Hi. Apologies for the poor use of client/server terminology. I've spent so long 
talking about the non-SSL part of this that I didn't do the context switch into 
SSL terms :)

You are right in that no client certificates are in use. In testing I just have 
the CA cert and the LDAPS server cert.

> Only 1 client, but many servers?

Yes. There will only be one Remedy instance but the LDAPS system is going to be 
back-ended by multiple LDAPS servers. Remedy is just one of a few hundred LDAP 
apps I've migrated. It's also the only one which is causing major problems :-(

> > Ps As an aside the Remedy docs suggesting installing Netscape browser,
> > connecting to an SSL website secured by the intended certificate, adding
> > it through the dialog box and then copying the cert7/key3 pair into the
> > Remedy folder.

> This must be some OLD documentation.  Is it publicly available, as a web
> page, perhaps?

I've asked for the source of this. I believe it's a .doc supplied with the Rem 
package. Tracking down a suitable version of Netscape that would work took some 
time... We are using Remedy 6.3 and latest is 7.1, so not *that* old.

[Excellent description of SSL client/server snipped]

Our *production* load-balancing is based on multiple LDAPS servers and a 
Foundry load balancer. Application access to LDAPS is via a series of CNAMES 
which point to Foundry virtual IPs. These CNAMES indicate a geographical 
preference to the Foundry. The connections are then redirected by the Foundry 
to the appropriate LDAPS server. I'm using subjectAlternateNames to cover the 
real hostname and CNAMEs for each LDAPS server. This is tested and working.

In *test* I've got an LDAPS server with an SSL server certificate issued to its 
FQDN and inbound connections using that FQDN. This is also tested and working.

> Now, about that diagnostic step, please try the following series of certutil
> commands using the same cert DB that you used in your original

trmatthe@:~/working$ certutil -d . -M -t ",," -n client
trmatthe@:~/working$ certutil -d . -M -t "C,," -n centralCT
trmatthe@:~/working$ certutil -d . -V -e -u V -n client
certutil: certificate is valid

Erk! So clearly from an SSL perspective the CA cert is valid and the trust 
flags are OK. Just to be sure I removed the centralCT CA cert and verifying the 
'client' cert for SSL server purposes failed with:

certutil: certificate is invalid: Peer's Certificate issuer is not recognized.

Just to be sure, I tried a connection with a cert7 containing the CA cert 
(centralCT) with flags C,, This failed with an Alert: Unknown CA from my 
sniffer.

Sooo, it's not looking (to me) to be a trust issue. It's as if Remedy is 
unwilling to use trust hierarchies and is expecting individual SSL server certs.

Have I missed something or is this looking like a Remedy SSL bug?

Thanks once again for all your help with this. I'd been going slowly mad!

Cheers,
Tim

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to