No hits on this thread yes, so I am replying to myself with more information... I am creating the cachain.pem with cat wildcart.crt > cachain.pem cat intmdtca.cer >> cachain.pem cat rootca.cer >> cachain.pem I have also tried it as cat wildcart.crt > cachain.pem cat cabundle.pem >> cachain.pem I am creating the cachain.crl with the below script: #!/bin/sh openssl_conf=/etc/pki/tls/openssl.cnf chaincrl=/etc/httpd/conf/ssl/cachain.crl crlpath=/etc/httpd/conf/ssl/CRLs crlders=/etc/httpd/conf/ssl/DER_CRLs INPUT=<crls.txt IFS=" " rm ${crlpath}/* rm ${crlders}/* rm ${chaincrl} for line in $(cat < crls.txt); do crlname=`echo ${line} | awk '{print $1}'` crlurl=`echo ${line} | awk '{print $2}'` wget "${crlurl}/${crlname}" --no-check-certificate -O "${crlders}/${crlname}" openssl crl -inform DER -in "${crlders}/${crlname}" -outform PEM -out "${crlpath}/${crlname}" cat "${crlpath}/${crlname}" >> ${chaincrl} done Anyone have any suggestions? > ----- Original Message ----- > From: Jim Jones <iamjimjones@xxxxxxxxxxxxxx> > To: "users@xxxxxxxxxxxxxxxx" <users@xxxxxxxxxxxxxxxx> > Cc: > Sent: Wednesday, March 13, 2013 11:47 AM > Subject: Trouble authenticating IE users with client certificates > > Hi all, > I am having a problem getting Apache to allow access to IE 6/7/8/9 users > with client certificates installed to access restricted resources. I have > several servers (Windows and Linux) running various versions of Apache from > 2.0 through 2.4, all behave the same way. I am simply unable to get client > certificates to authenticate IE users. Please do let me know if anymore > information is needed, including how I built the CAchain, CRLs, etc. > > > Note that using the same client certs from Firefox works just fine, > users can successfully authenticate to the resource and get content. > > Thank you! > Jim > > ##### ssl.conf > SSLEngine on > SSLProtocol all -SSLv2 > SSLCipherSuite HIGH:MEDIUM > SSLCertificateFile /etc/pki/tls/certs/wildcard.crt > SSLCertificateKeyFile /etc/pki/tls/private/21wildcard.key > SSLCertificateChainFile /etc/httpd/conf/ssl/cachain.pem > SSLCACertificateFile /etc/httpd/conf/ssl/rootca.cer > SSLCADNRequestFile /etc/httpd/conf/ssl/cachain.pem > SSLCARevocationFile /etc/httpd/conf/ssl/cachain.crl > SSLVerifyClient none > SSLInsecureRenegotiation on > CustomLog "/etc/httpd/logs/extended_ssl_request.log" "%t %h %{SSL_CLIENT_VERIFY}x %{SSL_CLIENT_I_DN_CN}x %{SSL_CLIENT_S_DN}x \"%r\" %b" > <Location /foo/> > SSLVerifyClient optional > RewriteCond %{SSL:SSL_CLIENT_VERIFY} !^SUCCESS$ > RewriteRule .* /var/www/error/HTTP_UNAUTHORIZED.html [L] > SSLVerifyDepth 10 > SSLOptions +ExportCertData +StdEnvVars +OptRenegotiate +FakeBasicAuth > SSLRequireSSL > SSLRequire %{SSL_CLIENT_VERIFY} eq "SUCCESS" > #SSLRequire ( %{SSL_CLIENT_S_DN_CN} eq "Biggs, \Mike" \ > # or %{SSL_CLIENT_S_DN_emailAddress} eq "mike.biggs@xxxxxxxx" ) \ > # and %{SSL_CLIENT_I_DN_CN} in {"nypd\-ca\-1", "nypd\-ca\-2", "nypd\-ca\-3"} > </Location> > > #### extended_ssl_request.log > [13/Mar/2013:12:03:09 -0400] x.x.x.x NONE - - "GET / HTTP/1.0" 768 > [13/Mar/2013:12:03:09 -0400] x.x.x.x NONE - - "GET /icons/blank.gif HTTP/1.0" 148 > [13/Mar/2013:12:03:09 -0400] x.x.x.x NONE - - "GET /icons/unknown.gif HTTP/1.0" 245 > [13/Mar/2013:12:03:21 -0400] x.x.x.x NONE - - "GET /foo/bar HTTP/1.0" - > > --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx