Certificate Validation Failure trying to connect to Cisco VPN with openconnect and PKCS11 certs on a CAC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2018-11-07 at 11:15 -0500, Adam Allgood wrote:
> Thanks so much for the response! I think I found the issuer cert
> needed (unless it's causing the problems below) - and I exported it
> from the chrome certificate manager as a .pem file. I no longer got a
> certificate validation failure,


Thanks for following up. So... the question becomes, "could OpenConnect
have found that cert in the Chrome certificate store for itself without
your help?". I understand you're running in an Ubuntu chroot? There
must be *some* set of trusted certificates, but this intermediate isn't
necessarily trusted at all even in Chrome OS. It's just a link in a
chain.

I'm guessing there's not a lot we can do here. If there is an NSS
database in ~/.pki/nssdb/ visible to OpenConnect, perhaps there's an
argument that we should at least have an option to try looking there?

>  and after telling the shill program in
> ChromeOS to stop destroying my tun0 devices (sudo stop shill followed
> by sudo start shill BLACKLISTED_DEVICES="tun0,br0"), I got a stable
> connection!

What names does shill permit by default? Should we just use a different
name on Chrome OS? You can change it with the '--interface' option.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5213 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/openconnect-devel/attachments/20181107/e6fa5926/attachment.bin>


[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux