We have made some progress but still having problems. This is what we have tried ... on SLES 10 SP1 , Suse Linux, IBM zSeries hardware.
on the NSS side we created a certificate DB with certutil then added openCrypto to the DB with NSS modutil modutil -dbdir /etc/apache2/SampleCertDBs/ -add opencryptoki -libfile /usr/lib64/libopencryptoki.so -mechanisms RSA:RC2:RC4:RC5:DES:SHA1:MD5:MD2:SSL:TLS webserver1:/etc/apache2 # modutil -dbdir /etc/apache2/SampleCertDBs/ -add opencryptoki -libfile /usr/lib64/libopencryptoki.so -mechanisms RSA:RC2:RC4:RC5:DES:SHA1:MD5:MD2:SSL:TLS WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q <enter>' to abort, or <enter> to continue: Using database directory /etc/apache2/SampleCertDBs... RC=80400009 Status=0 errno=9 ThreadID=375c30 ===> this gets an error that appears to be coming from z90crypt (the IBM driver that i/f with the crypto hardware), we think that it is caused by not having the openCryptoki CA in the NSS DB. Module "opencryptoki" added to database. webserver1:/etc/apache2 # however, it claims to have added the module to NSS module db. webserver1:/etc/apache2 # modutil -dbdir /etc/apache2/SampleCertDBs/ -list Using database directory /etc/apache2/SampleCertDBs... RC=80400009 Status=0 errno=9 ThreadID=375c30 Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. opencryptoki library name: /usr/lib64/libopencryptoki.so slots: 1 slot attached status: loaded slot: Linux 2.6.16.46-0.12-default Linux (ICA) token: openCryptoki ----------------------------------------------------------- webserver1:/etc/apache2 # when we try starting apache2 we get this in the log [Mon Jul 28 16:13:49 2008] [info] Configuring server for SSL protocol [Mon Jul 28 16:13:49 2008] [debug] nss_engine_init.c(556): Enabling SSL3 [Mon Jul 28 16:13:49 2008] [debug] nss_engine_init.c(561): Enabling TLS [Mon Jul 28 16:13:49 2008] [debug] nss_engine_init.c(732): Configuring permitted SSL ciphers [+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha] [Mon Jul 28 16:13:49 2008] [info] Using nickname openCryptoki:webserver1. [Mon Jul 28 16:13:49 2008] [error] Certificate not verified: 'openCryptoki:webserver1' [Mon Jul 28 16:13:49 2008] [error] SSL Library Error: -8156 Issuer certificate is invalid [Mon Jul 28 16:13:49 2008] [error] Unable to verify certificate 'openCryptoki:webserver1'. Add "NSSEnforceValidCerts off" to nss.conf so the server can start until the problem can be resolved. these are the certs in the db webserver1:/etc/apache2 # certutil -L -h all -d /etc/apache2/SampleCertDBs RC=80400009 Status=0 errno=9 ThreadID=375c00 Enter Password or Pin for "openCryptoki": SampleSSLServerCert u,u,u SampleSSLClientCert u,u,u SampleRootCA CTu,Cu,Cu openCryptoki:webserver1 u,u,u webserver1:/etc/apache2 # I do not know how the openCryptoki:webserver1 got in the DB we did not add it, maybe modutil added it. If we use "NSSEnforceValidCerts off" then Apache starts but we can not use https. we see this in the log [Mon Jul 28 16:17:48 2008] [info] Connection to child 0 established (server webserver1.pdl.pok.ibm.com:443, client 10.10.80.147) [Mon Jul 28 16:17:48 2008] [info] SSL input filter read failed. [Mon Jul 28 16:17:48 2008] [error] SSL Library Error: -12215 MD5 digest function failed [Mon Jul 28 16:17:48 2008] [info] Connection to child 0 closed (server webserver1.pdl.pok.ibm.com:443, client 10.10.80.147) Any suggestions on how to determine what is wrong?
_______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto