[openssl-users] TLS Error in FreeRadius - eap_tls: ERROR: Failed in __FUNCTION__ (SSL_read): error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed
Gladewitz, Robert
Robert.Gladewitz at dbfz.de
Sat Jan 20 11:50:05 UTC 2018
Hello Michael,
So, i think there is a lot of problems for many infrastrucure in the feature, if all software use functions based on openssl >1.1.0.
But a am using a own root ca based on creation time in openssl 1.0.0. What ca i do, when cisco need the Extended Key Usage?
Robert
-----Ursprüngliche Nachricht-----
Von: openssl-users [mailto:openssl-users-bounces at openssl.org] Im Auftrag von Michael Ströder
Gesendet: Samstag, 20. Januar 2018 11:59
An: openssl-users at openssl.org; Viktor Dukhovni <openssl-users at dukhovni.org>
Betreff: Re: [openssl-users] TLS Error in FreeRadius - eap_tls: ERROR: Failed in __FUNCTION__ (SSL_read): error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed
Viktor Dukhovni wrote:
>> On Jan 19, 2018, at 10:09 PM, Frank Migge <fm at frank4dd.com> wrote:
>>
>>>> Object 04: X509v3 Extended Key Usage: TLS Web Server Authentication
>>
>> This is were I would check first.
>>
>> I am not fully sure, but believe that Extended Key Usage should *not* be there.
>
> Indeed the intermediate CA should either not have an extendedKeyUsage,
> or that keyUsage should include the desired "purpose".
Full ack.
But unfortunately M$ implemented this requirement to add such a value to Extended Key Usage of intermediate CA certs violating X.509 and RFC 5280. And now all PKI lemmings are following this crap.
=> use your own CA
Ciao, Michael.
More information about the openssl-users
mailing list