So far so good. Are you running OSP to do this? Which cisco engineer were you working with? The "> > >6d01h: SSL: process certificate" is when IOS attempts to respond with its client certificate. I don't know openssl but aren't you trying to _not_ request the client cert? - max > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED]]On Behalf Of Dennis Xu > Sent: Tuesday, March 14, 2000 9:13 AM > To: [EMAIL PROTECTED] > Subject: Re: Urgent help! -- failed in SSLv3 read client certificate. > > > IOS 12.0.7T is used in my Cisco router, which is introduced SSL to support > OSP (interdomain VOIP settlement) communications between Cisco router and > our application server. > The engineer of Cisco told me, in this version, no client certificate sent > at SSL connection setup phase. So I have to disable the client > authentication, in order to not request client's certificate. So > I failed on > my server side. > > I tried my SSL server without "verify". For openssl s_client, it works > well, client really didnot send its certificate out. But for router as a > client, it failed. The error message at both side are the same, as if it > doesn't work. > > Could someone have any idea & advices? > > Thanks in advace, > > Dennis > > #show run > crypto ca certificate chain netruencc.com > certificate 2091EC132A491950C6BD873377D5E2F5 > 308202DA 30820243 A0030201 02021020 91EC132A 491950C6 BD873377 D5E2F530 > 0D06092A 864886F7 0D010104 05003056 3111300F 06035504 07130849 6E746572 > 6E657431 17301506 0355040A 130E5665 72695369 676E2C20 496E632E 31283026 > 06035504 0B131F56 65726953 69676E20 4F6E5369 74652053 75627363 72696265 > 72204465 6D6F301E 170D3030 30333034 30303030 30305A17 0D303030 35303332 > 33353935 395A3047 3145301B 06092A86 4886F70D 01090813 0E323037 2E39352E > 3232372E 31353130 2606092A 864886F7 0D010902 16196369 73636F32 3630302D > 312E6E65 74727565 6E63632E 636F6D30 5C300D06 092A8648 86F70D01 01010500 > 034B0030 48024100 B61C1955 F7CA1433 2EA90FF1 F3F71E86 00088B5B 28A88E6A > C4927661 EF16389E 3108DE87 84EE9E6C 9E07DE56 ECDE55D3 9542006C 8C4B0E59 > 75CED1C1 34DC1621 02030100 01A381FB 3081F830 0B060355 1D0F0404 030205A0 > 302A0603 551D1104 23302182 19636973 636F3236 30302D31 2E6E6574 7275656E > 63632E63 6F6D8704 CF5FE397 30090603 551D1304 02300030 81B10603 551D1F04 > 81A93081 A63081A3 A081A0A0 819D8681 9A6C6461 703A2F2F 64697265 63746F72 > 792E7665 72697369 676E2E63 6F6D2F4F 55203D20 56657269 5369676E 204F6E53 > 69746520 53756273 63726962 65722044 656D6F2C 204F203D 20225665 72695369 > 676E2C20 496E632E 222C204C 203D2049 6E746572 6E65743F 63657274 69666963 > 61746572 65766F63 6174696F 6E6C6973 743B6269 6E617279 3F626173 653F6F62 > 6A656374 636C6173 733D2A30 0D06092A 864886F7 0D010104 05000381 8100CD12 > DA18A0D8 DA9D820E 322799EE ECCB222A 53696958 09757F8E 2B5E4915 37AEF874 > 27A3D6F0 61271AC9 41C73970 C2E2DED4 689FE831 85EAF7F7 7E8986DE 64E5A4B5 > 133C755A FFF9544F CE00CA98 372C4135 C3563535 26A60912 BAF35ACC 5AFE124F > E9644EDC 2413CD24 E22E052E 28B80F1F 13EE765F EADD0736 9C158A62 16FA > quit > certificate ca 208F05124449BF80A46412941971C51B > 30820251 308201BA A0030201 02021020 8F051244 49BF80A4 64129419 71C51B30 > 0D06092A 864886F7 0D010105 05003056 3111300F 06035504 07130849 6E746572 > 6E657431 17301506 0355040A 130E5665 72695369 676E2C20 496E632E 31283026 > 06035504 0B131F56 65726953 69676E20 4F6E5369 74652053 75627363 72696265 > 72204465 6D6F301E 170D3939 30363238 30303030 30305A17 0D303930 36323732 > 33353935 395A3056 3111300F 06035504 07130849 6E746572 6E657431 17301506 > 0355040A 130E5665 72695369 676E2C20 496E632E 31283026 06035504 0B131F56 > 65726953 69676E20 4F6E5369 74652053 75627363 72696265 72204465 6D6F3081 > 9F300D06 092A8648 86F70D01 01010500 03818D00 30818902 818100DF 5CD670BE > 7E095A27 DAC990E0 9680D7ED FDF644CC 17D80E04 C2DD6D03 196B242C 92A59116 > 5D6EF1D2 DD81D4A6 40F2524C 05EB613A A4EAB392 365B6EB8 12312884 C1F3E0DE > 13C9B26C EC821CAA 5765E147 05713C43 F465C748 7FBC9D31 222312BC 6135D02A > 6DD6789E A3A98A77 4A33D182 BCAE774A 6F214931 683393F0 0FB83F02 03010001 > A320301E 300F0603 551D1304 08300601 01FF0201 00300B06 03551D0F 04040302 > 0106300D 06092A86 4886F70D 01010505 00038181 00BC6D55 FA3E44D7 921746E3 > B6382D50 465146F0 F760EE23 EAFB0C64 C8D50C11 5F968CAC 879A966E 48E000EF > 85F6A3FE AF81C1B7 CCBE61E3 770ADC13 00DBC7B1 C3CD6D48 570D1614 E985CC33 > 3B77A6B7 2610A92E 802A0865 7FFC7468 16F60C69 9BB168C4 C302FEDC C100A6E7 > 539F3AF9 C7AB9E66 A59F352B 4AF1C668 6BD6C6FB 0C > quit > > ----- Original Message ----- > From: "Max Pritikin" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> > Sent: Monday, March 13, 2000 5:33 PM > Subject: Re: Urgent help! -- failed in SSLv3 read client certificate. > > > > What version of IOS are you running on the router? What did you do make > > it connect via SSL to the server? > > > > I'll bet that the router is sending both the ca certificate > (recieved when > > you > > did 'cr ca auth identname') and the router certificate > (recieved when you > > did > > 'cr ca enroll identname') as a cert chain. > > > > - max > > > > -----Original Message----- > > From: Dennis Xu <[EMAIL PROTECTED]> > > To: [EMAIL PROTECTED] <[EMAIL PROTECTED]> > > Date: Monday, March 13, 2000 4:32 PM > > Subject: Re: Urgent help! -- failed in SSLv3 read client certificate. > > > > > > >The client is Cisco router. The keypair is generated by > itself, and CA is > > >Verisign OnSite (IPSec). > > >The debug info from client side is following: > > > > > >6d01h: SSL Client Initialization Successful. > > >6d01h: SSL: client hello encoded successfully. > > >6d01h: SSL: write record: type: ssl handshake. > > >6d01h: 01 00 00 2F 03 00 38 CC 27 51 E3 8F 2B F4 88 2A 66 AC E7 B3 > > >6d01h: E1 42 7B C5 59 A2 1A E4 9B 8E 15 AA 47 6A 51 91 71 78 00 00 > > >6d01h: 08 00 08 00 09 00 0E 00 0F 01 00 > > >6d01h: SSL write: 56 bytes to tcb 81D2279C > > >6d01h: SSL: read 5 bytes from tcb: 81D2279C > > >6d01h: SSL: read 74 bytes from tcb: 81D2279C6d01h: SSL: process > > server_hello > > >6d01h: SSL: server hello processed successfully. > > >6d01h: SSL: read 5 bytes from tcb: 81D2279C > > >6d01h: SSL: read 1484 bytes from tcb: 81D2279C > > >6d01h: SSL: process certificate > > >6d01h: SSL: write record: type: ssl alter > > >6d01h: 02 00 > > >6d01h: SSL Handshake failed for session 1, sock 0 > > >6d01h: SSL: write record: type: ssl alter > > >6d01h: 01 00 > > >6d01h: SSL write: 7 bytes to tcb 81D2279C > > >6d01h: SSL write: 7 bytes to tcb 81D2279C > > >Error: failed to create a new SSL connection > > > > > >Hope it is helpful, > > > > > >Thanks in advance, > > > > > >Dennis > > > > > >----- Original Message ----- > > >From: "Bodo Moeller" <[EMAIL PROTECTED]> > > >To: <[EMAIL PROTECTED]> > > >Sent: Saturday, March 11, 2000 6:14 AM > > >Subject: Re: Urgent help! -- failed in SSLv3 read client certificate. > > > > > > > > >> On Fri, Mar 10, 2000 at 11:21:51AM -0800, Dennis Xu wrote: > > >> > > >> > I need to accept a client's SSL connection request without client > > >certificate recieved. I try the following command, I have not > > >defined -verify parameter. but why the probelm is still there.(same > > >as -verify) > > >> > ------------------------------------------------------------- > > >> > D:\OSPSSL>openssl s_server -accept 443 -CApath .\ -CAfile > > >MyCaCert.pem -cert .\c > > >> > erts\SerCert.pem -key .\certs\SerKEY.pem -state > > >> > > >> > SSL3 alert read:fatal:close notify > > >> > SSL_accept:failed in SSLv3 read client certificate A > > >> > ERROR > > >> > 371:error:140943E8:SSL > > >routines:SSL3_READ_BYTES:reason(1000):.\ssl\s3_pkt.c:774: > > >> > SSL alert number 0 > > >> > shutting down SSL > > >> > > >> You don't tell us what client software you are testing with, and what > > >> happens at the client side (e.g. whether an "unknown CA" alert box > > >> pops up). If you test with s_client, you'll most likely see > that this > > >> works. > > >> > ______________________________________________________________________ > > >> OpenSSL Project > http://www.openssl.org > > >> User Support Mailing List > [EMAIL PROTECTED] > > >> Automated List Manager > [EMAIL PROTECTED] > > > > > >______________________________________________________________________ > > >OpenSSL Project http://www.openssl.org > > >User Support Mailing List [EMAIL PROTECTED] > > >Automated List Manager [EMAIL PROTECTED] > > > > > > > > > > ______________________________________________________________________ > > OpenSSL Project http://www.openssl.org > > User Support Mailing List [EMAIL PROTECTED] > > Automated List Manager [EMAIL PROTECTED] > > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List [EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] > > ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]