This is a workaround, not a solution.... We are still getting double
prompted when there are .gifs or .jpgs on the page with the HTML....
-H
~
Howard Uman - [EMAIL PROTECTED]
Netegrity, Inc., 245 Winter St., Waltham, MA 02451
TEL: (781) 890-1700 x225 FAX: (781) 487-7791
LET'S GO CAPS!
> -----Original Message-----
> From: Arend van der Veen [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, July 29, 1999 2:54 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Help - were should I turn - Netscape and Client
> Certificates
>
>
> I have found a solution to this problem.
>
> This seem to almost work. I removed certificate database password
> protection in Netscape and then added SSLOptions +OptRenegotiate to
> httpd.conf. Now I only get a certificate request when I
> first enter the
> site. However, it still asks me for a password even though
> the client has
> already enter one for the domain.
>
> Arend van der Veen
>
> -----Original Message-----
> From: Arend van der Veen <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
> Date: Thursday, July 29, 1999 7:57 AM
> Subject: Help - were should I turn - Netscape and Client Certificates
>
>
> >I am using mod_ssl_2.3.6_1.3.6. I generated a client certificate and
> >converted to PKCS#12 format. I Ioaded it into both IE5 and
> Netscape 4.5.
> >Under IE5 everything worked perfectly. In Netscape I had to trust
> >certificate first. When I access a link on the secure sever
> I first get
> >prompted for a certificate. After a long delay I then get
> an error stating
> >"Netscape has encountered bad data from the server". When I
> check the
> error
> >log I see an error stating SSL handshake timed out. If I
> try the link
> >again, I get prompted for the certificate again and a user name and
> password
> >and then everything works for the rest of the session!!??
> >
> >What have I done wrong to trip up Netscape ? Following is a
> list of how I
> >configured the certificates.
> >
> >Thanks in advance,
> >Arend van der Veen
> >
> >1. Installed mod_ssl as instructed.
> >2. Generated a CA certificate using CA.sh -newca with out
> modifying
> >openssl.cnf.
> >3. Extended the expiration date to 5 years
> >4. Converted cacert.pem to der format and copied cacert.pem to
> >/usr/local/apache_1.3.6/config and cacert.der to apache root.
> >5. Edited openssl.cnf and set nsCertType = server. This
> was previously
> >commented out.
> >6. Generated and signed Server Certificate. Copied
> Server Certificate
> >and Key to /usr/local/apache_1.3.6/config.
> >7. Edited openssl.cnf and set nsCertType = client, mail. This was
> >previously commented out. Commented out nsCertType = server.
> >8. Updated httpd.conf
> >
> >SSLProtocol -all +SSLv3
> >SSLCipherSuite HIGH:MEDIUM
> >SSLCertificateFile /usr/local/apache_1.3.6/conf/BassAleCert.pem
> >SSLCertificateKeyFile /usr/local/apache_1.3.6/conf/BassAleKey.pem
> >SSLCACertificateFile /usr/local/apache_1.3.6/conf/cacert.pem
> >SSLVerifyClient require
> >SSLVerifyDepth 1
> ><Directory /home/dpserver/securehome>
> >AuthType Basic
> >AuthName Test
> >AuthUserFile /home/dpserver/users/testusers
> >AuthGroupFile /home/dpserver/users/testgroups
> ><Limit GET POST>
> >require valid-user
> ></Limit>
> ></Directory>
> ><Location /servlet>
> >AuthType Basic
> >AuthName Test
> >AuthUserFile /home/dpserver/users/testusers
> >AuthGroupFile /home/dpserver/users/testgroups
> ><Limit GET POST>
> >require valid-user
> ></Limit>
> ></Location>
> >
> >9. Generated a client certificate and converted to PKCS#12 format
> >
> >CA.sh -newreq
> >CA.sh -sign
> >openssl pkcs12 -export -in newcert.pem -inkey newreq.pem
> -name "Test User"
> \
> >-certfile demoCA/cacert.pem -out newcert.p12
> >
> >
> >_____________________________________________________________
> _________
> >Apache Interface to OpenSSL (mod_ssl)
> www.modssl.org
> >User Support Mailing List
> [EMAIL PROTECTED]
> >Automated List Manager
> [EMAIL PROTECTED]
> >
> ______________________________________________________________________
> Apache Interface to OpenSSL (mod_ssl) www.modssl.org
> User Support Mailing List [EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
>
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]