R: clent authentication using a smard card

2009-10-20 Thread Marcello Marangio


> -Messaggio originale-
> Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> Inviato: martedì 20 ottobre 2009 13.03
> A: 'Tomcat Users List'
> Oggetto: RE: clent authentication using a smard card
> 
> > -----Original Message-
> > From: Marcello Marangio [mailto:m.maran...@innova.puglia.it]
> > > Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> > > > From: Marcello Marangio [mailto:m.maran...@innova.puglia.it]
> > > > > Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> > > >
> > > > Ok.
> > > > I made the same thing with IE and in the debug it says "null cert
> > > > chain"
> > > > during the client authentication handshake.
> > > > Now I am confused...
> > > >
> > >
> > > Lets step back and look.
> > >
> > > Can you provide the smart card and server certificate chain
> > (no keys
> > > please)?
> >
> > Hang on a second...
> > The server certificate is an self signed certificate I made
> > with keytool.
> > The smart card certificate, instead, is a real one, I use to
> > legally sign electronic documents; the issuer is an Italian CA.
> >
> > Do you expect the issuer of the smart card certificate to be
> > the same as the server one?
> 
> Not always.
> 
> Lets take for example:
> 
> 
> https://mail.pdinc.us <-PD Inc Public CA<-PD Inc Root CA
> 
>  and
> 
> MySmartCard <- DOD EMAIL CA-15 <- DoD Root CA-2
> 
> The smime cert used on this email
> 
> I can use my smart card to auth againstthe server. But the server must
> know
> about DoD Root CA-2.
> 


Ok. In my case:


https://localhost <- self signed certificate
and
Mysmartcard <- my certificate <- infocamere root CA

And in my trusted certificates keystore there is infocamere root CA.

Please find in attachment a signed text file you can read my cert info from.

Thanks
Marcello


myfile.txt.p7m
Description: S/MIME encrypted message

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

R: clent authentication using a smard card

2009-10-20 Thread Marcello Marangio


> -Messaggio originale-
> Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> Inviato: martedì 20 ottobre 2009 12.13
> A: 'Tomcat Users List'
> Oggetto: RE: clent authentication using a smard card
> 
> 
> 
> 
> > -----Original Message-
> > From: Marcello Marangio [mailto:m.maran...@innova.puglia.it]
> > Sent: Tuesday, October 20, 2009 5:10
> > To: 'Tomcat Users List'
> > Subject: R: clent authentication using a smard card
> >
> >
> >
> > > -Messaggio originale-
> > > Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> > > Inviato: lunedì 19 ottobre 2009 20.21
> > > A: 'Tomcat Users List'
> > > Oggetto: RE: clent authentication using a smard card
> > >
> > 
> > > >
> > > >
> > >
> > > Do you have access to IE on windows for this? If you do, it will be
> > > much quicker, and easier.
> > >
> > > I am just trying to get a baseline established, so I can
> > plow throught
> > > with my ten steps.
> > >
> >
> > Ok.
> > I made the same thing with IE and in the debug it says "null
> > cert chain"
> > during the client authentication handshake.
> > Now I am confused...
> >
> 
> Lets step back and look.
> 
> Can you provide the smart card and server certificate chain (no keys
> please)?

Hang on a second...
The server certificate is an self signed certificate I made with keytool.
The smart card certificate, instead, is a real one, I use to legally sign
electronic documents; the issuer is an Italian CA.

Do you expect the issuer of the smart card certificate to be the same as the
server one?

How can I print out the certificate chain?
Thanks again
M

> 
> > M
> >
> >
> > -
> > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> > For additional commands, e-mail: users-h...@tomcat.apache.org
> >
> >
> 
> 
> 
> --
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> -   -
> - Jason Pyeron  PD Inc. http://www.pdinc.us -
> - Principal Consultant  10 West 24th Street #100-
> - +1 (443) 269-1555 x333Baltimore, Maryland 21218   -
> -   -
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> This message is copyright PD Inc, subject to license 20080407P00.
> 
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



R: clent authentication using a smard card

2009-10-20 Thread Marcello Marangio


> -Messaggio originale-
> Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> Inviato: lunedì 19 ottobre 2009 20.21
> A: 'Tomcat Users List'
> Oggetto: RE: clent authentication using a smard card
> 

> >
> >
> 
> Do you have access to IE on windows for this? If you do, it will be much
> quicker, and easier.
> 
> I am just trying to get a baseline established, so I can plow throught
> with my
> ten steps.
> 

Ok.
I made the same thing with IE and in the debug it says "null cert chain"
during the client authentication handshake.
Now I am confused...

M


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



R: clent authentication using a smard card

2009-10-19 Thread Marcello Marangio
Hi Jason, tank for your answer.

