Hello Martin,
thanks for the reply.
I have those directives already and it all works until I add:
*SSLVerifyClient require*

I changed this directive to *optional* and it seems to work now, though I am
not so confidant in this configuration.
I wonder if there is a way to pass the client cert through to the python
proxy?

Thanks,
G40

On Tue, Jan 18, 2011 at 9:30 AM, Martin Kuba <ma...@ics.muni.cz> wrote:

> Hi G40,
>
> the "SSLVerifyClient require" requires that the client presents a
> certificate.
> You have to configure also the list of Certification Authorities that
> the server accepts by the following directives:
>
>  SSLCACertificatePath /etc/ssl/certs/
> or
>  SSLCACertificateFile /etc/apache2/ssl.crt/ca-bundle.crt
>
> If the client certificate is not signed by a root CA, but by some
> intermediate CA,
> which may be in turn signed by another intermediate CA, etc., you need also
> to set the value for SSLVerifyDepth to the highest length of the
> certificate chain
> that the client may provide.
>
> The "Allow" directives play no role in this, because the error you have got
> happened during the SSL handshake, which is sooner than the Allow
> directives are applied.
>
> Martin
>
> Dne 18.1.2011 16:16, g f napsal(a):
>
>  Hello all,
>> I have a debian os running Apache 2.2.16(debian) along with tomcat 6.0.29.
>> I use mod_jk as well as mod_auth_kerb module for apache. Apache and the
>> modules are debian repository packages.
>>
>> I recently attempted to activate common access cards and if I just
>> activate them but do not force them it works great.
>> Once I force access cards, I get the following error and my web-apps
>> break.
>>
>> Force access cards via:
>> |SSLVerifyClient require
>> SSLVerifyDepth 2|
>>
>> info level logging error.log:
>> [Tue Jan 18 14:47:07 2011] [info] [client 127.0.1.1] SSL library error 1
>> in handshake (server myserver.xxx.xxx.xxx:443)
>> [Tue Jan 18 14:47:07 2011] [info] SSL Library Error: 336105671
>> error:140890C7:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return
>> a certificate No CAs known to server for verification?
>>
>> The web-app that throws this message uses a python proxy to make an ajax
>> call to a different web context (we do this to avoid the cross site error).
>> I believe what is happening is that the python script [client 127.0.1.1]
>> is making the request to apache without valid client certs and hence is
>> getting denied.
>> I have a directive in apache2_home/sites-enabled/default-ssl conf file
>> that I had hoped would solve this issue(however it does not).
>> directive in default-ssl conf file
>> |Allow from localhost
>> Allow from 127.0.1.1
>> Allow from 127.0.0.1
>>
>> |Is there a solution to this issue?
>> Perhaps a way to not require client cert from localhost?
>> Thanks for any advice, much appreciated!
>>
>> Cheers,
>>  G40
>>
>
>
> --
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Supercomputing Center Brno             Martin Kuba
> Institute of Computer Science    email: ma...@ics.muni.cz
> Masaryk University             
> http://www.ics.muni.cz/~makub/<http://www.ics.muni.cz/%7Emakub/>
> Botanicka 68a, 60200 Brno, CZ     mobil: +420-603-533775
> --------------------------------------------------------------
>
>

Reply via email to