On Fri, Feb 26, 2016, Nounou Dadoun wrote:

> I've extracted the certificates from the exchange to verify that the (tlsv1) 
> successful handshake and the (tlsv1.2) failed handshake certificates are 
> identical (they are) and I've also checked to make sure that the CA 
> certificate that the server has for signature verification is the same as the 
> CA certificate handed over by the client in the exchange (it is).
> 
> I've also used the command line openssl verify to verify the certificate 
> against the CA: 
> "client_cert_success.pem: OK"
> 
> However it succeeds in TLSv1 and fails in TLSv1.2 (the one line change noted 
> below).
> 
> I've now attached the certificates for quick reference - can anyone see what 
> might be causing the different behavior between TLSv1 and TLSv1.2?
> 

The signature TLS uses for Client auth is different in TLS 1.2. For TLS < 1.2
the TLS signature is a combined MD5+SHA1 form for RSA. For TLS 1.2 it is the
more standard DigestInfo signature which can use other algorithms such as
SHA512 or SHA256.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to