Date: Sun, 28 Sep 2008 14:01:53 +1000 From: Fraser Tweedale <frase@frase.id.au> To: freebsd-questions@freebsd.org Subject: [OT] Apache SSL certificate authentication Message-ID: <20080928040152.GA7159@bacardi.frase.id.au>
next in thread | raw e-mail | index | archive | help
--tKW2IUtsqtDRztdT Content-Type: text/plain; charset=us-ascii Content-Disposition: inline I've been trying to set up Apache to do certificate authentication and although I've had success using a self-signed CA (which naturally requires that the CA certificate be installed in the browser), I want to do the same, only have the certificate(s) signed by a real(*) CA, and am having some difficulty. (*) Specifically, CACert, which still isn't a OOTB trusted CA in most software. The way I expect this to work is: - Create my CA key and a CSR, and have CACert sign it. - Create a server key and CSR, and sign it with my CA - Create a client certificate, signed by my CA. So I end up with a certificate chain that goes: CACert -> my CA -> my server But... this is not working. Firefox won't verify the server (the CACert root certificate .is. installed), and having bypassed this check, Apache won't verify the client either. The Apache configuration is as follows: <VirtualHost *:443> ServerName foo.bar DocumentRoot /path/to/htdocs SSLEngine on SSLCipherSuite HIGH:MEDIUM SSLProtocol all -SSLv2 SSLCertificateFile /sslpath/server.crt SSLCertificateKeyFile /sslpath/server.key SSLCACertificateFile /sslpath/my-ca.crt SSLVerifyClient require SSLVerifyDepth 1 </VirtualHost> Any suggestions are appreciated, frase --tKW2IUtsqtDRztdT Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (FreeBSD) iEYEARECAAYFAkjfAbAACgkQPw/2FZbemTUGjwCfbX1X2ZzTYcrjF6WbNr5RKIxW 8jIAmQFiQXoXfrWPcPI7PI6zt8nI0ygR =ys4/ -----END PGP SIGNATURE----- --tKW2IUtsqtDRztdT--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080928040152.GA7159>