Hi Riho,

Thank you for taking the time to report this bug.  I've mentioned this on bug 
LP: #1845263 as a possible regression related to the 
2.4.29-1ubuntu4.12 update that backported the TLSv1.3 support to bionic.    
That update indicated some expectation that certain environments might be 
adversely affected when the new protocol is added, so it would be helpful to 
understand in more detail about your particular setup.  That may help identify 
what went wrong precisely in this case.

Please execute the following command, as it will automatically gather
debugging information, in a terminal:

  apport-collect 1865900

Alternatively, if you want to manually attach things (e.g. so you can
remove any sensitive information), the files this collects includes:

/etc/apache2/apache2.conf
/etc/apache2/sites-enabled/*
/etc/apache2/conf.d
/var/log/apache2/error.log
`/usr/sbin/apachectl -D DUMP_MODULES`

Obviously the piece that'll need more examination is the client
certificate configuration, so if there are other config files or logs of
relevance to that you're aware of, those details could be useful as
well.


** Changed in: apache2 (Ubuntu)
       Status: New => Incomplete

** Tags added: regression-update

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865900

Title:
  apache 2.4.29-1ubuntu4.12 authentication with client certificate
  broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1865900/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to