After Client Hello and Server Hello the server sends a certificate
request and this is the answer sent by the anyconnect client.
Should't there be certificates visible? When the server sends its cert
it has a length of 1709 but here in the clients response the
certificates length is 0.
Or am I missing something?
Transport Layer Security
TLSv1.2 Record Layer: Handshake Protocol: Certificate
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 7
Handshake Protocol: Certificate
Handshake Type: Certificate (11)
Length: 3
Certificates Length: 0
TLSv1.2 Record Layer: Handshake Protocol: Client Key Exchange
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 70
Handshake Protocol: Client Key Exchange
Handshake Type: Client Key Exchange (16)
Length: 66
EC Diffie-Hellman Client Params
Pubkey Length: 65
Pubkey: 04fa7baae25fe53c492b3f3372be25d7f82a68b74b5edb38…
TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec
Content Type: Change Cipher Spec (20)
Version: TLS 1.2 (0x0303)
Length: 1
Change Cipher Spec Message
TLSv1.2 Record Layer: Handshake Protocol: Encrypted Handshake Message
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 40
Handshake Protocol: Encrypted Handshake Message
On Sun, 5 Apr 2020 at 22:17, David Woodhouse <[email protected]> wrote:
>
> On Sun, 2020-04-05 at 22:13 +0200, Kai G wrote:
> > I'm trying to connect to a Cisco ASA VPN using credentials on a
> > smartcard.
> >
> > My setup is Ubuntu 18.04 with OpenConnect 7.08.
> >
> > There are a bunch of certs on the card but think I positively
> > identified the right one with the help of the anyconnect xml file and
> > p11tool.
> >
> > I can connect from Anyconnect on Windows 10 just fine using the same
> > card but when trying from another PC with linux and openconnect I get
> > a Certificate Validation Failure message from the server.
> >
> > Is there anything else I can do to debug this?
>
> My first guess is that your certificate is issued by an intermediate CA
> that isn't known to the server, and thus we need to provide it on the
> wire.
>
> And that you don't have your corporate CAs installed correctly on your
> system, otherwise you wouldn't need to give the --servercert argument.
>
> Amusingly, the certificate identity is sent in cleartext by Cisco's
> protocol, unlike some other VPNs. So if you do a packet capture (on the
> physical network) of the AnyConnect client connecting, and compare with
> the OpenConnect connection, you should be able to see that OpenConnect
> sends only one certificate while AnyConnect managed to find the issuer
> in the Windows certificate store and sends that too.
>
>
_______________________________________________
openconnect-devel mailing list
[email protected]
http://lists.infradead.org/mailman/listinfo/openconnect-devel