Re: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-29 Thread Marc Schöchlin
Hi,

thanks for your response.

I know that F5 loadbalancers can do this - unfortunately i use a shared
loadbalancer without the possibility to do fast changes to the
certificate revocation list.

Regards
Marc

 
Am 28.06.2014 19:54, schrieb Marco Pizzoli:
 Hi Marc,
 as F5 user maybe you are not yet aware that with F5, leveraging
 iRules, you can:
 - implement client cert verification/validation, also specifically
 checking the CN of the certificate
 - publish to the apache backend custom HTTP headers carrying
 informations extracted from the client certificate

 Both cases are well documented on the F5 site. The first one in
 particular I can say by having implemented on my own.

 Is it something useful to your case?

 Regards
 Marco




 On Sat, Jun 28, 2014 at 5:04 PM, Marc Schöchlin m...@256bit.org
 mailto:m...@256bit.org wrote:

 Hi,

 On 06/26/2014 04:08 PM, andre.wen...@bmw.de
 mailto:andre.wen...@bmw.de wrote:
  Why do you terminate the ssl on the F5 and not on the
 Apache-backend? We load balance IP/Port-based on the F5 and
 terminate the SSL on the Apache backend, so you would be able to
 turn on your SSLEngine and Proxy the SSL from the F5 on the SSL
 Standard SSL Port 443 of the Apache and you can do everything you
 want because you have all SSL information.

 i use a wildcard certificate on my frontend ip to do irule-based
 (looking for the hostheader) backend pool selection.
 Therefore it would be good to terminate ssl in the f5.

 I will now use a new frontend ip on the loadbalancer and i then i
 will forward the traffic to the backend servers

 Regards
 Marc

 --
 GPG encryption available: 0x670DCBEC/pool.sks-keyservers.net
 http://pool.sks-keyservers.net


 -
 To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
 mailto:users-unsubscr...@httpd.apache.org
 For additional commands, e-mail: users-h...@httpd.apache.org
 mailto:users-h...@httpd.apache.org





Re: AW: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-28 Thread Marc Schöchlin
Hi,

On 06/26/2014 04:08 PM, andre.wen...@bmw.de wrote:
 Why do you terminate the ssl on the F5 and not on the Apache-backend? We load 
 balance IP/Port-based on the F5 and terminate the SSL on the Apache backend, 
 so you would be able to turn on your SSLEngine and Proxy the SSL from the F5 
 on the SSL Standard SSL Port 443 of the Apache and you can do everything you 
 want because you have all SSL information.

i use a wildcard certificate on my frontend ip to do irule-based (looking for 
the hostheader) backend pool selection.
Therefore it would be good to terminate ssl in the f5.

I will now use a new frontend ip on the loadbalancer and i then i will forward 
the traffic to the backend servers

Regards
Marc

-- 
GPG encryption available: 0x670DCBEC/pool.sks-keyservers.net


-
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org



Re: AW: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-28 Thread Marco Pizzoli
Hi Marc,
as F5 user maybe you are not yet aware that with F5, leveraging iRules, you
can:
- implement client cert verification/validation, also specifically checking
the CN of the certificate
- publish to the apache backend custom HTTP headers carrying informations
extracted from the client certificate

Both cases are well documented on the F5 site. The first one in particular
I can say by having implemented on my own.

Is it something useful to your case?

Regards
Marco




On Sat, Jun 28, 2014 at 5:04 PM, Marc Schöchlin m...@256bit.org wrote:

 Hi,

 On 06/26/2014 04:08 PM, andre.wen...@bmw.de wrote:
  Why do you terminate the ssl on the F5 and not on the Apache-backend? We
 load balance IP/Port-based on the F5 and terminate the SSL on the Apache
 backend, so you would be able to turn on your SSLEngine and Proxy the SSL
 from the F5 on the SSL Standard SSL Port 443 of the Apache and you can do
 everything you want because you have all SSL information.

 i use a wildcard certificate on my frontend ip to do irule-based (looking
 for the hostheader) backend pool selection.
 Therefore it would be good to terminate ssl in the f5.

 I will now use a new frontend ip on the loadbalancer and i then i will
 forward the traffic to the backend servers

 Regards
 Marc

 --
 GPG encryption available: 0x670DCBEC/pool.sks-keyservers.net


 -
 To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
 For additional commands, e-mail: users-h...@httpd.apache.org




AW: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-26 Thread Andre.Wendel
Why do you terminate the ssl on the F5 and not on the Apache-backend? We load 
balance IP/Port-based on the F5 and terminate the SSL on the Apache backend, so 
you would be able to turn on your SSLEngine and Proxy the SSL from the F5 on 
the SSL Standard SSL Port 443 of the Apache and you can do everything you want 
because you have all SSL information.

Cheers,
André

-Ursprüngliche Nachricht-
Von: Eric Covener [mailto:cove...@gmail.com] 
Gesendet: Donnerstag, 26. Juni 2014 00:05
An: users@httpd.apache.org
Betreff: Re: [users@httpd] Client certificate auth behind f5 loadbalancer

On Wed, Jun 25, 2014 at 5:53 PM, Marc Schöchlin m...@256bit.org wrote:
 in my understanding authentication using client certificates is just a
 cryptographic validation of a public/private keypair over a already
 established ssl-secured channel.
 For example, it is possible to use a official certificate for the ssl
 channel and my own ca for client certificate validation.

It's part of the handshake, which can be later scrutinized by the
application layer.

However, there is no standard way to share the the client certificate
authenticated by a proxy with a backend origin server, and no way at
all that mod_ssl is willing to receive (that I am aware of)

-- 
Eric Covener
cove...@gmail.com

-
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org



[users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-25 Thread Marc Schöchlin
Hello apache-users,

i'm trying to implement client certificate authentication behind a f5
loadbalancer.

My loadbalancer terminates ssl, and dispatches the decrypted
communication via network address translation to the backend apache server.
The client certificate auth should be performed at the webserver.

Unfortunately the SSLVerifyClient directive is ignored and access is
always granted.
It seems that without enabled ssl transport encryption, the logic for
SSLVerifyClient is deactivated.


Any hints?

Setup Overview:

[Browser with client cert]-HTTPS/443-[Loadbalancer with SSL
termination]--HTTP/80--[Apache 2.2.11]

Apache Configuration:
---
VirtualHost *:80
DocumentRoot /data/etc/htdocs

ServerName fooo-bar-test.f.de

CustomLog |/usr/sbin/rotatelogs -l
/data/logs/access-guisel-test.f.de.%Y-%m-%d.log 86400
combined_foobar_withdomain
ErrorLog |/usr/sbin/rotatelogs -l
/data/logs/error-guisel-test.f.de.%Y-%m-%d.log 86400

SSLCACertificateFile /datashare/etc/ca/keys/ca.crt
# SSLCARevocationFile /datashare/etc/ca/keys/ca.crl

Location /
SSLVerifyClient require
SSLVerifyDepth 10
SSLRequire%{SSL_CLIENT_S_DN_O}  eq Foobar
Satisfy all
/Location

/VirtualHost
---



Regards Marc

-
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org



Re: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-25 Thread Eric Covener
On Wed, Jun 25, 2014 at 3:08 PM, Marc Schöchlin m...@256bit.org wrote:
 [Browser with client cert]-HTTPS/443-[Loadbalancer with SSL
 termination]--HTTP/80--[Apache 2.2.11]


What certificate would Apache have access to if the LB communicates to
it with HTTP?

-- 
Eric Covener
cove...@gmail.com

-
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org



Re: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-25 Thread Jens-U. Mozdzen

Hi Marc,

Zitat von Marc Schöchlin m...@256bit.org:

Hello apache-users,

i'm trying to implement client certificate authentication behind a f5
loadbalancer.

My loadbalancer terminates ssl, and dispatches the decrypted
communication via network address translation to the backend apache server.
The client certificate auth should be performed at the webserver.

Unfortunately the SSLVerifyClient directive is ignored and access is
always granted.
It seems that without enabled ssl transport encryption, the logic for
SSLVerifyClient is deactivated.


Any hints?


yes, your web server is only seeing the plain HTTP traffic - all the  
SSL stuff got stripped at the load balancer.


You're so to speak asking to look at the post stamp of a letter, while  
you only received the content because your mail service already  
unpacked everything and dumped the envelope...


Regards,
Jens



-
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org



Re: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-25 Thread Marc Schöchlin
Hi,

in my understanding authentication using client certificates is just a
cryptographic validation of a public/private keypair over a already
established ssl-secured channel.
For example, it is possible to use a official certificate for the ssl
channel and my own ca for client certificate validation.

Meanwhile i tried to find the suitable RFC to get details about this
problem - probably http://tools.ietf.org/html/rfc5246#page-55 might be
the right one.
Does anybody have the suitable background knowhow of the RFC and mod_ssl
to help me to find out source of the problem?

Regards
Marc

Am 25.06.2014 21:15, schrieb Jens-U. Mozdzen:
 Hi Marc,

 Zitat von Marc Schöchlin m...@256bit.org:
 Hello apache-users,

 i'm trying to implement client certificate authentication behind a f5
 loadbalancer.

 My loadbalancer terminates ssl, and dispatches the decrypted
 communication via network address translation to the backend apache
 server.
 The client certificate auth should be performed at the webserver.

 Unfortunately the SSLVerifyClient directive is ignored and access is
 always granted.
 It seems that without enabled ssl transport encryption, the logic for
 SSLVerifyClient is deactivated.


 Any hints?

 yes, your web server is only seeing the plain HTTP traffic - all the
 SSL stuff got stripped at the load balancer.

 You're so to speak asking to look at the post stamp of a letter, while
 you only received the content because your mail service already
 unpacked everything and dumped the envelope...

 Regards,
 Jens



 -
 To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
 For additional commands, e-mail: users-h...@httpd.apache.org



-
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org



Re: [users@httpd] Client certificate auth behind f5 loadbalancer

2014-06-25 Thread Eric Covener
On Wed, Jun 25, 2014 at 5:53 PM, Marc Schöchlin m...@256bit.org wrote:
 in my understanding authentication using client certificates is just a
 cryptographic validation of a public/private keypair over a already
 established ssl-secured channel.
 For example, it is possible to use a official certificate for the ssl
 channel and my own ca for client certificate validation.

It's part of the handshake, which can be later scrutinized by the
application layer.

However, there is no standard way to share the the client certificate
authenticated by a proxy with a backend origin server, and no way at
all that mod_ssl is willing to receive (that I am aware of)

-- 
Eric Covener
cove...@gmail.com

-
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org