Re: MTLS verification fails

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> On Mar 5, 2018, at 12:58 AM, salil GK <gksalil@xxxxxxxxx> wrote:
> 
> openssl s_client -cert tomcat.pem  -key tomcat_priv.pem  -CAfile ca.pem -connect lrc1.cisco.com:8446
> 
>     ----- 
> 
>     #$ openssl s_server -key privkey.pem -cert server.pem  -accept 8446 -verify ca.pem                   
>     verify depth is 0
>     Using default temp DH parameters
>     ACCEPT
>     depth=2 O = Cisco Systems, CN = trca-4096-sha2
>     verify error:num=19:self signed certificate in certificate chain
>     ERROR
>     verify error:self signed certificate in certificate chain
>     140011871301248:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3427:
>     shutting down SSL
>     CONNECTION CLOSED
> 
> What is the meaning of this error and how do I correct this - ?

You have not specified a "-CAfile" or "-CApath" option telling "s_server" where to
look for the "O = Cisco Systems, CN = trca-4096-sha2" trusted issuer CA certificate.

You've also incorrectly specified the "-verify" option, which certainly
does not help.

  https://www.openssl.org/docs/man1.0.2/apps/openssl-s_server.html

   -verify depth, -Verify depth

    The verify depth to use. This specifies the maximum length of the
    client certificate chain and makes the server request a certificate
    from the client. With the -verify option a certificate is requested
    but the client does not have to send one, with the -Verify option
    the client must supply a certificate or an error occurs.

    If the ciphersuite cannot request a client certificate (for example
    an anonymous ciphersuite or PSK) this option has no effect.

-- 
	Viktor.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux