Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


ajobbins

5053 posts

Uber Geek
+1 received by user: 1279

Trusted

#193464 11-Mar-2016 22:05
Send private message

I have a site on my Apache server that I have secured with certificate authentication. The client certificates are signed by the CA I created with OpenSSL and the HTTPS SSL certificate is from StartSSL.

 

If I open the site in Firefox, confirm the client certificate at the prompt it works beautifully! But if I do the same in IE or Chrome, I get a generic unhelpful message in IE, and Chrome reports "ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED".

 

I've done some googling to no avail. All the responses seem to be limited to old browsers/OS that do not support TLS1.2. I can see from Firefox that the connection is working nicely with TLS1.2 so I am stumped as to why it's not working in the other browsers. If I turn the auth off in Apache the site loads on all browsers fine and passes with an A rating on SSLLabs.com

 

There is nothing in my apache error log, so it seems to be a client side error.

 

Anyone come across this before or have any ideas?





Twitter: ajobbins


Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic
 1 | 2
marpada
487 posts

Ultimate Geek
+1 received by user: 182


  #1511629 11-Mar-2016 22:19
Send private message

Did you install StartSSL CA certificate (and the intermediate ones if they provide them) on Apache?




gzt

gzt
18678 posts

Uber Geek
+1 received by user: 7809

Lifetime subscriber

  #1511640 11-Mar-2016 22:43
Send private message

Where is the client certificate installed? From memory (on Windows) Firefox has its own thing, but IE and Chrome use the machine Windows/Microsoft Certificate store.

geocom
597 posts

Ultimate Geek
+1 received by user: 143

Subscriber

  #1511642 11-Mar-2016 22:46
Send private message

What version of windows, chrome and IE? As above firefox keeps its own CA store so it may be an issue with the windows CA store. Have you tried another windows PC?





Geoff E




ajobbins

5053 posts

Uber Geek
+1 received by user: 1279

Trusted

  #1511644 11-Mar-2016 22:46
Send private message

marpada:

 

Did you install StartSSL CA certificate (and the intermediate ones if they provide them) on Apache?

 

 

Yes, and it's not a StartSSL issue - that part all works fine. It's the client certificate auth with is self signed with the CA I created with OpenSSL. And Firefox is happy and it all works fine. I've even added my CA to the windows trust store so it trusts the self signed cert, but it still doesn't help.

 

I've just done a wireshark trace too. It's client (browser) side without a doubt. IE and Chrome just stop right after SSL connection (The StartSSL bit) and just before the client certificate auth is done - nothing over the wire from that point.

 

Have tried with 3 different machines on two networks. Two Win 10 and one Win 7





Twitter: ajobbins


ajobbins

5053 posts

Uber Geek
+1 received by user: 1279

Trusted

  #1511651 11-Mar-2016 22:51
Send private message

gzt: Where is the client certificate installed? From memory (on Windows) Firefox has its own thing, but IE and Chrome use the machine Windows/Microsoft Certificate store.

 

 

 

Yes, IE and Chrome appear to share the windows cert store. But it's there - just no idea why it doesn't like it! The browser error messages are not at all helpful.

 

Click to see full size





Twitter: ajobbins


bigalow
568 posts

Ultimate Geek
+1 received by user: 112


  #1511675 12-Mar-2016 00:22
Send private message

 

 

did you add this to your apache2.conf ?

 

SSLEngine on SSLProtocol +TLSv1 +TLSv1.1 +TLSv1.2

 

SSLCertificateKeyFile /etc/apache2/ssl/site/domain.key

 

SSLCertificateFile /etc/apache2/ssl/site/domain.crt

 

SSLCACertificateFile /etc/apache2/ssl/site/bundle.crt

 

SSLHonorCipherOrder on

 

SSLCipherSuite "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!CAMELLIA:!DES:!MD5:!PSK:!RC4"

 

BrowserMatch "MSIE [2-6]" \ nokeepalive ssl-unclean-shutdown \ downgrade-1.0 force-response-1.0 # MSIE 7 and newer should be able to use keepalive BrowserMatch "MSIE [17-9]" ssl-unclean-shutdown


 
 
 

Support Geekzone with one-off or recurring donations Donate via PressPatron.

gzt

gzt
18678 posts

Uber Geek
+1 received by user: 7809

Lifetime subscriber

  #1511709 12-Mar-2016 02:02
Send private message

Btw what do the Apache logs currently say for this event/sequence?

ajobbins

5053 posts

Uber Geek
+1 received by user: 1279

Trusted

  #1512079 12-Mar-2016 17:09
Send private message

gzt: Btw what do the Apache logs currently say for this event/sequence?

 

There is nothing in the Apache logs at all as it appears to be the browser not Apache. It serves to Firefox perfectly and I can see that in the logs.

 

 





Twitter: ajobbins


ajobbins

5053 posts

Uber Geek
+1 received by user: 1279

Trusted

  #1512083 12-Mar-2016 17:24
Send private message

biggal:

 

 

 

did you add this to your apache2.conf ?

 

SSLEngine on SSLProtocol +TLSv1 +TLSv1.1 +TLSv1.2

 

SSLCertificateKeyFile /etc/apache2/ssl/site/domain.key

 

SSLCertificateFile /etc/apache2/ssl/site/domain.crt

 

SSLCACertificateFile /etc/apache2/ssl/site/bundle.crt

 

SSLHonorCipherOrder on

 

SSLCipherSuite "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!CAMELLIA:!DES:!MD5:!PSK:!RC4"

 

BrowserMatch "MSIE [2-6]" \ nokeepalive ssl-unclean-shutdown \ downgrade-1.0 force-response-1.0 # MSIE 7 and newer should be able to use keepalive BrowserMatch "MSIE [17-9]" ssl-unclean-shutdown

 

 

 

 

My Apache conf largely matches, except I a stricter set of ciphers and protocols:

 

SSLCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA
SSLProxyCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA

 

SSLProtocol -all +TLSv1.2
SSLProxyProtocol -all +TLSv1.2

 

 

 

But even if I swap in your config, or if I set the ciphers and config to all, same result. Works in FF but not in IE or Chrome

 

 





Twitter: ajobbins


mentalinc
3384 posts

Uber Geek
+1 received by user: 1023

Trusted

  #1512102 12-Mar-2016 18:19
Send private message

ajobbins:

 

 

 

My Apache conf largely matches, except I a stricter set of ciphers and protocols:

 

SSLCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA
SSLProxyCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA

 

SSLProtocol -all +TLSv1.2
SSLProxyProtocol -all +TLSv1.2

 

 

 

But even if I swap in your config, or if I set the ciphers and config to all, same result. Works in FF but not in IE or Chrome

 

 

 

 

thats some really poor config

 

 

Have a read of

 

https://wiki.mozilla.org/Security/Server_Side_TLS

 

 

try using

 

https://mozilla.github.io/server-side-tls/ssl-config-generator/

 

 

and then testing with

 

https://www.ssllabs.com/ssltest/index.html

 

 





CPU: AMD 5900x | RAM: GSKILL Trident Z Neo RGB F4-3600C16D-32GTZNC-32-GB | MB:  Asus X570-E | GFX: EVGA FTW3 Ultra RTX 3080Ti| Monitor: LG 27GL850-B 2560x1440

 

Quic: https://account.quic.nz/refer/473833 R473833EQKIBX 


ajobbins

5053 posts

Uber Geek
+1 received by user: 1279

Trusted

  #1512110 12-Mar-2016 18:33
Send private message

mentalinc:
ajobbins:

 

 

 

My Apache conf largely matches, except I a stricter set of ciphers and protocols:

 

SSLCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA
SSLProxyCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA

 

SSLProtocol -all +TLSv1.2
SSLProxyProtocol -all +TLSv1.2

 

 

 

But even if I swap in your config, or if I set the ciphers and config to all, same result. Works in FF but not in IE or Chrome

 

 

 

thats some really poor config Have a read of https://wiki.mozilla.org/Security/Server_Side_TLS try using https://mozilla.github.io/server-side-tls/ssl-config-generator/ and then testing with https://www.ssllabs.com/ssltest/index.html

 

How so? That's that config Apache recommends by 2016 for strong encryption. With these settings I am getting an A rating from SSL labs.

 

 

 

I installed the client auth cert on my phone and all works in Chrome on Android fine. There is something Windows doesn't like about the cert but I don't know where to look for more info.

 

 





Twitter: ajobbins


 
 
 
 

Shop now for Dyson appliances (affiliate link).
bigalow
568 posts

Ultimate Geek
+1 received by user: 112


  #1512171 13-Mar-2016 01:32
Send private message

ajobbins:

 

 

 

My Apache conf largely matches, except I a stricter set of ciphers and protocols:

 

SSLCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA
SSLProxyCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA

 

SSLProtocol -all +TLSv1.2
SSLProxyProtocol -all +TLSv1.2

 

 

 

But even if I swap in your config, or if I set the ciphers and config to all, same result. Works in FF but not in IE or Chrome

 

 

 

 

pm me you site url and ill have a look





 

 

 


timmmay
20858 posts

Uber Geek
+1 received by user: 5350

Trusted
Lifetime subscriber

  #1512173 13-Mar-2016 07:15
Send private message

Only offering TLS1.2 restricts the clients that will work. Add at least TLS1.1, at least as a test, and add TLS1.0 temporarily to see if it starts workign.


mentalinc
3384 posts

Uber Geek
+1 received by user: 1023

Trusted

  #1512179 13-Mar-2016 08:18
Send private message

timmmay:

Only offering TLS1.2 restricts the clients that will work. Add at least TLS1.1, at least as a test, and add TLS1.0 temporarily to see if it starts workign.

 

 

Chrome isn't going to be impacted by only having TLS1.2.. unless they have a super old version!

 





CPU: AMD 5900x | RAM: GSKILL Trident Z Neo RGB F4-3600C16D-32GTZNC-32-GB | MB:  Asus X570-E | GFX: EVGA FTW3 Ultra RTX 3080Ti| Monitor: LG 27GL850-B 2560x1440

 

Quic: https://account.quic.nz/refer/473833 R473833EQKIBX 


timmmay
20858 posts

Uber Geek
+1 received by user: 5350

Trusted
Lifetime subscriber

  #1512180 13-Mar-2016 08:21
Send private message

Probably not, but it will give more information. I know my servers were generally more compatible and worked with more browsers when I added TLS 1.1 and 1.0 than when I was 1.2 only.


 1 | 2
Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.