Just ignore them, they are generated when client switches between
locations with different SSLVerifyClient options set.
--
On Tue, Apr 8, 2008 at 1:51 PM, Christopher Ljungblad
<christopher.ljungblad@xxxxxxxxx> wrote:
> Hi,
> We are using Apache httpd 2.2.3 on Red hat linux and have a problem with our
> client certificates.
>
> In the ssl.conf file we have a configured a Virtual Host that listens to
> port 444 that requires the client to verify a certificate.
>
> <VirtualHost *:444>
> <Location /servlets/*>
> SSLVerifyClient require
> SSLVerifyDepth 1
> SSLCACertificateFile /etc/pki/tls/certs/xxxxx_users.cer
> </Location>
>
> This works out fine, the client certificate can be choosen in the browser
> and I can fill in the password and click "ok".
> But the certificate is not validated correctly and the ssl_error log says:
>
> [Tue Apr 08 15:25:23 2008] [error] Re-negotiation handshake failed: Not
> accepted by client!?
>
> What am I missing? I got this working in Tomcat using the exact same
> certificate. Is there a way to keep the client certificate
> handling in Tomcat.
>
> Regards
> /Christopher
>
>
Serge Dubrouski.
---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
" from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx