-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This advice, piled with a plethora of other pieces of evidence
eventually resulted in the server admins looking into the issue.

Once they correctly installed the intermediate cert *AND* had the
correct alternate names in the cert, things started humming along perfectly.

Thanks very much!

Jeff

Marvin Addison wrote:
> Found the needle in the haystack:
> 
> chain [0] = [
> [
>  Version: V3
>  Subject: CN=*.uni.edu, OU=Information Technology Services -
> Information Systems, O=University of Northern Iowa, L=Cedar Falls,
> ST=Iowa, C=US
>  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
> 
>  Key:  SunPKCS11-Solaris RSA public key, 1024 bits (id 18375032, session 
> object)
>  modulus: 
> 150252834723561447967415045547110642718186254487638106274530683717502202186242739986401301532067909257705376376731702670798392352220276069305613608914222704280715074880254729626699122945560042771374711093102394381214967841639350759335294151180419448599809918344003825320472445869538730864301794080354316670753
>  public exponent: 65537
>  Validity: [From: Tue Jun 02 19:00:00 CDT 2009,
>               To: Fri Aug 06 18:59:59 CDT 2010]
>  Issuer: CN=DigiCert Global CA, OU=www.digicert.com, O=DigiCert Inc, C=US
>  SerialNumber: [    03e6c037 e13346ac 82383d90 45d19d35]
> 
> Certificate Extensions: 9
> [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
> AuthorityInfoAccess [
>  [accessMethod: 1.3.6.1.5.5.7.48.1
>   accessLocation: URIName: http://ocsp.digicert.com, accessMethod:
> 1.3.6.1.5.5.7.48.2
>   accessLocation: URIName: 
> http://www.digicert.com/CACerts/DigiCertGlobalCA.crt]
> ]
> 
> [2]: ObjectId: 2.5.29.17 Criticality=false
> SubjectAlternativeName [
>  DNSName: accesstest.uni.edu
>  DNSName: zany.admin.uni.edu
>  DNSName: accessstage.uni.edu
>  DNSName: sage.admin.uni.edu
>  DNSName: uni.edu
>  DNSName: *.uni.edu
> ]
> 
> [3]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: A7 C7 13 A0 7A 01 3C 9D   EF 82 48 82 48 D5 73 51  ....z.<...H.H.sQ
> 0010: B6 12 56 2A                                        ..V*
> ]
> 
> ]
> 
> [4]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 82 5E F6 7D C8 64 CA EE   C5 5E 5F 67 5F DC 18 15  .^...d...^_g_...
> 0010: 57 EC DB F1                                        W...
> ]
> ]
> 
> [5]: ObjectId: 2.5.29.32 Criticality=false
> CertificatePolicies [
>  [CertificatePolicyId: [2.16.840.1.114412.1.3.0.1]
> [PolicyQualifierInfo: [
>  qualifierID: 1.3.6.1.5.5.7.2.1
>  qualifier: 0000: 16 2E 68 74 74 70 3A 2F   2F 77 77 77 2E 64 69 67
> ..http://www.dig
> 0010: 69 63 65 72 74 2E 63 6F   6D 2F 73 73 6C 2D 63 70  icert.com/ssl-cp
> 0020: 73 2D 72 65 70 6F 73 69   74 6F 72 79 2E 68 74 6D  s-repository.htm
> 
> ], PolicyQualifierInfo: [
>  qualifierID: 1.3.6.1.5.5.7.2.2
>  qualifier: 0000: 30 82 01 56 1E 82 01 52   00 41 00 6E 00 79 00 20
> 0..V...R.A.n.y.
> 0010: 00 75 00 73 00 65 00 20   00 6F 00 66 00 20 00 74  .u.s.e. .o.f. .t
> 0020: 00 68 00 69 00 73 00 20   00 43 00 65 00 72 00 74  .h.i.s. .C.e.r.t
> 0030: 00 69 00 66 00 69 00 63   00 61 00 74 00 65 00 20  .i.f.i.c.a.t.e.
> 0040: 00 63 00 6F 00 6E 00 73   00 74 00 69 00 74 00 75  .c.o.n.s.t.i.t.u
> 0050: 00 74 00 65 00 73 00 20   00 61 00 63 00 63 00 65  .t.e.s. .a.c.c.e
> 0060: 00 70 00 74 00 61 00 6E   00 63 00 65 00 20 00 6F  .p.t.a.n.c.e. .o
> 0070: 00 66 00 20 00 74 00 68   00 65 00 20 00 44 00 69  .f. .t.h.e. .D.i
> 0080: 00 67 00 69 00 43 00 65   00 72 00 74 00 20 00 43  .g.i.C.e.r.t. .C
> 0090: 00 50 00 2F 00 43 00 50   00 53 00 20 00 61 00 6E  .P./.C.P.S. .a.n
