[openssl-users] Hardware client certificates moving to Centos 7

Robert Moskowitz rgm at htt-consult.com
Tue Sep 26 22:39:59 UTC 2017



On 09/26/2017 11:26 AM, Stuart Marsden wrote:
> Hi
>
> I have Centos/Apache servers for securely provisioning IP phones using hardware client certificates embedded in the phones.
>
> for this test I have allowed all protocols and ciphers
>
> on Centos 6 this works fine, the rpms are:
>
> openssl098e-0.9.8e-20.el6.centos.1.x86_64
> openssl-1.0.1e-57.el6.x86_64
> openssl-devel-1.0.1e-57.el6.x86_64
>
> on centos 7 the rpms are:
>
> openssl098e-0.9.8e-29.el7.centos.3.x86_64
> openssl-1.0.2k-8.el7.x86_64
> openssl-libs-1.0.2k-8.el7.x86_64
> xmlsec1-openssl-1.2.20-7.el7_4.x86_64
> openssl-devel-1.0.2k-8.el7.x86_64
>
> on Centos 7 the logging with "Loglevel debug"  in the apache config file is a lot less than Centos 6
>
>
> The SSL fails to establish with the error below:
>
>
> ssl_engine_kernel.c(1890): [client XX.XX.31.200:47576] AH02043: SSL virtual host for servername xxxxxxxx found
>
> ssl_engine_kernel.c(1360): [client XX.XX.31.200:47576] AH02275: Certificate Verification, depth 1, CRL checking mode: none [subject: emailAddress=support at yealink.com,CN=Yealink Equipment Issuing CA,OU=yealink.com,O=Yealink Network Technology Co.\\,Ltd.,L=Xiamen,ST=Fujian,C=CN / issuer: emailAddress=support at yealink.com,CN=Yealink Equipment Issuing CA,OU=yealink.com,O=Yealink Network Technology Co.\\,Ltd.,L=Xiamen,ST=Fujian,C=CN / serial: E17F3D266C47321E / notbefore: Nov  7 12:45:52 2013 GMT / notafter: Nov  7 12:45:52 2033 GMT]

Please provide a complete dump of the hardware certificate.  There may 
be a subjectAltName with fields that require an hex dump.  I want to see 
if these are IEEE 802.1AR certificates...

If they are, they are suppose to be used to provision an owner (lDevID) 
certificate.  But they should be usable; they may be ECDSA certs.

You can see some examples on how to create (and display) ECDSA 802.1AR 
certs in:

https://datatracker.ietf.org/doc/draft-moskowitz-ecdsa-pki/


>
> ssl_engine_kernel.c(1360): [client xx.xx.31.200:47576] AH02275: Certificate Verification, depth 0, CRL checking mode: none [subject: emailAddress=support at yealink.com,CN=001565c8be6f,OU=Yealink Equipment,O=Yealink Network Technology Co.\\,Ltd.,L=Xiamen,ST=Fujian,C=CN / issuer: emailAddress=support at yealink.com,CN=Yealink Equipment Issuing CA,OU=yealink.com,O=Yealink Network Technology Co.\\,Ltd.,L=Xiamen,ST=Fujian,C=CN / serial: 303031353635633862653666 / notbefore: Mar  1 00:00:00 2014 GMT / notafter: Feb 24 00:00:00 2034 GMT]
>
> [ssl:info] [pid 1611] [client xx.xx.31.200:47576] AH02276: Certificate Verification: Error (7): certificate signature failure [subject: emailAddress=support at yealink.com,CN=001565c8be6f,OU=Yealink Equipment,O=Yealink Network Technology Co.\\,Ltd.,L=Xiamen,ST=Fujian,C=CN / issuer: emailAddress=support at yealink.com,CN=Yealink Equipment Issuing CA,OU=yealink.com,O=Yealink Network Technology Co.\\,Ltd.,L=Xiamen,ST=Fujian,C=CN / serial: 303031353635633862653666 / notbefore: Mar  1 00:00:00 2014 GMT / notafter: Feb 24 00:00:00 2034 GMT]
>
> [ssl:info] [pid 1611] [client xx.xx.31.200:47576] AH02008: SSL library error 1 in handshake (server xxx.xxx.xxx.xxx:443)
> [ssl:info] [pid 1611] SSL Library Error: error:0D0C50A1:asn1 encoding routines:ASN1_item_verify:unknown message digest algorithm
> [ssl:info] [pid 1611] SSL Library Error: error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed
> [ssl:info] [pid 1611] [client xx.xx.31.200:47576] AH01998: Connection closed to child 3 with abortive shutdown
>
>
> It fails across several phone vendors.
>
> Any suggestions greatly received, thanks in advance
>
> Stuart
>
>



More information about the openssl-users mailing list