Web servers can also require clients to present a valid certificate, which could be used for authentication and identity.
I've recently had the misfortune to end up delving into this, so here are some notes on diagnosing and testing this from a client perspective. One of the problems here is that this all takes place before anything http-related happens, so normal diagnostic techniques are useless - and there won't be anything logged on either the server or client side to work from.
So, rather than trying to work out the exact commands next time, this is an aide-memoire. And hopefully might be useful to others too.
The first thing is to work out whether a server expects a client certificate or not. (If you can get in without, then obviously it's not requiring one, but there are other ways connections can fail.)
Fortunately, openssl can initiate the connection, allowing you to see exactly what's going on:
openssl s_client -showcerts \
-servername example.com \
-connect example.com:443
Note that you'll usually need the -servername flag here, to stick on the SNI header, otherwise the server or load balancer or proxy won't know what to do with it.
In addition to printing out all the server certificates and some other diagnostics, this will tell you what, if any, client certificates are required. If none are expected, there will be a section that looks like:
---
No client certificate CA names sent
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
If the server wants a client certificate, then it will tell you what certificates it wants:
---
Acceptable client certificate CA names
/CN=My Client CA
Client Certificate Types: RSA sign, DSA sign, ECDSA sign
Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
The important thing here is the "/CN=My Client CA" - the server is telling you that it wants a certificate signed by that Certificate Authority.
Assuming you have such a certificate, how do you send it? Browsers have ways to import it, but it's often easier to diagnose it from the CLI, using curl or wget. You'll need both the certificate and the key, and the syntax is:
wget --certificate=mycert.crt --private-key=mycert.key \
https://example.com/
or
curl --cert mycert.crt --key mycert.key \
https://example.com/
Assuming the certificate you have is signed by the relevant CA, this will allow you to retrieve the page. If there's a problem, you might get some meaningful diagnostics.
The other thing is how to load those into a browser. Normally you have something like a .p12 file with both parts bundled. You can create one of those like so:
openssl pkcs12 -export -out mycert.p12 \
-in mycert.crt -inkey mycert.key
You'll get asked for a passphrase to protect the .p12 file - it contains the key, so needs to be protected in transit.
You can also extract the key and certificate from a .p12 file:
openssl pkcs12 -in mycert.p12 -nokeys -out mycert.crt
openssl pkcs12 -in mycert.p12 -nocerts -out mycert.key
1 comment:
Amazing read! Thank you for putting these information together.My team would learn a lot from this. We handle Email Security sites and it's comparables. Thanks
Post a Comment