I would like to second this problem.  I have several servers doing
client side auth.  They were all running 2.6.0 with openssl 0.9.4 and
worked just fine.  I upgraded to 2.6.2 and openssl 0.9.5 and now they
don't work with Netscape 4.72.

I'm going to do more testing, but wanted to add another data point.

-Jeremy

"HIROSE, Masaaki" wrote:
> 
> Client authentication came to fail in following situation.
> 
> Client:
>   c1: MSIE 5.0  (5.00.2314.1003) / Windows NT 4.0 SP5
>   c2: MSIE 5.01 (5.00.2919.6307) / Windows NT 4.0 SP5
> 
> Server:
>   s1: apache-1.3.11 + mod_ssl-2.5.0 + OpenSSL-0.9.4
>   s2: apache-1.3.12 + mod_ssl-2.6.0 + OpenSSL-0.9.4
>   s3: apache-1.3.12 + mod_ssl-2.6.1 + OpenSSL-0.9.5
>   s4: apache-1.3.12 + mod_ssl-2.6.2 + OpenSSL-0.9.5
> 
> OS:
>   linux 2.2.14 / glibc-2.1.3 / gcc 2.95.3
>   linux 2.2.14 / glibc-2.0.7 / gcc 2.7.2.3
> 
> client c2(MSIE 5.01) is OK in all case (s1-s4).
> Netscape Communicator 4.7 (linux) and 4.72 (MacOS) is OK, too.
> 
> But client c1(MSIE 5.0) is OK only in s1.
> 
> error message is here.
> # SSLLogLevel trace
> 
> ----------8<----------8<----------8<----------8<----------8<----------
> [03/Mar/2000 00:33:00 29531] [info]  Connection to child 2 established (server 
>www0.irori.org:443, client 10.6.25.163)
> [03/Mar/2000 00:33:00 29531] [info]  Seeding PRNG with 1024 bytes of entropy
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Handshake: start
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Loop: before/accept initialization
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Loop: SSLv3 read client hello A
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Loop: SSLv3 write server hello A
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Loop: SSLv3 write certificate A
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Loop: SSLv3 write key exchange A
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Loop: SSLv3 write server done A
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Loop: SSLv3 flush data
> [03/Mar/2000 00:33:00 29531] [trace] OpenSSL: Exit: failed in SSLv3 read client 
>certificate A
> [03/Mar/2000 00:33:00 29531] [info]  Spurious SSL handshake interrupt[Hint: Usually 
>just one of those OpenSSL confusions!?]
> ----------8<----------8<----------8<----------8<----------8<----------
> 
> o CA's DN
>   subject=/C=JP/ST=Tokyo/L=Nakano ku/O=IRORI/CN=Root CA inside 
>[EMAIL PROTECTED]
> 
> o Server's DN
>   subject=/C=JP/ST=Tokyo/O=IRORI/OU=HTTP 
>[EMAIL PROTECTED]
> 
> o Client's DN
>   
>[EMAIL PROTECTED]
> 
> it is because of mod_ssl ? or OpenSSL ?
> 
> --
> HIROSE, Masaaki
> ______________________________________________________________________
> Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> User Support Mailing List                      [EMAIL PROTECTED]
> Automated List Manager                            [EMAIL PROTECTED]

-- 
Jeremy Beker, Technical Manager
Research & Development, 3-G International
S/MIME Cert: http://employees.3gi.com/~jbeker/
Condensing fact from the vapor of nuance.
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to