> 00A0: 00 64 00 20 00 74 00 68   00 65 00 20 00 52 00 65  .d. .t.h.e. .R.e
> 00B0: 00 6C 00 79 00 69 00 6E   00 67 00 20 00 50 00 61  .l.y.i.n.g. .P.a
> 00C0: 00 72 00 74 00 79 00 20   00 41 00 67 00 72 00 65  .r.t.y. .A.g.r.e
> 00D0: 00 65 00 6D 00 65 00 6E   00 74 00 20 00 77 00 68  .e.m.e.n.t. .w.h
> 00E0: 00 69 00 63 00 68 00 20   00 6C 00 69 00 6D 00 69  .i.c.h. .l.i.m.i
> 00F0: 00 74 00 20 00 6C 00 69   00 61 00 62 00 69 00 6C  .t. .l.i.a.b.i.l
> 0100: 00 69 00 74 00 79 00 20   00 61 00 6E 00 64 00 20  .i.t.y. .a.n.d.
> 0110: 00 61 00 72 00 65 00 20   00 69 00 6E 00 63 00 6F  .a.r.e. .i.n.c.o
> 0120: 00 72 00 70 00 6F 00 72   00 61 00 74 00 65 00 64  .r.p.o.r.a.t.e.d
> 0130: 00 20 00 68 00 65 00 72   00 65 00 69 00 6E 00 20  . .h.e.r.e.i.n.
> 0140: 00 62 00 79 00 20 00 72   00 65 00 66 00 65 00 72  .b.y. .r.e.f.e.r
> 0150: 00 65 00 6E 00 63 00 65   00 2E                    .e.n.c.e..
> 
> ]]  ]
> ]
> 
> [6]: ObjectId: 2.5.29.19 Criticality=true
> BasicConstraints:[
>  CA:false
>  PathLen: undefined
> ]
> 
> [7]: ObjectId: 2.5.29.37 Criticality=false
> ExtendedKeyUsages [
>  serverAuth
>  clientAuth
> ]
> 
> [8]: ObjectId: 2.5.29.31 Criticality=false
> CRLDistributionPoints [
>  [DistributionPoint:
>     [URIName: http://crl3.digicert.com/DigiCertGlobalCA-2009g.crl]
> , DistributionPoint:
>     [URIName: http://crl4.digicert.com/DigiCertGlobalCA-2009g.crl]
> ]]
> 
> [9]: ObjectId: 2.5.29.15 Criticality=true
> KeyUsage [
>  DigitalSignature
>  Key_Encipherment
> ]
> 
> ]
>  Algorithm: [SHA1withRSA]
>  Signature:
> 0000: A6 08 8E C8 79 FF D9 41   15 BB A4 05 B4 22 BA 06  ....y..A....."..
> 0010: 33 FC 34 59 C4 74 9A 98   AC 64 43 F9 C1 F0 D0 7E  3.4Y.t...dC.....
> 0020: B6 73 1D 21 B9 8F 6A 4C   79 70 4A E1 70 E5 89 34  .s.!..jLypJ.p..4
> 0030: FB E2 7E 67 2B 1A 73 23   74 D8 08 08 A3 69 9D 94  ...g+.s#t....i..
> 0040: 1B C8 0F D1 67 E2 44 4C   01 36 00 92 76 95 A5 23  ....g.DL.6..v..#
> 0050: 9B 9B 39 63 21 1E 91 C3   7E C4 DE 9F 15 D2 48 27  ..9c!.........H'
> 0060: 4F 4D 43 AB FE 30 1F 9F   99 7E CA 03 F6 EC DC CF  OMC..0..........
> 0070: 74 FF BE 0E 92 AF 0A 1A   DA 94 73 CA 0B 76 75 E4  t.........s..vu.
> 0080: 5D E8 EA 51 D4 F3 50 C8   E2 35 3D A1 78 3E B5 87  ]..Q..P..5=.x>..
> 0090: FA F0 B7 A7 9E 40 2E 15   CD AE 9E 79 B5 04 F4 AC  .....@.....y....
> 00A0: 97 57 3C 1A AD 22 26 CD   73 28 91 AC D8 3D BF DA  .W<.."&.s(...=..
> 00B0: AC DB 2A F4 1E 8B 44 10   0A A6 4B A0 94 3E 50 C5  ..*...D...K..>P.
> 00C0: E6 9A 8F 96 1E F1 42 34   47 D8 E2 45 69 B0 2D FF  ......B4G..Ei.-.
> 00D0: 1E 14 26 EF D8 41 B1 E1   94 E7 F2 55 75 F5 60 F1  ..&..A.....Uu.`.
> 00E0: 73 EC D3 89 45 3E 2E F5   D9 A5 A8 C3 BF D9 88 D5  s...E>..........
> 00F0: 50 A1 40 13 C0 A6 43 F0   81 58 E2 05 FB FE 00 CA  p...@...c..x......
> 
> ]
> 
> That's the cert chain immediately before the PKIX validation error.
> The chain appears truncated since in the previous SSL/TLS handshakes
> in the log, the full chain from *.uni.edu down to entrust is shown.
> Hopefully knowing you're not sending the full chain in some cases is
> enough of a hint to point you in the right direction.
> 
> M
> 


- --
Jeff Chapin,
Assistant Systems/Applications Administrator
ITS-IS, University of Northern Iowa
Phone: 319-273-3162 Email: jeff.cha...@uni.edu
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkvDSroACgkQQiaEUfQoY7QQ0ACfRbyS18+FKGg3RQI0c6TjeIEX
248Ani+Bq2ZTHsGxkYCiekOs5MV6jVRW
=F9An
-----END PGP SIGNATURE-----

-- 
You are currently subscribed to cas-user@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to