I can only find 1 place in the server that generates an
SSL_R_BAD_SIGNATURE and that's in ssl3_get_cert_verify, in the
case of signature algorithms are used, which is new in TLS 1.2.

I don't see anything obviously wrong, and as far as I know the
test suite also tests client authentication.


Kurt


On Fri, Feb 26, 2016 at 05:34:16PM +0000, Nounou Dadoun wrote:
> Trying to upgrade from TLSv1 to TLSv1.1 and 1.2 has been more problematic 
> than I might have suspected.
> I have a TLS server using openssl 1.0.2d  doing mutual authentication and a 
> one line change from TLSv1 (only) to TLSv1.2 breaks the connection where in 
> the latter the server rejects the client certificate with "error 
> 67702888--bad signature" (and the former happily accepts it).  
> 
> Given that description (and the fact that it's literally a one-line change), 
> it's hard to believe that I'm doing something wrong.
> 
> Can anyone tell me why TLSv1 accepts it and TLSv1.2 doesn't?  Packet capture 
> attached and more details below, certificate is in the packet capture but I 
> can provide it separately if it will help, thanks ... N
> 
> Nou Dadoun
> Senior Firmware Developer, Security Specialist
> 
> 
> -----Original Message-----
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
> Nounou Dadoun
> Sent: Thursday, February 25, 2016 5:44 PM
> To: openssl-us...@openssl.org
> Subject: Re: [openssl-users] Failed TLSv1.2 handshake with error 
> 67702888--bad signature
> 
> Curiouser and curiouser - I have attached two minimal packet captures in 
> which the only difference in the server build was a change in one line (using 
> boost with openssl):
>                : m_context(pIoService->GetNative(), 
> boost::asio::ssl::context::tlsv1) 
> to
>                : m_context(pIoService->GetNative(), 
> boost::asio::ssl::context::sslv23)
> 
> They both disable sslv2 and sslv3.
> The former resulted in a handshake that completed, the latter failed with the 
> aforementioned "67702888--bad signature" logged error.  The respective packet 
> captures are attached.
> 
> This one has me pretty puzzled, any idea why tls1 succeeds and tls1.2 fails?
> 
> Is tls1.2 more strict about accepting the client certificate since it's 
> complaining about a "bad signature" where tlsv1 doesn't?
> 
> Anybody have any ideas? ... N
> 
> Nou Dadoun
> Senior Firmware Developer, Security Specialist
> 
> 
> -----Original Message-----
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
> Nounou Dadoun
> Sent: Thursday, February 25, 2016 2:42 PM
> To: openssl-us...@openssl.org
> Subject: [openssl-users] Failed TLSv1.2 handshake with error 67702888--bad 
> signature
> 
>   I'm trying to troubleshoot some development code which is enabling TLSv1.1 
> and 1.2 and failing. Have an odd tls handshake failure, with an error number 
> that I can find any documentation about (is there any?) that indicates 
> "67702888--bad signature" which is being logged on the server side; and I'm 
> trying to see where in the handshake things are falling apart.
> 
> Looks like it's negotiating tls1.2 and agreeing on 
> TLS_RSA_WITH_AES_256_CBC_SHA256 but the client seems to be sending a 
> certificate although I don't see it requesting mutual authentication.
> 
> I've attached a very short wireshark capture - does anyone know what that 
> error code might be related to or can give me a hint as to what's going awry 
> here?  Thanks ... N
> 
> 
> Nou Dadoun
> Senior Firmware Developer, Security Specialist
> 
> 
> Office: 604.629.5182 ext 2632
> Support: 888.281.5182  |  avigilon.com
> Follow Twitter  |  Follow LinkedIn
> 
> 
> This email, including any files attached hereto (the "email"), contains 
> privileged and confidential information and is only for the intended 
> addressee(s). If this email has been sent to you in error, such sending does 
> not constitute waiver of privilege and we request that you kindly delete the 
> email and notify the sender. Any unauthorized use or disclosure of this email 
> is prohibited. Avigilon and certain other trade names used herein are the 
> registered and/or unregistered trademarks of Avigilon Corporation and/or its 
> affiliates in Canada and other jurisdictions worldwide.
> 
> 



> -- 
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

> -- 
> openssl-dev mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

-- 
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to