On 11/04/2014 10:16 p.m., Amm wrote:
> Hello,
> 
> Yesterday I upgraded OpenSSL version. (Although I was using OpenSSL 1.0.0 - 
> not affected by Heartbleed, but I upgraded none-the-less)
> 
> 
> I am using sslbump (squid 3.4.4). Using Firefox 28.0 (latest 64bit tar.bz2)
> 
> After this upgrade i.e. from 1.0.0 to 1.0.1, Firefox started giving 
> certificate error stating "sec_error_inadequate_key_usage".
> 
> This does not happen for all domains but looks like happening ONLY for google 
> servers. i.e. youtube, news.google.com
> 
> Certificate is issued for *.google.com with lots of alternate names.
> 
> I also recompiled squid (with new OpenSSL) just to be sure.
> 
> I also cleared certificate store.
> 
> But error still occurs.
> 
> 
> Google search gave me a patch for this for 3.3.9. But just wanted to make 
> sure if there is any other way to resolve this issue? (Like some squid 
> configuration directive)
> 
> So please let me know, if patch is the only way OR this has been resolved?
> 
> Is it Firefox bug or squid bug?
> 

Hard to say.
 Is software correctly verifying and rejecting invalid SSL certficates a
bug?

"key_usage" is an explicit restriction on what circumstances and actions
the certificate can be used for.

What the message you are seeing indicates one of two things:
Either, the website owner has placed some limitations on how their
website certificate can be used and your SSL-bumping is violating those
restrictions.

Or, the creator of the certificate you are using to sign the generated
SSL-bump certificates has restricted your signing certificate
capabilities. (ie the main Trusted Authorities prohibit using certs they
sign as secondary CA to generate fake certs like SSL-bump does).

Either case is just as likely.

Amos

Reply via email to