Re: Trouble authenticating IE users with client certificates

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



No hits on this thread yes, so I am replying to myself with more information...

I am creating the cachain.pem with 

cat wildcart.crt > cachain.pem
cat intmdtca.cer >> cachain.pem
cat rootca.cer >> cachain.pem

I have also tried it as 

cat wildcart.crt > cachain.pem
cat cabundle.pem >> cachain.pem

I am creating the cachain.crl with the below script:
#!/bin/sh
openssl_conf=/etc/pki/tls/openssl.cnf
chaincrl=/etc/httpd/conf/ssl/cachain.crl
crlpath=/etc/httpd/conf/ssl/CRLs
crlders=/etc/httpd/conf/ssl/DER_CRLs
INPUT=<crls.txt
IFS="
"
rm ${crlpath}/*
rm ${crlders}/*
rm ${chaincrl}
for line in $(cat
< crls.txt); do
  crlname=`echo
${line} | awk '{print $1}'`
  crlurl=`echo
${line} | awk '{print $2}'`  wget
"${crlurl}/${crlname}" --no-check-certificate -O
"${crlders}/${crlname}" 
  openssl crl
-inform DER -in "${crlders}/${crlname}" -outform PEM -out
"${crlpath}/${crlname}"
  cat
"${crlpath}/${crlname}" >> ${chaincrl}
done

Anyone have any suggestions?


> ----- Original Message -----
> From: Jim Jones <iamjimjones@xxxxxxxxxxxxxx>
> To: "users@xxxxxxxxxxxxxxxx" <users@xxxxxxxxxxxxxxxx>
> Cc:
> Sent: Wednesday, March 13, 2013 11:47 AM
> Subject:  Trouble authenticating IE users with client certificates
> 
> Hi all,
>   I am having a problem getting Apache to allow access to IE 6/7/8/9 users
> with client certificates installed to access restricted resources.  I have
> several servers (Windows and Linux) running various versions of Apache from
> 2.0 through 2.4, all behave the same way.  I am simply unable to get client
> certificates to authenticate IE users.  Please do let me know if anymore
> information is needed, including how I built the CAchain, CRLs, etc.
> 
> 
>   Note that using the same client certs from Firefox works just fine,
> users can successfully authenticate to the resource and get content.
> 
> Thank you!
> Jim
> 
> ##### ssl.conf
> SSLEngine on
> SSLProtocol all -SSLv2
> SSLCipherSuite HIGH:MEDIUM
> SSLCertificateFile /etc/pki/tls/certs/wildcard.crt
> SSLCertificateKeyFile /etc/pki/tls/private/21wildcard.key
> SSLCertificateChainFile /etc/httpd/conf/ssl/cachain.pem
> SSLCACertificateFile /etc/httpd/conf/ssl/rootca.cer
> SSLCADNRequestFile /etc/httpd/conf/ssl/cachain.pem
> SSLCARevocationFile /etc/httpd/conf/ssl/cachain.crl
> SSLVerifyClient none
> SSLInsecureRenegotiation on
> CustomLog "/etc/httpd/logs/extended_ssl_request.log" "%t %h %{SSL_CLIENT_VERIFY}x %{SSL_CLIENT_I_DN_CN}x %{SSL_CLIENT_S_DN}x \"%r\" %b"
> <Location /foo/>
> SSLVerifyClient optional
> RewriteCond %{SSL:SSL_CLIENT_VERIFY} !^SUCCESS$
> RewriteRule .* /var/www/error/HTTP_UNAUTHORIZED.html [L]
> SSLVerifyDepth  10
> SSLOptions +ExportCertData +StdEnvVars +OptRenegotiate  +FakeBasicAuth
> SSLRequireSSL
> SSLRequire %{SSL_CLIENT_VERIFY} eq "SUCCESS"
> #SSLRequire   (  %{SSL_CLIENT_S_DN_CN} eq "Biggs, \Mike" \
> #               or %{SSL_CLIENT_S_DN_emailAddress} eq "mike.biggs@xxxxxxxx" ) \
> #              and %{SSL_CLIENT_I_DN_CN} in {"nypd\-ca\-1", "nypd\-ca\-2", "nypd\-ca\-3"}
> </Location>
> 
> #### extended_ssl_request.log
> [13/Mar/2013:12:03:09 -0400] x.x.x.x NONE - - "GET / HTTP/1.0" 768
> [13/Mar/2013:12:03:09 -0400] x.x.x.x NONE - - "GET /icons/blank.gif HTTP/1.0" 148
> [13/Mar/2013:12:03:09 -0400] x.x.x.x NONE - - "GET /icons/unknown.gif HTTP/1.0" 245
> [13/Mar/2013:12:03:21 -0400] x.x.x.x NONE - - "GET /foo/bar HTTP/1.0" -
> 
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx




[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux