russellb...@gmail.com wrote: > Quoth Mr Viktor Dukhovni, 'it is often wise to send an empty > list when requesting client certificates.' > How does one send an empty list? > That's generally the default server behavior when no CAs are configured for that purpose

Re: [openssl-users] 'No client certificate CA names sent'

2017-01-30 Thread russellbell
Quoth Mr Viktor Dukhovni, 'it is often wise to send an empty list when requesting client certificates.' How does one send an empty list? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] 'No client certificate CA names sent'

2017-01-29 Thread Viktor Dukhovni
> On Jan 29, 2017, at 11:34 AM, russellb...@gmail.com wrote: > > What does this message mean? That I failed to send a client > certificate CA name? That I failed to receive one? I run > > $ openssl s_client -certform gmail.pem -key gmail.key \ > -CAfile cacert.

[openssl-users] 'No client certificate CA names sent'

2017-01-29 Thread russellbell
I apologize if you've answered this question before. I've read some of the answers I've found in the archives but I don't understand them. What does this message mean? That I failed to send a client certificate CA name? That I failed to receive

Re: [openssl-users] Is it possible to add a Client Hostname to an SSL Client Certificate?

2015-04-30 Thread Michael Ströder
Alexandre Arantes wrote: one of them asked me why did I choose not to add the client hostname to the Client Certificate, thus making it usable only by that specific client. There are no standardized naming rules for client certs like the TLS server hostname check implemented at the client

Re: [openssl-users] Is it possible to add a Client Hostname to an SSL Client Certificate?

2015-04-29 Thread Salz, Rich
> But once I showed my work to people in my company, one of them asked me why > did I choose not to add the client hostname to the Client Certificate, thus > making it usable only by that specific client. You put to put the client name or ipaddr in the subjectAltName extension fiel

[openssl-users] Is it possible to add a Client Hostname to an SSL Client Certificate?

2015-04-29 Thread Alexandre Arantes
, testing my "proof-of-concept" has shown that if one of the pieces is missing from the equation (CA, Server, Client certificates), the communication ceases. But once I showed my work to people in my company, one of them asked me why did I choose not to add the client hostname to the Client C

Re: [openssl-users] Client certificate

2015-01-16 Thread Bernhard Fröhlich
. I have set my custom verify callback and now I can verify client certificate chain in my own way. But can I get the client certificate after handshake? Where is it located in SSL or SSL_CTX structs? I must get this on SSL_read/SSL_write methods level Maybe you're lookin

[openssl-users] Client certificate

2015-01-16 Thread Vladimir Zatsepin
verify client certificate chain in my own way. But can I get the client certificate after handshake? Where is it located in SSL or SSL_CTX structs? I must get this on SSL_read/SSL_write methods level ___ openssl-users mailing list To unsubscribe: https

Re: External client certificate signature function

2014-10-15 Thread Dr. Stephen Henson
On Wed, Oct 15, 2014, Fredrik Jansson wrote: > I just realised I can create a RSA_METHOD object and set that in my engine. > > But what about ECDSA_ENGINE? > > There is no struct definition available in the public headers, and no > public functions to change the members of the struct, e.g. set a

Re: External client certificate signature function

2014-10-15 Thread Fredrik Jansson
I just realised I can create a RSA_METHOD object and set that in my engine. But what about ECDSA_ENGINE? There is no struct definition available in the public headers, and no public functions to change the members of the struct, e.g. set a new signing function. Is this not possible with ECDSA?

Re: External client certificate signature function

2014-10-15 Thread Fredrik Jansson
Hi Steve! I will try to take that path, thank you! //Fredrik On Mon, Oct 13, 2014 at 6:08 PM, Dr. Stephen Henson wrote: > On Mon, Oct 13, 2014, Fredrik Jansson wrote: > >> Hi! >> >> I have a device where I cannot access the client certificate's private >> key directly, but have access to veri

Re: External client certificate signature function

2014-10-13 Thread Dr. Stephen Henson
On Mon, Oct 13, 2014, Fredrik Jansson wrote: > Hi! > > I have a device where I cannot access the client certificate's private > key directly, but have access to verification and signature functions. > > The certificate, in DER format, is accessible. > > I need to use client certificates in my T

External client certificate signature function

2014-10-13 Thread Fredrik Jansson
Hi! I have a device where I cannot access the client certificate's private key directly, but have access to verification and signature functions. The certificate, in DER format, is accessible. I need to use client certificates in my TLS connection and found the SSL_CTX_set_client_cert_cb functio

Client certificate verification

2014-03-13 Thread Leon Brits
Hi, We are switching to our own CA for in house networking. To test I've used it to sign a server certificate and a client certificate. The subject and issuer output for all three certificates is... ...CA: $ openssl x509 -subject -issuer -noout -in gandalf_cacert.pem subject= /O=myCo

Re: Detecting in an SSL client that the server asked for a client certificate

2013-11-24 Thread Nabla C0d3
client > > didn't provide a cert. > > > > One way to detect this is to call SSL_get_client_CA_list() but there are > > servers that require a client cert and don't even return a CA list, so > this > > is not reliable. > > > > How can my client detec

Re: Detecting in an SSL client that the server asked for a client certificate

2013-11-23 Thread Dr. Stephen Henson
that require a client cert and don't even return a CA list, so this > is not reliable. > > How can my client detect that a handshake failed because the server > requires a client certificate and it didn't supply one ? > When a certifiate is requested and one is not alrea

Detecting in an SSL client that the server asked for a client certificate

2013-11-23 Thread Nabla C0d3
n my client detect that a handshake failed because the server requires a client certificate and it didn't supply one ? Thanks!

Re: Verify callback and sending of the client certificate

2013-08-10 Thread Dr. Stephen Henson
k is invoked not just to verify > the server certificate, but also when OpenSSL tries to complete the > certificate chain before sending the client certificate. OpenSSL > clears errors resulting from this, but it cannot roll back the > effects of calling the callback. Are these callbac

Re: Verify callback and sending of the client certificate

2013-08-09 Thread Florian Weimer
On 08/09/2013 01:18 PM, Peter Sylvester wrote: On 08/09/2013 11:17 AM, Florian Weimer wrote: Qt installs a verification callback like this |// Register a custom callback to get all verification errors. |X509_STORE_set_verify_cb_func(ctx->cert_store, q_X509Callback); It is not recommend

Re: Verify callback and sending of the client certificate

2013-08-09 Thread Peter Sylvester
On 08/09/2013 11:17 AM, Florian Weimer wrote: Qt installs a verification callback like this |// Register a custom callback to get all verification errors. |X509_STORE_set_verify_cb_func(ctx->cert_store, q_X509Callback); It is not recommended to access to members in the way above, but ra

Verify callback and sending of the client certificate

2013-08-09 Thread Florian Weimer
SSL tries to complete the certificate chain before sending the client certificate. OpenSSL clears errors resulting from this, but it cannot roll back the effects of calling the callback. Are these callback invocations expected behavior? -- Florian Weimer / Red Hat Product Security T

Re: Getting "OpenSSL: Exit: error in SSLv3 read client certificate A" when client connects

2012-11-10 Thread Jeremy Bratton
any way at the client? I got a more detailed error message from the client-side and it turns out I misunderstood which certificate was required for this particular application. The certificate I've been using is only valid as a client certificate, not server. I was even more confused beca

RE: Getting "OpenSSL: Exit: error in SSLv3 read client certificate A" when client connects

2012-11-08 Thread Carl Young
er-openssl-us...@openssl.org] on behalf of Jeremy Bratton [yer...@gmail.com] Sent: 08 November 2012 04:58 To: openssl-users@openssl.org Subject: Re: Getting "OpenSSL: Exit: error in SSLv3 read client certificate A" when client connects I now have an ssldump of an incoming connection.

Re: Getting "OpenSSL: Exit: error in SSLv3 read client certificate A" when client connects

2012-11-07 Thread Jeremy Bratton
o longer able to > connect to the server. I can see from the error message that something is > going wrong during the SSL handshake, but I have no idea what (the actual > server uses ruby & soap4r). I'm just getting the error message "SSL_accept > SYSCALL returned=5 errn

Client certificate revocation is not working

2012-10-02 Thread Sergey
Hello colleagues! I need help with revocation of client certificate in OpenSSL (v 0.9.8n). I have setup a CA with self-signed certificate so I can generate and sign client certificates which are used to access squid, which in turn forwards traffic to exchange server. In squid.conf file there

Re: Client certificate revocation is not working

2012-10-01 Thread KoloboK
: > > Hello colleagues! > > I need help with revocation of client certificate in OpenSSL (v 0.9.8n). > I have setup a CA with self-signed certificate so I can generate and sign > client certificates which are used to access squid, which in turn forwards > traffic to exchange se

RE: Why key file in *client* certificate situation?

2012-08-27 Thread Charles Mills
Thanks. I think I get it. Charles -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Jakob Bohm Sent: Monday, August 27, 2012 10:19 AM To: openssl-users@openssl.org Subject: Re: Why key file in *client* certificate situation

Re: Why key file in *client* certificate situation?

2012-08-27 Thread Jakob Bohm
On 8/27/2012 3:46 PM, Charles Mills wrote: I'm just trying to understand the SSL protocol -- this is not an alleged bug or an "issue." In OpenSSL s_client, or for that matter, in my client test program, an attempt to use a *client* certificate fails unless I also specif

Why key file in *client* certificate situation?

2012-08-27 Thread Charles Mills
I'm just trying to understand the SSL protocol -- this is not an alleged bug or an "issue." In OpenSSL s_client, or for that matter, in my client test program, an attempt to use a *client* certificate fails unless I also specify -key or call SSL_CTX_use_PrivateKey_file(). Why?

RE: Tls1.2 Problem with client certificate and RSA_verify

2012-07-30 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Albers, Thorsten > Sent: Monday, 30 July, 2012 03:43 > I also debugged the openssl-server when receiving the message > above. The server recognized the correct hash and signature > algorithms, but while following the functions to the point >

Re: Tls1.2 Problem with client certificate and RSA_verify

2012-07-30 Thread Dr. Stephen Henson
gt; corresponding algorithm ids in front of the signature. In Wireshark my > Client Certificate Verify message (including the record layer header) looks > like following: > 16 03 03 00 88 0f 00 00 84 04 01 00 80 b4 ee c0 > 0010 8a 35 79 0d 97 7d f0 82 e6 69 3d 7d 66 a7 58 11 > 0020

RE: Tls1.2 Problem with client certificate and RSA_verify

2012-07-30 Thread Albers, Thorsten
rk my Client Certificate Verify message (including the record layer header) looks like following: 16 03 03 00 88 0f 00 00 84 04 01 00 80 b4 ee c0 0010 8a 35 79 0d 97 7d f0 82 e6 69 3d 7d 66 a7 58 11 0020 e5 9c 86 c1 9e 18 0c a0 94 37 2e 2b d2 08 9a 69 0030 0f 14 22 42 5c 66 b8 cb 8f

Re: Tls1.2 Problem with client certificate and RSA_verify

2012-07-27 Thread Dr. Stephen Henson
On Fri, Jul 27, 2012, Albers, Thorsten wrote: > Hi, > I have a problem with the openssl s_server (v1.0.1c) when requesting a client > certificate. I'm developing my own TLS 1.2 implementation (for embedded > platforms), and I'm stuck with a problem with using the

RE: Tls1.2 Problem with client certificate and RSA_verify

2012-07-27 Thread Philippe Lhardy
openssl-us...@openssl.org] on behalf of Albers, Thorsten [thorsten.alb...@vector.com] Sent: Friday, July 27, 2012 1:11 PM To: openssl-users@openssl.org Subject: Tls1.2 Problem with client certificate and RSA_verify Hi, I have a problem with the openssl s_server (v1.0.1c) when requesting a client c

Tls1.2 Problem with client certificate and RSA_verify

2012-07-27 Thread Albers, Thorsten
Hi, I have a problem with the openssl s_server (v1.0.1c) when requesting a client certificate. I'm developing my own TLS 1.2 implementation (for embedded platforms), and I'm stuck with a problem with using the client certificate. I already implemented TLS 1.0 earlier, so it's not

RE: Client certificate verification: performance

2012-07-02 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of Sukalp Bhople >Sent: Friday, 29 June, 2012 19:37 >Following is the code I used at server side program. >while (1) { >SSL *ssl = SSL_new(ctx); >SSL_set_fd(ssl, clientserver[1]); > if (SSL_accept(ssl) != 1) > break; >result

