good question,
looks like it is missing an implementation...

On 7 June 2016 13:02:09 CEST, Ondrej Holy <oh...@redhat.com> wrote:
>Hi Armin,
>
>thanks for your response. So what is .config/freerdp/certs good for
>then?
>
>2016-06-07 10:46 GMT+02:00 Armin Novak <armin.no...@thincast.com>:
>
>> Hi,
>>
>> currently only the hashes in .config/freerdp/known_hosts and
>> .config/freerdp/known_hosts2 are checked.
>> Hashes in known_hosts2 consist of a '<host> <port> <fingerprint>
>> [subject base64] [issuer base64]' syntax.
>> (the implementation resides in libfreerdp/crypto/certificate.c)
>> NOTE: known_hosts is deprecated and only kept for compatibility with
>> older versions of freerdp.
>>
>> best
>> Armin
>>
>> On 06/03/2016 02:16 PM, Ondrej Holy wrote:
>> > Hello,
>> >
>> > may a local certificate store be used to avoid the certificate
>prompt?
>> >
>> > I exported remote desktop certificate from Microsoft Windows Server
>2008:
>> > mmc -> file -> add snap-in -> certificates -> add -> computer
>account ->
>> > finish -> certificates -> remote desktop -> certificates -> SERVER
>->
>> open
>> > -> details -> copy to file -> CA.cer
>> >
>> > I converted the certificate to pem and created hash file for it:
>> > openssl x509 -inform DER -in CA.cer -out CA.pem
>> > ln -s CA.pem $(openssl x509 -hash -noout -in CA.pem).0
>> > ~/.config/freerdp/certs
>> >
>> > Then I tried to connect and still see the certificate prompt:
>> > $ xfreerdp /u:USER /p:PASS /v:SERVER
>> > [12:26:00:200] [5674:5675] [INFO][com.freerdp.client.x11] -
>Certificate
>> > details:
>> > [12:26:00:200] [5674:5675] [INFO][com.freerdp.client.x11] -    
>Subject:
>> CN
>> > = SERVER
>> > [12:26:00:200] [5674:5675] [INFO][com.freerdp.client.x11] -    
>Issuer:
>> CN
>> > = SERVER
>> > [12:26:00:200] [5674:5675] [INFO][com.freerdp.client.x11] -
>>  Thumbprint:
>> > c9:1b:cf:6c:af:23:67:51:15:0d:27:ab:6b:62:9f:fe:ea:0d:5a:ee
>> > [12:26:00:200] [5674:5675] [INFO][com.freerdp.client.x11] - The
>above
>> X.509
>> > certificate could not be verified, possibly because you do not have
>the
>> CA
>> > certificate in your certificate store, or the certificate has
>expired.
>> > Please look at the documentation on how to create local certificate
>store
>> > for a private CA.
>> > [12:26:00:200] [5674:5675] [INFO][com.freerdp.client.x11] - Do you
>trust
>> > the above certificate? (Y/N)
>> >
>> > But the certificate is seen by OpenSSL correctly as per strace:
>> > [pid  5220] stat("/etc/pki/tls/certs/31605bb4.0", 0x7f5b546370b0) =
>-1
>> > ENOENT (No such file or directory)
>> > [pid  5220] stat("/home/oholy/.config/freerdp/certs/31605bb4.0",
>> > {st_mode=S_IFREG|0644, st_size=1058, ...}) = 0
>> > [pid  5220] open("/home/oholy/.config/freerdp/certs/31605bb4.0",
>> O_RDONLY)
>> > = 14
>> > [pid  5220] stat("/home/oholy/.config/freerdp/certs/31605bb4.1",
>> > 0x7f5b546370b0) = -1 ENOENT (No such file or directory)
>> >
>> > Subject == Issuer so I thought that following should work, but it
>isn't:
>> > $ openssl verify -CAfile CA.pem CA.pem
>> > CA.pem: CN = SERVER
>> > error 20 at 0 depth lookup:unable to get local issuer certificate
>> >
>> > So I suppose this is not a bug in FreeRDP, but I have to generate
>the
>> cert
>> > another way, or import the root cert into the system somehow
>probably...
>> am
>> > I right? Can you help me with it? Is there any documentation
>regarding
>> the
>> > local certificate store?
>> >
>> > Thanks in advance!
>>
>>
>>
>>
>------------------------------------------------------------------------------
>> What NetFlow Analyzer can do for you? Monitors network bandwidth and
>> traffic
>> patterns at an interface-level. Reveals which users, apps, and
>protocols
>> are
>> consuming the most bandwidth. Provides multi-vendor support for
>NetFlow,
>> J-Flow, sFlow and other flows. Make informed decisions using capacity
>> planning reports.
>https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
>> _______________________________________________
>> FreeRDP-devel mailing list
>> FreeRDP-devel@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/freerdp-devel
>>
>
>
>
>-- 
>Regards
>
>Ondrej

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are 
consuming the most bandwidth. Provides multi-vendor support for NetFlow, 
J-Flow, sFlow and other flows. Make informed decisions using capacity 
planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
_______________________________________________
FreeRDP-devel mailing list
FreeRDP-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freerdp-devel

Reply via email to