On 2013-10-19 03:59, Thomas Eifert wrote:
I've just encountered another situation in which verify = 4 fails on a seemingly valid certificate. Since I've previously posted details regarding this issue, I'm only going to post the certificate here. This is the 3rd certificate I've run across in the past 6 months that fails to verify. Can all 3 of the certificates be faulty, or is there an issue with Stunnel or OpenSSL here?
As strange as it may sound it just worked for me:
~/stunnel/src/tests$ cat forteinc.conf foreground=yes debug=7 pid=
[test_cli] client=yes accept=4321 connect=forteinc.com:443 cafile=forteinc.pem verify=4
~/stunnel/src/tests$ cat forteinc.pem -----BEGIN CERTIFICATE----- MIIGyTCCBbGgAwIBAgIQC0NHQrtbGPWbZINtfJec1jANBgkqhkiG9w0BAQUFADBm MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSUwIwYDVQQDExxEaWdpQ2VydCBIaWdoIEFzc3VyYW5j ZSBDQS0zMB4XDTEzMDYwMzAwMDAwMFoXDTE2MDgxMDEyMDAwMFowgYQxCzAJBgNV BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRIwEAYDVQQHEwlFc2NvbmRpZG8x JjAkBgNVBAoTHUZvcnRlIEludGVybmV0IFNvZnR3YXJlLCBJbmMuMQswCQYDVQQL EwJJVDEXMBUGA1UEAwwOKi5mb3J0ZWluYy5jb20wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDZ8XZFzc6kdJt8WMByc4VPw7Ru4JZ6P+AyZXcLNA/hSih0 Xes5fGjw7oBTyUJWic/FIe397AKkjM8WGtH70EnOv3BzAHzv5ftdhG6UskJmZV7K pokKao+M6AtL0yLyXTDXXF0c7dcUwmQ9lu2LIvyqMCo5RNjaNHPoG+pqxXSN4mSj kSxUsW62p6+qE+uJGBP9HW14DGzE+OBUfB/noC63qMWjYIOWmRX/rIC8H6NyFBWl K0X0yUkxbkc5o/f9DiChCCvzK7RUIiZfDxBKKQ4VZq8+cIHIhHzbziDj2J7Twj2b VeL052E7EjTxRvYIEkyaU2JIbvcLKDzJ1H5vHxpTAgMBAAGjggNSMIIDTjAfBgNV HSMEGDAWgBRQ6nOJ2yn7EI+e5QEg1N55mUiD9zAdBgNVHQ4EFgQUwgLEas/pP7rM UfpMXPrkHEg4SWcwJwYDVR0RBCAwHoIOKi5mb3J0ZWluYy5jb22CDGZvcnRlaW5j LmNvbTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF BwMCMGEGA1UdHwRaMFgwKqAooCaGJGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9j YTMtZzIyLmNybDAqoCigJoYkaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL2NhMy1n MjIuY3JsMIIBxAYDVR0gBIIBuzCCAbcwggGzBglghkgBhv1sAQEwggGkMDoGCCsG AQUFBwIBFi5odHRwOi8vd3d3LmRpZ2ljZXJ0LmNvbS9zc2wtY3BzLXJlcG9zaXRv cnkuaHRtMIIBZAYIKwYBBQUHAgIwggFWHoIBUgBBAG4AeQAgAHUAcwBlACAAbwBm ACAAdABoAGkAcwAgAEMAZQByAHQAaQBmAGkAYwBhAHQAZQAgAGMAbwBuAHMAdABp AHQAdQB0AGUAcwAgAGEAYwBjAGUAcAB0AGEAbgBjAGUAIABvAGYAIAB0AGgAZQAg AEQAaQBnAGkAQwBlAHIAdAAgAEMAUAAvAEMAUABTACAAYQBuAGQAIAB0AGgAZQAg AFIAZQBsAHkAaQBuAGcAIABQAGEAcgB0AHkAIABBAGcAcgBlAGUAbQBlAG4AdAAg AHcAaABpAGMAaAAgAGwAaQBtAGkAdAAgAGwAaQBhAGIAaQBsAGkAdAB5ACAAYQBu AGQAIABhAHIAZQAgAGkAbgBjAG8AcgBwAG8AcgBhAHQAZQBkACAAaABlAHIAZQBp AG4AIABiAHkAIAByAGUAZgBlAHIAZQBuAGMAZQAuMHsGCCsGAQUFBwEBBG8wbTAk BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEUGCCsGAQUFBzAC hjlodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRIaWdoQXNzdXJh bmNlQ0EtMy5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQUFAAOCAQEAfaQd sAZueUdpTa/3TBpGPlKRiirlATk4kLgpk08R73hEsbA3LICRA5RbfvBGZ56031Hh rxzU8ZhI8q4kKiLbYawpRw9bzxlX35GW5MwuZiQTY0eL45V2L17Ya+Qi1+zYSAvA ZrkC2IGXUuV+sup+WQ8nx+A+HE0aGBWwCoza8qbrbFc86DrPKaGBqyanSSNQBDOg Jzojg6do31qnrDOc/Sg9fckSOtBTFO3Dqgyv0UiaaimcQE3OOqEeianQ7REE2XIX 96d2iRp5fVxMjx9SCfaD31DIogTbYmrw7+3KEPgU8QNn1RAzjPUkSZxvcO8X/Xue vw2kqH9uZ7dlx7c6CA== -----END CERTIFICATE-----
~/stunnel/src/tests$ openssl x509 -in forteinc.pem -noout -text Certificate: Data: Version: 3 (0x2) Serial Number: 0b:43:47:42:bb:5b:18:f5:9b:64:83:6d:7c:97:9c:d6 Signature Algorithm: sha1WithRSAEncryption Issuer: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance CA-3 Validity Not Before: Jun 3 00:00:00 2013 GMT Not After : Aug 10 12:00:00 2016 GMT Subject: C=US, ST=California, L=Escondido, O=Forte Internet Software, Inc., OU=IT, CN=*.forteinc.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:d9:f1:76:45:cd:ce:a4:74:9b:7c:58:c0:72:73: 85:4f:c3:b4:6e:e0:96:7a:3f:e0:32:65:77:0b:34: 0f:e1:4a:28:74:5d:eb:39:7c:68:f0:ee:80:53:c9: 42:56:89:cf:c5:21:ed:fd:ec:02:a4:8c:cf:16:1a: d1:fb:d0:49:ce:bf:70:73:00:7c:ef:e5:fb:5d:84: 6e:94:b2:42:66:65:5e:ca:a6:89:0a:6a:8f:8c:e8: 0b:4b:d3:22:f2:5d:30:d7:5c:5d:1c:ed:d7:14:c2: 64:3d:96:ed:8b:22:fc:aa:30:2a:39:44:d8:da:34: 73:e8:1b:ea:6a:c5:74:8d:e2:64:a3:91:2c:54:b1: 6e:b6:a7:af:aa:13:eb:89:18:13:fd:1d:6d:78:0c: 6c:c4:f8:e0:54:7c:1f:e7:a0:2e:b7:a8:c5:a3:60: 83:96:99:15:ff:ac:80:bc:1f:a3:72:14:15:a5:2b: 45:f4:c9:49:31:6e:47:39:a3:f7:fd:0e:20:a1:08: 2b:f3:2b:b4:54:22:26:5f:0f:10:4a:29:0e:15:66: af:3e:70:81:c8:84:7c:db:ce:20:e3:d8:9e:d3:c2: 3d:9b:55:e2:f4:e7:61:3b:12:34:f1:46:f6:08:12: 4c:9a:53:62:48:6e:f7:0b:28:3c:c9:d4:7e:6f:1f: 1a:53 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier:
keyid:50:EA:73:89:DB:29:FB:10:8F:9E:E5:01:20:D4:DE:79:99:48:83:F7
X509v3 Subject Key Identifier: C2:02:C4:6A:CF:E9:3F:BA:CC:51:FA:4C:5C:FA:E4:1C:48:38:49:67 X509v3 Subject Alternative Name: DNS:*.forteinc.com, DNS:forteinc.com X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 CRL Distribution Points:
Full Name: URI:http://crl3.digicert.com/ca3-g22.crl
Full Name: URI:http://crl4.digicert.com/ca3-g22.crl
X509v3 Certificate Policies: Policy: 2.16.840.1.114412.1.1 CPS: http://www.digicert.com/ssl-cps-repository.htm User Notice: Explicit Text:
Authority Information Access: OCSP - URI:http://ocsp.digicert.com CA Issuers - URI:http://cacerts.digicert.com/DigiCertHighAssuranceCA-3.crt
X509v3 Basic Constraints: critical CA:FALSE Signature Algorithm: sha1WithRSAEncryption 7d:a4:1d:b0:06:6e:79:47:69:4d:af:f7:4c:1a:46:3e:52:91: 8a:2a:e5:01:39:38:90:b8:29:93:4f:11:ef:78:44:b1:b0:37: 2c:80:91:03:94:5b:7e:f0:46:67:9e:b4:df:51:e1:af:1c:d4: f1:98:48:f2:ae:24:2a:22:db:61:ac:29:47:0f:5b:cf:19:57: df:91:96:e4:cc:2e:66:24:13:63:47:8b:e3:95:76:2f:5e:d8: 6b:e4:22:d7:ec:d8:48:0b:c0:66:b9:02:d8:81:97:52:e5:7e: b2:ea:7e:59:0f:27:c7:e0:3e:1c:4d:1a:18:15:b0:0a:8c:da: f2:a6:eb:6c:57:3c:e8:3a:cf:29:a1:81:ab:26:a7:49:23:50: 04:33:a0:27:3a:23:83:a7:68:df:5a:a7:ac:33:9c:fd:28:3d: 7d:c9:12:3a:d0:53:14:ed:c3:aa:0c:af:d1:48:9a:6a:29:9c: 40:4d:ce:3a:a1:1e:89:a9:d0:ed:11:04:d9:72:17:f7:a7:76: 89:1a:79:7d:5c:4c:8f:1f:52:09:f6:83:df:50:c8:a2:04:db: 62:6a:f0:ef:ed:ca:10:f8:14:f1:03:67:d5:10:33:8c:f5:24: 49:9c:6f:70:ef:17:fd:7b:9e:bf:0d:a4:a8:7f:6e:67:b7:65: c7:b7:3a:08
~/stunnel/src/tests$ ../stunnel forteinc.conf 2013.10.24 21:45:35 LOG7[19767]: Clients allowed=500 2013.10.24 21:45:35 LOG5[19767]: stunnel 5.00 on i686-pc-linux-gnu platform 2013.10.24 21:45:35 LOG5[19767]: Compiled/running with OpenSSL 1.0.1e-fips 11 Feb 2013 2013.10.24 21:45:35 LOG5[19767]: Threading:PTHREAD Sockets:POLL,IPv6 SSL:ENGINE,OCSP,FIPS Auth:LIBWRAP 2013.10.24 21:45:35 LOG5[19767]: Reading configuration from file forteinc.conf 2013.10.24 21:45:35 LOG5[19767]: FIPS mode is disabled 2013.10.24 21:45:35 LOG7[19767]: Compression not enabled 2013.10.24 21:45:35 LOG7[19767]: Snagged 64 random bytes from /home/mtrojnar/.rnd 2013.10.24 21:45:35 LOG7[19767]: Wrote 1024 new random bytes to /home/mtrojnar/.rnd 2013.10.24 21:45:35 LOG7[19767]: PRNG seeded successfully 2013.10.24 21:45:35 LOG6[19767]: Initializing service [test_cli] 2013.10.24 21:45:35 LOG7[19767]: Loaded verify certificates from forteinc.pem 2013.10.24 21:45:35 LOG7[19767]: Loaded forteinc.pem revocation lookup file 2013.10.24 21:45:35 LOG7[19767]: SSL options set: 0x00000004 2013.10.24 21:45:35 LOG5[19767]: Configuration successful 2013.10.24 21:45:35 LOG7[19767]: Service [test_cli] (FD=7) bound to 0.0.0.0:4321 2013.10.24 21:45:35 LOG7[19767]: No pid file being created 2013.10.24 21:45:46 LOG7[19767]: Service [test_cli] accepted (FD=3) from 127.0.0.1:44011 2013.10.24 21:45:46 LOG7[19772]: Service [test_cli] started 2013.10.24 21:45:46 LOG5[19772]: Service [test_cli] accepted connection from 127.0.0.1:44011 2013.10.24 21:45:46 LOG6[19772]: connect_blocking: connecting 64.105.44.55:443 2013.10.24 21:45:46 LOG7[19772]: connect_blocking: s_poll_wait 64.105.44.55:443: waiting 10 seconds 2013.10.24 21:45:46 LOG5[19772]: connect_blocking: connected 64.105.44.55:443 2013.10.24 21:45:46 LOG5[19772]: Service [test_cli] connected remote server from 207.192.69.165:53779 2013.10.24 21:45:46 LOG7[19772]: Remote socket (FD=8) initialized 2013.10.24 21:45:46 LOG7[19772]: SNI: sending servername: forteinc.com 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): before/connect initialization 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 write client hello A 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 read server hello A 2013.10.24 21:45:46 LOG7[19772]: Starting certificate verification: depth=1, /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance CA-3 2013.10.24 21:45:46 LOG6[19772]: *CERT: Invalid CA certificate ignored* 2013.10.24 21:45:46 LOG5[19772]: Certificate accepted: depth=1, /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance CA-3 2013.10.24 21:45:46 LOG7[19772]: Starting certificate verification: depth=1, /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance CA-3 2013.10.24 21:45:46 LOG6[19772]: *CERT: Invalid CA certificate ignored* 2013.10.24 21:45:46 LOG5[19772]: Certificate accepted: depth=1, /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance CA-3 2013.10.24 21:45:46 LOG7[19772]: Starting certificate verification: depth=0, /C=US/ST=California/L=Escondido/O=Forte Internet Software, Inc./OU=IT/CN=*.forteinc.com 2013.10.24 21:45:46 LOG6[19772]: *CERT: Locally installed certificate matched* 2013.10.24 21:45:46 LOG5[19772]: Certificate accepted: depth=0, /C=US/ST=California/L=Escondido/O=Forte Internet Software, Inc./OU=IT/CN=*.forteinc.com 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 read server certificate A 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 read server done A 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 write client key exchange A 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 write change cipher spec A 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 write finished A 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 flush data 2013.10.24 21:45:46 LOG7[19772]: SSL state (connect): SSLv3 read finished A 2013.10.24 21:45:46 LOG7[19772]: 1 items in the session cache 2013.10.24 21:45:46 LOG7[19772]: 1 client connects (SSL_connect()) 2013.10.24 21:45:46 LOG7[19772]: 1 client connects that finished 2013.10.24 21:45:46 LOG7[19772]: 0 client renegotiations requested 2013.10.24 21:45:46 LOG7[19772]: 0 server connects (SSL_accept()) 2013.10.24 21:45:46 LOG7[19772]: 0 server connects that finished 2013.10.24 21:45:46 LOG7[19772]: 0 server renegotiations requested 2013.10.24 21:45:46 LOG7[19772]: 0 session cache hits 2013.10.24 21:45:46 LOG7[19772]: 0 external session cache hits 2013.10.24 21:45:46 LOG7[19772]: 0 session cache misses 2013.10.24 21:45:46 LOG7[19772]: 0 session cache timeouts 2013.10.24 21:45:46 LOG7[19772]: Peer certificate was cached (4675 bytes) 2013.10.24 21:45:46 LOG6[19772]: SSL connected: new session negotiated 2013.10.24 21:45:46 LOG6[19772]: Negotiated TLSv1/SSLv3 ciphersuite: AES256-SHA (256-bit encryption) 2013.10.24 21:45:46 LOG6[19772]: Compression: null, expansion: null 2013.10.24 21:45:52 LOG7[19772]: SSL alert (read): warning: close notify 2013.10.24 21:45:52 LOG6[19772]: SSL closed (SSL_read) 2013.10.24 21:45:52 LOG7[19772]: Sent socket write shutdown 2013.10.24 21:45:52 LOG6[19772]: Read socket closed (hangup) 2013.10.24 21:45:52 LOG6[19772]: Write socket closed (hangup) 2013.10.24 21:45:52 LOG7[19772]: Sending close_notify alert 2013.10.24 21:45:52 LOG7[19772]: SSL alert (write): warning: close notify 2013.10.24 21:45:52 LOG6[19772]: SSL_shutdown successfully sent close_notify alert 2013.10.24 21:45:52 LOG5[19772]: Connection closed: 16 byte(s) sent to SSL, 501 byte(s) sent to socket 2013.10.24 21:45:52 LOG7[19772]: Remote socket (FD=8) closed 2013.10.24 21:45:52 LOG7[19772]: Local socket (FD=3) closed 2013.10.24 21:45:52 LOG7[19772]: Service [test_cli] finished (0 left) ^C2013.10.24 21:45:54 LOG7[19767]: Dispatching signals from the signal pipe 2013.10.24 21:45:54 LOG3[19767]: Received signal 2; terminating 2013.10.24 21:45:54 LOG7[19767]: Closing service [test_cli] 2013.10.24 21:45:54 LOG7[19767]: Service [test_cli] closed (FD=7) 2013.10.24 21:45:54 LOG7[19767]: Sessions cached before flush: 1 2013.10.24 21:45:54 LOG7[19767]: Sessions cached after flush: 0 2013.10.24 21:45:54 LOG7[19767]: Service [test_cli] closed 2013.10.24 21:45:54 LOG7[19767]: str_stats: 11 block(s), 1816 data byte(s), 462 control byte(s)
Mike