On 01/26/2009 08:40 PM, Marco De Vitis wrote:
Il giorno 26/gen/09, alle ore 05:14, Crypto Sal ha scritto:

Do any other clients (s_client, web browser, etc) exhibit the same behavior or an error message? If yes, what's the error response?

Well, I currently do not know how to apply that certificate to an HTTP server to test it with browsers. Both Firefox and IE refuse to connect on POPS port 995, of course.

Well, you should be able to setup Apache2 to use your certificate quite easily and the Apache Docs are quite easy to follow. All you'd have to do is move the key and certificate over to an area that Apache has access to, modify the SSL appropriate settings and things should be alright and you'll see if browsers choke too or its M$ products. I would also try Thunderbird and other email clients on the email server side of things.


For s_client see below.

When you use s_client to connect to your mail server does it pass verification through both ways, IP and DNS?

I never used s_client before, I tried it now, but it doesn't seem to care at all about the CN difference: as long as I can see, and as long as I pass it the CA cert with the -CAfile option, it doesn't return any verification error, not even when I connect to the server with a totally different name from the ones stored in CN or subjectAltName!

It just outputs "verify return:1" for both the server and CA certificates which build up the chain.

So, s_client seems a bit too relaxed to me, or am I missing anything?


That's because you're only verifying the chain of trust, you are not verifying host name. This is in the latest development version of OpenSSL. Sorry, you did mention you were on 0.9.8c. Very sorry about this.

Can you do an s_client and dump the cert to OpenSSL's x509 and read the cert? Do the SubjectAltNames appear in the "X509v3 Subject Alternative Name" section when doing so?

How can I dump the certificate using s_client? I can't see anything about this in its man page.
openssl s_client -connect HOST_NAME:PORT -starttls pop3 | openssl x509 -text -noout.

Alternatively, openssl x509 -text -noout -in YOUR_CERT_HERE, and you can read the text output of the certificate instead of it's hashed value




What is the *exact* error you get with the Microsoft Products when you use this format? Hostname Mismatch? Untrusted Cert?

I'd say Hostname Mismatch. Both OE and Outlook just show a dialog containing no deep tech info, but they simply complain about the name of the server not being the same contained in the provided certificate.


Usually Outlook will display a box with a series of checks and red X's. I am pretty sure it has three areas and in most cases it is the last one that it fails on. I wish I had a screenshot for you. I just saw one the other day too.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [email protected]
Automated List Manager                           [email protected]

Reply via email to