Hello Dave,

On Thu, Apr 24, 2014 at 12:24 PM, Dave Thompson <dthomp...@prinpay.com>wrote:

> > From: owner-openssl-...@openssl.org On Behalf Of Dmitry Belyavsky via RT
> > Sent: Wednesday, April 23, 2014 12:29
> > Cc: openssl-dev@openssl.org
> > Subject: [openssl.org #3325] Problem with client certification
> authorization
>
> > I've got a problem testing s_client/s_server authorization.
> <snip>
> > I expect that server will refuse connection because of invalid client
> cert
> > and required client certificate.
> >
> > I see the following error in stderr of the server:
> <snip>
> > verify error:num=7:certificate signature failure
> <snip>
> > but the server does not close the connection.
> > What's wrong with my test?
> >
> Your expectations. Both s_client and s_server were designed as test/debug
> tools. They set the certverify callback to display results but continue the
> connection, not abort, in order to allow catching any other problems.
> s_client does not abort if the server cert is invalid and s_server does
> not abort
> if the client cert is invalid. Although, if you 'require' client with
> -Verify uppercase
> on s_server and the client sends *no* cert it does abort.
>
>
So whether there is a way to test that error in cert verification aborts
the connection in case of bad cert using s_server/s_client pair?

Thank you!

-- 
SY, Dmitry Belyavsky

Reply via email to