Cohen, Laurence wrote:
Thank you Standa,

Option number 2 isn't possible at our site.  Would you be able to
explain number 1 to me?  I'm very green with mod_nss so I don't know how
to set this up.

The problem you're seeing is that in proxy mode, mod_nss is acting as a client and it doesn't trust or know the issuer of the server certificate it is contacting. So you need to get that CA cert (or chain) and add it to the mod_nss NSS database.

You can add it ala:

# certutil -A -d /etc/httpd/alias -n <some useful unique nickname> -t CT,, -a -i /path/to/ca.pem

rob


Thanks,

Larry C.

On Mon, Aug 31, 2015 at 3:14 AM, [email protected] <mailto:[email protected]>
<[email protected] <mailto:[email protected]>> wrote:

    On Thu, 27 Aug 2015 14:36:06 -0400
    "Cohen, Laurence" <[email protected] <mailto:[email protected]>>
    wrote:

    Hi Laurence,

     > Hi,
     >
     > I'm trying to set up an nss.conf to use while we are doing
    maintenance
     > which will point all ssl traffic to a file called maintenance.html
     > which simply states that we are doing maintenance on the server.  The
     > rewrite.conf we have set up is working fine for port 80 traffic, but
     > the nss.conf is not working.
     >
     > Here are the errors I'm getting.  BTW, we are using a self signed
    cert
     > because this is our test system.  I figured this would cause an info
     > or at most a warning message, but not an error message.
     >
     > [Thu Aug 27 13:38:00 2015] [info] Connection to child 0 established
     > (server jamie-web1:443, client "Server IP")
     > [Thu Aug 27 13:38:00 2015] [info] Connection to child 7 established
     > (server jamie-web1:443, client "Server IP")
     > [Thu Aug 27 13:38:00 2015] [info] SSL input filter read failed.
     > [Thu Aug 27 13:38:00 2015] [error] SSL Library Error: -12195 Peer
     > does not recognize and trust the CA that issued your certificate
     > [Thu Aug 27 13:38:00 2015] [info] Connection to child 7 closed
    (server
     > jamie-web1.novetta.com:443 <http://jamie-web1.novetta.com:443>,
    client Server IP)
     > [Thu Aug 27 13:38:00 2015] [info] SSL library error -8172 writing
    data
     > [Thu Aug 27 13:38:00 2015] [info] SSL Library Error: -8172
     > Certificate is signed by an untrusted issuer
     > [Thu Aug 27 13:38:00 2015] [error] (20014)Internal error: proxy: pass
     > request body failed to 10.3.238.21:443 <http://10.3.238.21:443>
    (jamie-web1)
     > [Thu Aug 27 13:38:00 2015] [error] proxy: pass request body failed to
     > Server IP:443 (jamie-web1) from Server IP ()
     > [Thu Aug 27 13:38:00 2015] [info] Connection to child 1 closed
    (server
     > jamie-web1:443, client "Workstation IP")
     >

    I suppose that this problem is with CA certificate on remote server:

    You have two possible solution:

    1. add CA from remote server to your certificate database at PROXY
    server
    2. build mod_nss with a patch from this email


    PS: I have already worked on a similar problem for our customer.

    Have nice day

    Standa

     > This is the nss.conf I'm using.
     >
     > Listen 443
     >
     > AddType application/x-x509-ca-cert .crt
     > AddType application/x-pkcs7-crl    .crl
     >
     > NSSPassPhraseDialog file:/etc/httpd/.password.conf
     > #NSSPassPhraseDialog  builtin
     >
     > NSSPassPhraseHelper /usr/sbin/nss_pcache
     >
     > NSSSessionCacheSize 10000
     > NSSSessionCacheTimeout 100
     > NSSSession3CacheTimeout 86400
     >
     >
     > NSSRandomSeed startup builtin
     >
     >
     > <VirtualHost _default_:443>
     >
     > DocumentRoot "/var/www/docroot"
     > NSSProxyCheckPeerCN Off
     > NSSEngine on
     > NSSProxyEngine on
     > NSSEnforceValidCerts off
     > NSSRenegotiation on
     > NSSRequireSafeNegotiation on
     >
     > NSSCipherSuite
     >
    
+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha
     >
     > NSSProxyCipherSuite
     >
    
+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha
     >
     > NSSProtocol TLSv1
     > NSSNickname Server-Cert
     > NSSCertificateDatabase /etc/httpd/alias
     > NSSFIPS on
     > NSSOCSP off
     >
     > ProxyPreserveHost On
     >
     >
     > <Location />
     > #SSLRenegBufferSize 52430000
     >       NSSVerifyClient optional
     >       NSSOptions +ExportCertData +StdEnvVars
     >       ProxyPass https://jamie-web1/maintenance.html
     >       ProxyPassReverse https://jamie-web1/maintenance.html
     > </Location>
     >
     > <Files ~ "\.(cgi|shtml|phtml|php3?)$">
     >     NSSOptions +StdEnvVars
     > </Files>
     > <Directory "/var/www/cgi-bin">
     >     NSSOptions +StdEnvVars
     > </Directory>
     >
     >
     > # initialize the SSL headers to a blank value to avoid http header
     > forgeries RequestHeader set SSL_CLIENT_CERT ""
     > RequestHeader set SSL_CIPHER ""
     > RequestHeader set SSL_SESSION_ID ""
     > RequestHeader set SSL_CIPHER_USEKEYSIZE ""
     >
     > RequestHeader set SSL_CLIENT_CERT "%{SSL_CLIENT_CERT}s"
     > RequestHeader set SSL_CIPHER "%{SSL_CIPHER}s"
     > RequestHeader set SSL_SESSION_ID "%{SSL_SESSION_ID}s"
     > RequestHeader set SSL_CIPHER_USEKEYSIZE "%{SSL_CIPHER_USEKEYSIZE}s"
     >
     > CustomLog /var/log/httpd/ssl_request_log "%t %h %{SSL_CLIENT_CERT}x
     > %{SSL_CLIENT_S_DN}x %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
     >
     >
     > ErrorLog /etc/httpd/logs/error_log
     > TransferLog /etc/httpd/logs/access_log
     > LogLevel info
     >
     > </VirtualHost>
     >
     > If anyone can help I'd appreciate it.
     >
     > Thanks,
     >
     > Larry Cohen


    _______________________________________________
    Mod_nss-list mailing list
    [email protected] <mailto:[email protected]>
    https://www.redhat.com/mailman/listinfo/mod_nss-list




--

www.novetta.com

Larry Cohen

System Administrator


12021 Sunset Hills Road, Suite 400

Reston, VA 20190

Email [email protected] <http://novetta.com>

Office 703-885-1064



_______________________________________________
Mod_nss-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/mod_nss-list


_______________________________________________
Mod_nss-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/mod_nss-list

Reply via email to