<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: openssl - server and client certificates in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029672#M301375</link>
    <description>I don't see anything in your Apache configuration telling it where to find the CA certificate for validating the client cert. Do you have a SSLCACertificateFile directive pointing at your CA certificate?</description>
    <pubDate>Mon, 02 Jul 2007 15:50:26 GMT</pubDate>
    <dc:creator>Heironimus</dc:creator>
    <dc:date>2007-07-02T15:50:26Z</dc:date>
    <item>
      <title>openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029668#M301371</link>
      <description>Has anyone worked with client side ssl certificates for an apache web instance?&lt;BR /&gt;&lt;BR /&gt;If so, what am I doing wrong here? I create the CA, then the server csr and sign it. Then create the client certs export them to a pkcs#12 format for my MSIE 6.0 testing.&lt;BR /&gt;&lt;BR /&gt;Any and all help is much appreciated.&lt;BR /&gt;&lt;BR /&gt;Here are the steps I take:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# - gen CA (certificate authority - like ViriSign) for all certs&lt;BR /&gt;openssl genrsa -des3 -out my-ca.key 2048&lt;BR /&gt;&lt;BR /&gt;openssl req -new -x509 -days 3650 -key my-ca.key -out my-ca.crt&lt;BR /&gt;&lt;BR /&gt;openssl x509 -in my-ca.crt -text -noout&lt;BR /&gt;&lt;BR /&gt;# - gen cert for apache server&lt;BR /&gt;openssl genrsa -des3 -out jims-server.key 2048&lt;BR /&gt;&lt;BR /&gt;openssl req -new -key jims-server.key -out jims-server.csr&lt;BR /&gt;&lt;BR /&gt;openssl x509 -req -in jims-server.csr -out jims-server.crt -sha1 -CA my-ca.crt -CAkey my-ca.key -CAcreateserial -days 365&lt;BR /&gt;&lt;BR /&gt;openssl x509 -in jims-server.crt -text -noout&lt;BR /&gt;#&lt;BR /&gt;# - gen client side cert and sign with CA&lt;BR /&gt;openssl genrsa -des3 -out jim-c.key 2048&lt;BR /&gt;&lt;BR /&gt;openssl req -new -key jim-c.key -out jim-c.csr&lt;BR /&gt;&lt;BR /&gt;openssl x509 -req -in jim-c.csr -out jim-c.crt -sha1 -CA my-ca.crt -CAkey my-ca.key -CAcreateserial -days 365&lt;BR /&gt;&lt;BR /&gt;openssl pkcs12 -export -in jim-c.crt -inkey jim-c.key -name "Test Site" -out jim-c.p12&lt;BR /&gt;&lt;BR /&gt;openssl pkcs12 -in jim-c.p12 -clcerts -nokeys -info&lt;BR /&gt;</description>
      <pubDate>Fri, 29 Jun 2007 15:39:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029668#M301371</guid>
      <dc:creator>UNIX Daemon</dc:creator>
      <dc:date>2007-06-29T15:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029669#M301372</link>
      <description>Tell me no one has worked with this before?&lt;BR /&gt;Does anyone have any suggestions?&lt;BR /&gt;</description>
      <pubDate>Mon, 02 Jul 2007 10:12:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029669#M301372</guid>
      <dc:creator>UNIX Daemon</dc:creator>
      <dc:date>2007-07-02T10:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029670#M301373</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;I've done it.&lt;BR /&gt;&lt;BR /&gt;Your generation script looks reasonable.&lt;BR /&gt;&lt;BR /&gt;Where are you placing it after you generate it?&lt;BR /&gt;&lt;BR /&gt;What is the configuration of your ssl.conf file?&lt;BR /&gt;&lt;BR /&gt;Are there entries on the access_log error_log log files?&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 02 Jul 2007 11:19:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029670#M301373</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-07-02T11:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029671#M301374</link>
      <description>Hey SEP,&lt;BR /&gt;Thanks for repling.&lt;BR /&gt;&lt;BR /&gt;This is the ssl.conf VHOST&lt;BR /&gt;-----------------------------------------&lt;BR /&gt;&lt;VIRTUALHOST&gt;&lt;BR /&gt;    DocumentRoot "/opt/hpws/apache/vhost-root"&lt;BR /&gt;    DirectoryIndex index.htm&lt;BR /&gt;    SSLEngine on&lt;BR /&gt;    SSLCipherSuite !ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL&lt;BR /&gt;    SSLCertificateFile /opt/hpws/apache/conf/ssl.crt/jims-server.crt&lt;BR /&gt;    SSLCertificateKeyFile /opt/hpws/apache/conf/ssl.key/jims-server.key&lt;BR /&gt;    ServerName jims-test-site&lt;BR /&gt;    ErrorLog logs/jims-test-site.error_log&lt;BR /&gt;    CustomLog logs/jims-test-site.access_log common&lt;BR /&gt;&lt;DIRECTORY&gt;&lt;BR /&gt;    DirectoryIndex sindex.htm&lt;BR /&gt;    AllowOverride None&lt;BR /&gt;    AddType text/html .shtml&lt;BR /&gt;&lt;/DIRECTORY&gt;&lt;BR /&gt;&lt;DIRECTORY&gt;&lt;BR /&gt;    DirectoryIndex index.htm&lt;BR /&gt;    SSLVerifyClient require&lt;BR /&gt;    SSLVerifyDepth 1&lt;BR /&gt;&lt;/DIRECTORY&gt;&lt;BR /&gt;. . . etc.&lt;BR /&gt;-------------------------------------------&lt;BR /&gt;&lt;BR /&gt;I can import the PKCS12 just fine into MSIE but see these messages when I try to access it.&lt;BR /&gt;&lt;BR /&gt;[Fri Jun 29 14:50:06 2007] [error] Certificate Verification: [127.0.0.1] Error (self signed certificate) Subject: /C=US/ST=PA/L=Horsham/O=NCO/CN=jims-test-site&lt;BR /&gt;[Fri Jun 29 14:50:06 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;[Fri Jun 29 14:59:03 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;[Fri Jun 29 14:59:35 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;IS it that my /urs/local/openssl/openssl.cfg isn't configured with specific information about the CA or certs?&lt;BR /&gt;&lt;BR /&gt;I'm just guessing here . . .&lt;BR /&gt;&lt;BR /&gt;Thanks again for any help you might provide.&lt;/VIRTUALHOST&gt;</description>
      <pubDate>Mon, 02 Jul 2007 11:40:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029671#M301374</guid>
      <dc:creator>UNIX Daemon</dc:creator>
      <dc:date>2007-07-02T11:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029672#M301375</link>
      <description>I don't see anything in your Apache configuration telling it where to find the CA certificate for validating the client cert. Do you have a SSLCACertificateFile directive pointing at your CA certificate?</description>
      <pubDate>Mon, 02 Jul 2007 15:50:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029672#M301375</guid>
      <dc:creator>Heironimus</dc:creator>
      <dc:date>2007-07-02T15:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029673#M301376</link>
      <description>Sorry about that. . .&lt;BR /&gt;&lt;BR /&gt;SSLCertificateChainFile /opt/hpws/apache/conf/ssl.crt/my-ca.crt&lt;BR /&gt;SSLCertificateKeyFile /opt/hpws/apache/conf/ssl.crt/my-ca.crt&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;most of the conf within the virtual host section is commented out. I didn't want to post things of non-relevance.&lt;BR /&gt;&lt;BR /&gt;Here's the entire vhost in the ssl.conf though:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;VIRTUALHOST&gt;&lt;BR /&gt;    DocumentRoot "/opt/hpws/apache/vhost-root"&lt;BR /&gt;    DirectoryIndex index.htm&lt;BR /&gt;    SSLEngine on&lt;BR /&gt;    SSLCipherSuite !ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL&lt;BR /&gt;    SSLCertificateFile /opt/hpws/apache/conf/ssl.crt/jims-server.crt&lt;BR /&gt;    SSLCertificateKeyFile /opt/hpws/apache/conf/ssl.key/jims-server.key&lt;BR /&gt;    ServerName jims-test-site&lt;BR /&gt;    ErrorLog logs/jims-test-site.error_log&lt;BR /&gt;    CustomLog logs/jims-test-site.access_log common&lt;BR /&gt;&lt;DIRECTORY&gt;&lt;BR /&gt;    DirectoryIndex sindex.htm&lt;BR /&gt;    AllowOverride None&lt;BR /&gt;    AddType text/html .shtml&lt;BR /&gt;&lt;/DIRECTORY&gt;&lt;BR /&gt;&lt;DIRECTORY&gt;&lt;BR /&gt;    DirectoryIndex index.htm&lt;BR /&gt;    SSLVerifyClient require&lt;BR /&gt;    SSLVerifyDepth 1&lt;BR /&gt;&lt;/DIRECTORY&gt;&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;#   General setup for the virtual host&lt;BR /&gt;#DocumentRoot "/opt/hpws/apache/htdocs"&lt;BR /&gt;#ServerName corux28:443&lt;BR /&gt;#ServerAdmin www@corux28&lt;BR /&gt;#ErrorLog /opt/hpws/apache/logs/error_log&lt;BR /&gt;#TransferLog /opt/hpws/apache/logs/access_log&lt;BR /&gt;&lt;BR /&gt;#SSLEngine on&lt;BR /&gt;#SSLCipherSuite !ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL&lt;BR /&gt;#SSLCertificateFile /opt/hpws/apache/conf/ssl.crt/jims-server.crt&lt;BR /&gt;&lt;BR /&gt;#SSLCertificateKeyFile /opt/hpws/apache/conf/ssl.key/jims-server.key&lt;BR /&gt;&lt;BR /&gt;SSLCertificateChainFile /opt/hpws/apache/conf/ssl.crt/my-ca.crt&lt;BR /&gt;SSLCertificateKeyFile /opt/hpws/apache/conf/ssl.crt/my-ca.crt&lt;BR /&gt;&lt;BR /&gt;#SSLCACertificatePath /opt/hpws/apache/conf/ssl.crt&lt;BR /&gt;#SSLCACertificateFile /opt/hpws/apache/conf/ssl.crt/ca-bundle.crt&lt;BR /&gt;&lt;BR /&gt;#SSLCARevocationPath /opt/hpws/apache/conf/ssl.crl&lt;BR /&gt;#SSLCARevocationFile /opt/hpws/apache/conf/ssl.crl/ca-bundle.crl&lt;BR /&gt;&lt;BR /&gt;#SSLVerifyClient require&lt;BR /&gt;#SSLVerifyDepth  10&lt;BR /&gt;&lt;BR /&gt;#   Access Control:&lt;BR /&gt;#   With SSLRequire you can do per-directory access control based&lt;BR /&gt;#   on arbitrary complex boolean expressions containing server&lt;BR /&gt;#   variable checks and other lookup directives.  The syntax is a&lt;BR /&gt;#   mixture between C and Perl.  See the mod_ssl documentation&lt;BR /&gt;#   for more details.&lt;BR /&gt;#&lt;LOCATION&gt;&lt;/LOCATION&gt;&lt;BR /&gt;#SSLRequire (    %{SSL_CIPHER} !~ m/^(EXP|NULL)/ \&lt;BR /&gt;#            and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \&lt;BR /&gt;#            and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \&lt;BR /&gt;#            and %{TIME_WDAY} &amp;gt;= 1 and %{TIME_WDAY} &amp;lt;= 5 \&lt;BR /&gt;#            and %{TIME_HOUR} &amp;gt;= 8 and %{TIME_HOUR} &amp;lt;= 20       ) \&lt;BR /&gt;#           or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/&lt;BR /&gt;#&lt;/VIRTUALHOST&gt;&lt;BR /&gt;&lt;BR /&gt;#SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVars +StrictRequire&lt;BR /&gt;&lt;FILESMATCH&gt;&lt;BR /&gt;    SSLOptions +StdEnvVars&lt;BR /&gt;&lt;/FILESMATCH&gt;&lt;BR /&gt;&lt;DIRECTORY&gt;&lt;BR /&gt;    SSLOptions +StdEnvVars&lt;BR /&gt;&lt;/DIRECTORY&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 02 Jul 2007 15:59:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029673#M301376</guid>
      <dc:creator>UNIX Daemon</dc:creator>
      <dc:date>2007-07-02T15:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029674#M301377</link>
      <description>SSLCertificateChainFile is the CA chain for the server certificate. It is not used to validate client certificates.&lt;BR /&gt;&lt;BR /&gt;SSLCertificateKeyFile should be the private key for your server certificate. You probably don't want that in the same file as your CA chain, but I suppose it probably can work that way.&lt;BR /&gt;&lt;BR /&gt;I still don't see a SSLCACertificateFile directive. Assuming that you are using some Apache 2.0 version, you need to set this directive to point to the CA certificate that signed your clients.&lt;BR /&gt;&lt;BR /&gt;The Apache web site has a document describing how to configure client authentication. Take a look at &lt;A href="http://httpd.apache.org/docs/2.0/ssl/ssl_howto.html#accesscontrol" target="_blank"&gt;http://httpd.apache.org/docs/2.0/ssl/ssl_howto.html#accesscontrol&lt;/A&gt; and see if you've got everything.&lt;BR /&gt;</description>
      <pubDate>Mon, 02 Jul 2007 18:20:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029674#M301377</guid>
      <dc:creator>Heironimus</dc:creator>
      <dc:date>2007-07-02T18:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: openssl - server and client certificates</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029675#M301378</link>
      <description>Gettnig closer . . .&lt;BR /&gt;I can connet now but I get this message in the error log file for this v-host.&lt;BR /&gt;&lt;BR /&gt;# tail ../logs/jims-test-site.error_log&lt;BR /&gt;[Tue Jul 03 12:21:50 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;&lt;BR /&gt;I confirmed that if I remove the client side cert from my MSIE it fails to display the page. Like wise, when I import the cert I can get to the page.&lt;BR /&gt;&lt;BR /&gt;But all the while I get these messages in the log file for the v-host.&lt;BR /&gt;&lt;BR /&gt;# cat ../logs/jims-test-site.error_log&lt;BR /&gt;[Tue Jul 03 12:21:50 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;[Tue Jul 03 12:28:16 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;[Tue Jul 03 12:28:16 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;[Tue Jul 03 12:29:38 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;[Tue Jul 03 12:29:42 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;[Tue Jul 03 12:29:58 2007] [error] Re-negotiation handshake failed: Not accepted by client!?&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Jul 2007 11:31:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssl-server-and-client-certificates/m-p/4029675#M301378</guid>
      <dc:creator>UNIX Daemon</dc:creator>
      <dc:date>2007-07-03T11:31:10Z</dc:date>
    </item>
  </channel>
</rss>