> >
> > Hi all
> >
> > This is my very first message in the list.
> >
> > I am trying to use the ssl and client authentication feature
> > in tomcat 6, using a pkcs11 compliant smart card reader and a
> > real authentication smart card (Italian CNS).
> >
> > In the browser (firefox) I obtain a
> 
> First, make sure your browser knows about the certificate and smart card
> reader.
> We have been having with recent firefox releases on this. The debuging
> steps I
> would take are 1) Use Windows / IE, if the server requires or requests a
> client
> cert it will pop up a selection window even if IE does not know how to
> fulfil
> the request. Thi will indicate if Tomcat is or is not requesting client
> certs.
> 2) Verify IE know about the smart card cert, user the certmgr.msc to see
> if the
> smartcard certificate is installed, as well as the trust chain.
> 3) Verify IE prompts for the smartcard cert in the client cert popup
> selection
> dialog.
> 4) Verify Tomcat <-> IE talk over SSL.
> 
> 
> >

It seems that firefox behaves: if the smartcard is in firefox asks the PIN
of the smartcard. 
I am pretty sure it can read my smartcard, because I can use mod_ssl with
Apache 2.2 and I can read the certificate's information with a perl routine.

Furthermore, from the debug logs it is clear that there is an ssl
handshaking going on.
Any clue?
Thanks
M


[CUT ]

> >
> > Is tomcat's behavoir correct or is it a bug?
> >
> 
> The above steps will allow a more quickly diagnosis.
> 
> >
> >
> > Thanks a million
> >
> > Marcello
> >



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



clent authentication using a smard card

2009-10-19 Thread Marcello Marangio
Hi all

This is my very first message in the list.

I am trying to use the ssl and client authentication feature in tomcat 6,
using a pkcs11 compliant smart card reader and a real authentication smart
card (Italian CNS). 

In the browser (firefox) I obtain a ssl_error_certificate_unknown_alert or a
ssl_error_bad_certificate_alert.

 

SSL without client authentication works perfectly.

 

This is my server configuration:

 



 

tomcat.keystore contains the self signed x509 certificate I use to perform
the server ssl handshake.

cacerts contains the root certificate of my signature and non repudiation
certificate contained in my smartcard.

 

>From tomcat's log I obtained setting up
JAVA_OPTS=-Djavax.net.debug=ssl,handshake I am sure that:

1)   the root certificate is trusted (imported In cacerts with keytool
-import -trustcacert .)

 

adding as trusted cert:

  Subject: CN=InfoCamere Firma Qualificata, OU=Certificatore Accreditato del
Sistema Camerale, SERIALNUMBER=02313821007,

 O=InfoCamere SCpA, C=IT

  Issuer:  CN=InfoCamere Firma Qualificata, OU=Certificatore Accreditato del
Sistema Camerale, SERIALNUMBER=02313821007,

 O=InfoCamere SCpA, C=IT

  Algorithm: RSA; Serial number: 0x1

  Valid from Wed Mar 24 16:48:50 CET 2004 until Thu Mar 24 16:47:52 CET 2016

 

2)   The client certificate is taken from the smartcard and It's given
to the server; furthermore, the issuer is exactly tue trusted one:

 

*** Certificate chain

chain [0] = [

[

  Version: V3

  Subject: CN=Marcello Marangio, DNQ=20071112354269,
SERIALNUMBER=IT:MRNMCL70C21A662D, GIVENNAME=MARCELLO, SURNAME=MARAN

GIO, O=NON PRESENTE, C=IT

  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Validity: [From: Wed Nov 21 12:11:08 CET 2007,

   To: Sun Nov 21 01:00:00 CET 2010]

  Issuer: CN=InfoCamere Firma Qualificata, OU=Certificatore Accreditato del
Sistema Camerale, SERIALNUMBER=02313821007,

O=InfoCamere SCpA, C=IT

  SerialNumber: [131b58]

 

3)   the browser (firefox) picks up the correct non repudiation
certificate from the smartcard and sends it to the server:

 

[9]: ObjectId: 2.5.29.15 Criticality=true

KeyUsage [

  Non_repudiation

]

   

 

The problem seems to be that tomcat is looking for the digital signature
certificate and not the non_repudiation one.

 

http-8443-1, SEND TLSv1 ALERT:  fatal, description = certificate_unknown

http-8443-1, WRITE: TLSv1 Alert, length = 2

http-8443-1, called closeSocket()

http-8443-1, handling exception: javax.net.ssl.SSLHandshakeException:
sun.security.validator.ValidatorException: KeyUsage does not allow digital
signatures

 

Is tomcat's behavoir correct or is it a bug?

 

Thanks a million

Marcello