Re: Client certificate verification

2012-06-29 Thread Sukalp Bhople
unter code at client side. Do you see my conclusions right? On Fri, Jun 29, 2012 at 11:10 PM, Dave Thompson wrote: > >From: owner-openssl-us...@openssl.org On Behalf Of Sukalp Bhople > >Sent: Friday, 29 June, 2012 15:30 > > >I am trying to measure server performance for

RE: Client certificate verification

2012-06-29 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of Sukalp Bhople >Sent: Friday, 29 June, 2012 15:30 >I am trying to measure server performance for client certificate verification. >However, there is no significant difference in the server performance >when I send one certificat

Re: Client certificate verification

2012-06-29 Thread Peter Sylvester
On 06/29/2012 09:29 PM, Sukalp Bhople wrote: Hello, I am trying to measure server performance for client certificate verification. However, there is no significant difference in the server performance when I send one certificate and condition when I send chain of 10 certificates. I am aware

Re: Is certificate a CA or Client Certificate

2011-10-03 Thread Jakob Bohm
on behalf of sandeep kiran p [sandeepkir...@gmail.com] Sent: Saturday, October 01, 2011 10:19 AM To: openssl-users@openssl.org Subject: Re: Is certificate a CA or Client Certificate Are you sure there is an ExtendedKeyUsage indicating a "Certificate Sign" OID? Cert Sign AFAIK is only indic

RE: Is certificate a CA or Client Certificate

2011-10-02 Thread Glenn, William
9 AM To: openssl-users@openssl.org Subject: Re: Is certificate a CA or Client Certificate Are you sure there is an ExtendedKeyUsage indicating a "Certificate Sign" OID? Cert Sign AFAIK is only indicated in KeyUsage extension. -Sandeep On Sat, Oct 1, 2011 at 9:24 AM, mailto:jb-open...@

Re: Is certificate a CA or Client Certificate

2011-10-01 Thread sandeep kiran p
Are you sure there is an ExtendedKeyUsage indicating a "Certificate Sign" OID? Cert Sign AFAIK is only indicated in KeyUsage extension. -Sandeep On Sat, Oct 1, 2011 at 9:24 AM, wrote: > On 01-10-2011 01:09, Dave Thompson wrote: > >> From: owner-openssl-users@openssl.**org On >> Behalf Of >>> j

Re: Is certificate a CA or Client Certificate

2011-09-30 Thread jb-openssl
On 01-10-2011 01:09, Dave Thompson wrote: From: owner-openssl-us...@openssl.org On Behalf Of jb-open...@wisemo.com Sent: Thursday, 29 September, 2011 18:46 Because the attributes mentioned are only meaningful if covered by the digital signature on the certificate, it cannot change in any format c

RE: Is certificate a CA or Client Certificate

2011-09-30 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of jb-open...@wisemo.com > Sent: Thursday, 29 September, 2011 18:46 > Because the attributes mentioned are only meaningful if covered by the > digital signature on the certificate, it cannot change in any format > conversion that keeps the certifi

Re: Is certificate a CA or Client Certificate

2011-09-29 Thread jb-openssl
nks. // Harshvir On Fri, Sep 16, 2011 at 2:33 PM, Jakob Bohm mailto:jb-open...@wisemo.com> <mailto:jb-open...@wisemo.com <mailto:jb-open...@wisemo.com>> > wrote: On 9/16/2011 9:02 PM, Harshvir Sidhu wrote: I al

Re: Is certificate a CA or Client Certificate

2011-09-29 Thread Harshvir Sidhu
rmat? >> Thanks. >> // Harshvir >> >> On Fri, Sep 16, 2011 at 2:33 PM, Jakob Bohm > jb-open...@wisemo.com>**> wrote: >> >>On 9/16/2011 9:02 PM, Harshvir Sidhu wrote: >> >>I already tried this command, but its not giving

Re: Is certificate a CA or Client Certificate

2011-09-29 Thread Jakob Bohm
ts a root certificate or a client certificate. - Harshvir On Fri, Sep 16, 2011 at 1:53 PM, Jakob Bohm mailto:jb-open...@wisemo.com> <mailto:jb-open...@wisemo.com <mailto:jb-open...@wisemo.com>> > wrote: On 9/16/2011 7:

Re: Is certificate a CA or Client Certificate

2011-09-29 Thread Harshvir Sidhu
different that i need to do for p7b file format? Thanks. // Harshvir On Fri, Sep 16, 2011 at 2:33 PM, Jakob Bohm wrote: > On 9/16/2011 9:02 PM, Harshvir Sidhu wrote: > >> I already tried this command, but its not giving any information showing >> wheter its a root certificate or a

Fwd: Exit failed in sslv3 read client certificate B and Exit failed in sslv3 read client certificate A

2011-09-19 Thread jawed khelil
Hi all i hope someone can gives me an explanation or a solution for this problem: I have a reverse proxy ssl on production environnement, based on apache 2.2.17 and modssl2.2.16 and openssl 0.9.8r and sslcache (shù) Clients are auhentified by a client certificate, on the other hand my sever is

Re: Is certificate a CA or Client Certificate

2011-09-16 Thread Jakob Bohm
On 9/16/2011 9:02 PM, Harshvir Sidhu wrote: I already tried this command, but its not giving any information showing wheter its a root certificate or a client certificate. - Harshvir On Fri, Sep 16, 2011 at 1:53 PM, Jakob Bohm <mailto:jb-open...@wisemo.com>> wrote: On 9/16/201

Re: Is certificate a CA or Client Certificate

2011-09-16 Thread vivek here
Hi Harshiv, Try commad : openssl X509 -in 'yourcert/rootcert' -text You are able to see human readable certificate. If the certificate is client certificate and not self signed then 'issuer' is different from 'subject'. And CA: flase for client certificate. yo

Re: Is certificate a CA or Client Certificate

2011-09-16 Thread Harshvir Sidhu
I already tried this command, but its not giving any information showing wheter its a root certificate or a client certificate. - Harshvir On Fri, Sep 16, 2011 at 1:53 PM, Jakob Bohm wrote: > On 9/16/2011 7:58 PM, Harshvir Sidhu wrote: > >> Hi, >> In openssl is there some me

Re: Is certificate a CA or Client Certificate

2011-09-16 Thread Jakob Bohm
On 9/16/2011 7:58 PM, Harshvir Sidhu wrote: Hi, In openssl is there some method using which i can find whether the cerficiate in a file a Client Certificate or a CA/Root Certificate? - H S Try the following command, at look for the CA property and also see if the certificate lists itself

Is certificate a CA or Client Certificate

2011-09-16 Thread Harshvir Sidhu
Hi, In openssl is there some method using which i can find whether the cerficiate in a file a Client Certificate or a CA/Root Certificate? - H S

RE: Client certificate chains

2011-03-24 Thread Dave Thompson
es, they are in the usual order, with root as the final cert. > > -CAfile/load_verify_locations order doesn't matter. use_certificate_chain_file, for the certs you=client send to the server, order does or at least may matter. > Those running the server are the ones that signed the clie

Re: Client certificate chains

2011-03-21 Thread plot.lost
erver (one that it doesn't directly trust and you need an appropriate hierarchy) Those running the server are the ones that signed the client certificate and provided the CA and Root certificates that are in use. == Info: SSLv3, TLS handshake, Server finished (14): <= Recv SSL data,

Re: Client certificate chains

2011-03-21 Thread Crypto Sal
er that or one of them (possibly though intermediates as above), that may be the problem. But note that OpenSSL for one configures the 'preferred' CA(s) separately from the "trusted" CA(s), so a mismatch with this field isn't definitive. I've tried generating a pkcs1

Re: Client certificate chains

2011-03-21 Thread plot.lost
t or one of them (possibly though intermediates as above), that may be the problem. But note that OpenSSL for one configures the 'preferred' CA(s) separately from the "trusted" CA(s), so a mismatch with this field isn't definitive. I've tried generating a pkcs12 file

Re: Client certificate chains

2011-03-21 Thread plot.lost
termediates as above), that may be the problem. But note that OpenSSL for one configures the 'preferred' CA(s) separately from the "trusted" CA(s), so a mismatch with this field isn't definitive. I've tried generating a pkcs12 file that contained the client certificat

  1   2   3   4   >