I have found a solution to this problem.

This seem to almost work.  I removed certificate database password
protection in Netscape and then added SSLOptions +OptRenegotiate to
httpd.conf.  Now I only get a certificate request when I first enter the
site.  However, it still asks me for a password even though the client has
already enter one for the domain.

Arend van der Veen

-----Original Message-----
From: Arend van der Veen <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date: Thursday, July 29, 1999 7:57 AM
Subject: Help - were should I turn - Netscape and Client Certificates


>I am using mod_ssl_2.3.6_1.3.6.  I generated a client certificate and
>converted to PKCS#12 format.  I Ioaded it into both IE5 and Netscape 4.5.
>Under IE5 everything worked perfectly.  In Netscape I had to trust
>certificate first.  When I access a link on the secure sever I first get
>prompted for a certificate.  After a long delay I then get an error stating
>"Netscape has encountered bad data from the server".  When I check the
error
>log I see an error stating SSL handshake timed out.  If I try the link
>again, I get prompted for the certificate again and a user name and
password
>and then everything works for the rest of the session!!??
>
>What have I done wrong to trip up Netscape ?  Following is a list of how I
>configured the certificates.
>
>Thanks in advance,
>Arend van der Veen
>
>1.    Installed mod_ssl as instructed.
>2.    Generated a CA certificate using CA.sh -newca with out modifying
>openssl.cnf.
>3.    Extended the expiration date to 5 years
>4.    Converted cacert.pem to der format and copied cacert.pem to
>/usr/local/apache_1.3.6/config and cacert.der to apache root.
>5.    Edited openssl.cnf and set nsCertType = server.  This was previously
>commented out.
>6.    Generated and signed Server Certificate.  Copied Server Certificate
>and Key to /usr/local/apache_1.3.6/config.
>7.    Edited openssl.cnf and set nsCertType = client, mail.  This was
>previously commented out. Commented out nsCertType = server.
>8.    Updated httpd.conf
>
>SSLProtocol -all +SSLv3
>SSLCipherSuite HIGH:MEDIUM
>SSLCertificateFile /usr/local/apache_1.3.6/conf/BassAleCert.pem
>SSLCertificateKeyFile /usr/local/apache_1.3.6/conf/BassAleKey.pem
>SSLCACertificateFile /usr/local/apache_1.3.6/conf/cacert.pem
>SSLVerifyClient require
>SSLVerifyDepth  1
><Directory /home/dpserver/securehome>
>AuthType Basic
>AuthName Test
>AuthUserFile /home/dpserver/users/testusers
>AuthGroupFile /home/dpserver/users/testgroups
><Limit GET POST>
>require valid-user
></Limit>
></Directory>
><Location /servlet>
>AuthType Basic
>AuthName Test
>AuthUserFile /home/dpserver/users/testusers
>AuthGroupFile /home/dpserver/users/testgroups
><Limit GET POST>
>require valid-user
></Limit>
></Location>
>
>9.    Generated a client certificate and converted to PKCS#12 format
>
>CA.sh -newreq
>CA.sh -sign
>openssl pkcs12 -export -in newcert.pem -inkey newreq.pem -name "Test User"
\
>-certfile demoCA/cacert.pem -out newcert.p12
>
>
>______________________________________________________________________
>Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
>User Support Mailing List                      [EMAIL PROTECTED]
>Automated List Manager                            [EMAIL PROTECTED]
>
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to