Hi Maxim, 

> Sure, intermediate certificates are not required to be known by the server 
> and can be provided by the client in the extra certificates during SSL/TLS 
> handshake.

I am not sure what you mean by passing the intermediate CAs in the extra 
certificates. 
They are CA certificates and are passed as CA certificate chain. 
For example: 
curl has option --cacert which can take the entire chain of CA certificates 
(from immediate issuer to the trust anchor)
# curl --cacert


> Further, it is not really possible to properly retrieve such client-provided 
> intermediate certificates after the initial
> handshake: these certificates are not saved to the session data and therefore 
> not available after session reuse, see
> 7653:8409f9df6219 (http://hg.nginx.org/nginx/rev/8409f9df6219).

AFAIU, intermediate CA certificates are not supposed to be known by Nginx 
anyway. I am not sure if we are referring to
two different things here. But with the changes which I proposed, I am able to 
retrieve the entire chain from Nginx(also in cases
when intermediate CAs are not known to the server). During certificate 
verification, Nginx creates a verified chain from the incoming 
certificate chain and the CA certificate which is trusted on the web interface. 
Nginx only needs to know about the trust anchor (the self signed CA certificate)


> And you want to allow access only to certificates signed by
> Intermediate1 CA in some cases, and only certificates signed by
> Intermediate2 CA in other cases.  Is that correct?

You are correct partially. Yes, we need to allow/deny a configuration based on 
the configuration available for the CA.
There could be different combinations with the chain here
1- Cert-> Intermediate1 -> Root
2- Cert-> Intermediate2 -> Root
3- Cert-> Root
4- Cert-> Intermediate1 -> Intermediate2 -> Root

For example:-
Consider the chain "Cert-> Intermediate1 -> Intermediate2 -> Root"
We need to something based on Intermediate2's configuration and it is possible 
that the 
Intermediate1 is not known to the server. 

Let me try to explain in detail :
1- There is a client certificate which is issued by an intermediate CA 
certificate and the intermediate CA is issued by a trust anchor.
i.e.
Cert1 -> Intermediate1 ->Root1 ( self signed CA).
The Root1 is a trust anchor and is trusted on the web interface. 
The Intermediate1 is not known on the server. 

When a client established a connection with the server, passing the chain as
Cert1 -> Intermediate1 -> Root1(optionally)
nginx accepts this connection and creates a verified chain, because the Root1 
is trusted on the interface and it is a self signed certificate. 
Nginx passes the client certificate (Cert1) to the middleware. 

If the Intermediate1 was known to the server always, we could do what you are 
suggesting(using ssl_client_i_dn and ssl_client_escaped_cert)
If the Intermediate1 is not known to the server, there is no way to know/get 
the Root1 CA from the Cert1.

Probably, I can try to explain in a better format, if you need.
Please let me know. 

Regards,
Mandeep 






-----Original Message-----
From: nginx-devel <nginx-devel-boun...@nginx.org> On Behalf Of Maxim Dounin
Sent: Wednesday, January 12, 2022 2:11 AM
To: nginx-devel@nginx.org
Subject: Re: [PATCH] Add provision to fetch certificate chain from Nginx

Hello!

On Thu, Dec 30, 2021 at 09:35:26AM +0000, CHHABRA Mandeep Singh wrote:

> As far as my understanding goes, the intermediate CA certificates are 
> not required to be known to the server.
> It is only the trust anchor(the root CA certificate) which is required 
> to be known and trusted on the sever.
> And in our case also, the root CA certificate is trusted for the web.

Sure, intermediate certificates are not required to be known by the server and 
can be provided by the client in the extra certificates during SSL/TLS 
handshake.

Such configurations are believed to be extremely rare though: in most cases 
intermediate certificates are well known and can be easily configured on the 
server side, and this saves extra configuration on clients.

Further, it is not really possible to properly retrieve such client-provided 
intermediate certificates after the initial
handshake: these certificates are not saved to the session data and therefore 
not available after session reuse, see
7653:8409f9df6219 (http://hg.nginx.org/nginx/rev/8409f9df6219).

Hence the original question about the problem you trying to solve.

> I have tried to give a brief of the problem in the following section.
> 
> We have a product which supports multi-tenancy and uses Nginx as a 
> reverse proxy.
> There are different isolated domains which share the same trust 
> anchor. But there could be difference in the client certificate chain 
> in different domains. There is a need to do some extra validations 
> based on the CAs in the chain.
> To be more precise, we have option to specify if a CA could be used to 
> do client or user authentication. There is a possibility that in one 
> domain, a CA is enabled for client authentication and in another , the 
> same CA is disabled.
> 
> So, we need a way to get the certificate chain from Nginx, to do these 
> extra validations, apart from what Nginx does i.e.
> checking if the chain could be verified.
> But there is no way to get the chain, today.

Not sure I've understood your description correctly, but from what I understood 
it looks like you are not trying to retrieve client-provided intermediate 
certificates, but instead trying to do additional checking on the chain which 
contains client-provided end certificate and the chain constructed by nginx 
from the intermediate certificates known on the server during certificate 
verification.  That is, you have something like:

- Root CA, Intermediate1 CA, Intermediate2 CA - all known on the
  server;

- Client certs signed by Intermediate1 CA;

- Client certs signed by Intermediate2 CA.

And you want to allow access only to certificates signed by
Intermediate1 CA in some cases, and only certificates signed by
Intermediate2 CA in other cases.  Is that correct?

Such problem seems to be solvable by just looking at $ssl_client_escaped_cert 
and re-creating the certificate chain from the list of CA certificates known on 
the server.  In simple cases (assuming all intermediate CA DNs are unique) just 
checking the $ssl_client_i_dn variable would be enough.

Does it look reasonable, or I misunderstood something?

--
Maxim Dounin
http://mdounin.ru/
_______________________________________________
nginx-devel mailing list
nginx-devel@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx-devel
_______________________________________________
nginx-devel mailing list -- nginx-devel@nginx.org
To unsubscribe send an email to nginx-devel-le...@nginx.org

Reply via email to