-----Original Message-----
From: McGregor, Donald (Don) (CIV)
Sent: Friday, May 30, 2014 0:01
I'm attempting to get CAC card authentication working with
Apache httpd-2.2.3-85 on Centos 5. CAC cards are the DoD
Here is what I tell my employees and contractors to do first.
Get is working with soft certs. You will need a CA cert, a server cert and a
client cert. Then you will have test cases (and errors) you can share.
variant of smart cards. The SSL connection is failing (Chrome
error: ERR_SSL_PROTOCOL_ERROR) and I'm having problems
diagnosing exactly where the problem is.
The objective is to confirm that the user has in his
possession a valid CAC card--at this point I don't need to
extract the contents of the client certificate into
environment variables and do a SSLFakeBasicAuth. If they have
a valid CAC card, they should be able to reach the page.
Subdirectory I want CAC authentication in:
Code:
<Directory /var/www/html/cac>
SSLVerifyDepth 10
SSLVerifyClient require
</Directory>
SSL settings:
Code:
SSLEngine on
SSLProtocol all -SSLv2
SSLHonorCipherOrder On
SSLCipherSuite
ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES
:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
SSLCertificateFile /etc/httpd/keys/myCertificate.crt
SSLCertificateKeyFile /etc/httpd/keys/myCertificate.key
SSLCertificateChainFile /etc/pki/tls/certs/allDoDCerts.pem
SSLCACertificateFile /etc/pki/tls/certs/allDoDCerts.pem
SSLCARevocationFile /etc/pki/tls/crls/allCrls.pem
And if you are working on an accredited DoD system, you will need to run in FIPS
140 mode, which is not supported by mod_ssl, you will have to use mod_nss.
Non-CAC https works. Client certificate authentication for
CAC cards fails.
I've retrieved the CRL list. allDoDCerts.pem is the PEM
encoded, concatenated, root and intermediate certificates for
the DoD CAs. I'm testing the client side on windows 8.1. In
IE 11 I'm presented with a list of candidate certificates
(showing that the OS and browser are contacting the smart
card, and that the SSLCACertificateFile is doing its job of
providing the client with a list of candidate CAs) and enter
a PIN to access the card, suggesting the certificate is being
retrieved from the card. The SSL connection then fails to be
established.
I can set up my own CA, add the CA's cert to the
SSLCACertificateFile and SSLCAChainFile, create a certificate
from that CA, and that works after I add a PKCS#12 file to Firefox.
Debug this from curl, it will make your life easier.
Ironically, IE does a nice job of presenting the server status too. Change the
require to optional, and verify the server is sending a "proper" chain.
What can I do to trouble shoot exactly where this problem
resides? Ideally this would be some magic that allowed me to
see the client or the server failing to authenticate a
certificate, so I could see exactly where the problem is.
Sorry for the half answers, its late.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- -
- Jason Pyeron PD Inc.
http://www.pdinc.us -
- Principal Consultant 10 West 24th Street #100 -
- +1 (443) 269-1555 x333 Baltimore, Maryland 21218 -
- -
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
This message is copyright PD Inc, subject to license 20080407P00.
---------------------------------------------------------------------
To unsubscribe, e-mail:
users-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail:
users-help@xxxxxxxxxxxxxxxx