[openssl-users] SSL_get_peer_certificate returns NULL in client_cert_cb after upgrade to openssl 1.1.1

Matt Caswell matt at openssl.org
Thu Oct 11 09:36:28 UTC 2018


I opened this issue to track this problem:

https://github.com/openssl/openssl/issues/7384

Matt


On 11/10/18 10:25, Matt Caswell wrote:
> 
> 
> On 10/10/18 23:04, Dave Wang wrote:
>> Hi there,
>>
>> I have a client can talk with server, where the client certificate is
>> loaded in client_cert_cb  based on matching the server side certificate.
>>
>> it works perfectly in openssl 1.1.0h, however it stops working after I
>> upgrade to openssl 1.1.1.
>>
>> In client_cert_cb , when I call SSL_get_peer_certificate, it returns
>> NULL, which is different from openssl 1.1.0h.
>>
>> I do set SSL_VERIFY_PEER on both sides. 
>>
>>
>> any thoughts on this?
> 
> I assume this only happens with a TLSv1.3 handshake?
> 
> From the documentation, the client_cert_cb is called: "when a client
> certificate is requested by a server". In practice this means when we
> have received the CertificateRequest message from the server.
> 
> In TLSv1.2 (and below) the server's first flight of messages for a
> client-auth full handshake in response to a ClientHello looks like this:
> 
> ServerHello
> Certificate
> ServerKeyExchange
> CertificateRequest
> ServerHelloDone
> 
> In TLSv1.3 it looks like this:
> 
> ServerHello
> EncryptedExtensions
> CertificateRequest
> Certificate
> CertificateVerify
> Finished
> 
> Note that in TLSv1.2 the CertificateRequest message comes *after* the
> server has sent the Certificate but in TLSv1.3 it comes *before*. That
> means of course that in TLSv1.3 the client_cert_cb gets called before we
> have processed the server's certificate and hence
> SSL_get_peer_certificate() returns NULL.
> 
> I'm wondering whether we should delay calling the client_cert_cb in
> TLSv1.3 until after the CertificateVerify has been processed.
> 
> Matt
> 


More information about the openssl-users mailing list