Hello Jeff, That will be difficult. By complience policy, our servers are on Debian / Cent of the current stable version. Even patches code should not be used :-) Does you already know when a version of OpenSSL will be released that follows this RFC? Robert -----Ursprüngliche Nachricht----- Von: Jeffrey Walton [mailto:noloader@xxxxxxxxx] Gesendet: Montag, 22. Januar 2018 07:47 An: Gladewitz, Robert <Robert.Gladewitz@xxxxxxx>; OpenSSL Users <openssl-users@xxxxxxxxxxx> Betreff: Re: TLS Error in FreeRadius - eap_tls: ERROR: Failed in __FUNCTION__ (SSL_read): error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed On Mon, Jan 22, 2018 at 1:44 AM, Gladewitz, Robert via openssl-users <openssl-users@xxxxxxxxxxx> wrote: > > Thank you all for all the answers. > The problem is that Cisco prescribes the attributes. > ... > > Unfortunately, the Cisco CUCM telephone systems do not seem to accept certificates without these attributes :-(. > > If I understand everything correctly, would the only (and unclean) workaround be adding "TLS Web Client Authentication" to solve my problem? > I think you have a couple of choices. First, you can downgrade to a version of OpenSSL that follows the RFC. Second, you can patch OpenSSL to follow the RFC. Third, you can implement the verify_callback and override the errant behavior. Jeff
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users