Jeffrey,
thanks! Actually that's what I did: Comparing the data of the certificate that
worked with that which does not.
I could not find any relevant difference.
I also wondered whether the objectclass might make a difference:
The object that works has:
objectClass: top
objectClass: posixAccount
objectClass: inetOrgPerson
objectClass: shadowAccount
and the object that doesn't has
objectClass: account
objectClass: simpleSecurityObject
Both objects are in the same DIT (database), but have a different context.
However I adjusted the olcAuthzRegexp:
olcAuthzRegexp: {0} "^cn=uid\\3Dsyncrepl,...,c=DE$" "dn:
uid=syncrepl,ou=system,....,dc=de"
olcAuthzRegexp: {1} "^cn=uid\\3D([^,]+),...,c=DE$" "dn:
uid=$1,ou=people,...dc=de"
The "..." is an ellipsid (redacted some details).
The second regex is the one that works...
Kind regards,
Ulrich Windl
> -----Original Message-----
> From: Jeffrey Walton <[email protected]>
> Sent: Wednesday, March 5, 2025 4:17 PM
> To: Windl, Ulrich <[email protected]>
> Cc: [email protected]
> Subject: [EXT] Re: Getting details for "TLS trace: SSL3 alert
> read:fatal:unsupported certificate"
>
> On Wed, Mar 5, 2025 at 9:53 AM Windl, Ulrich <[email protected]> wrote:
> >
> >
> > After „playing“ significant time with certificate authentication, I managed
> > to
> authenticate one user. However when I tried to authenticate a different user
> with a similar certificate, I see a
> >
> >
> >
> > TLS trace: SSL3 alert read:fatal:unsupported certificate
> >
> >
> >
> > Error. Can I can some details about the “usupportedness” of my certificate?
> The only thing I could think if is that uid of the newer certificate has a CN
> that
> is three characters longer than the one that worked.
> >
>
> Have a look at the cert using OpenSSL and the x509 subcommand:
>
> $ openssl x509 -in .../rsyslog/contrib/gnutls/ca.pem -inform PEM -text -
> noout
> Certificate:
> Data:
> Version: 3 (0x2)
> Serial Number: 1 (0x1)
> Signature Algorithm: sha1WithRSAEncryption
> Issuer: C = DE, O = rsyslog test root CA, OU = CA, CN =
> rsyslog-test-root-ca
> Validity
> Not Before: May 20 12:58:12 2008 GMT
> Not After : May 18 12:58:24 2018 GMT
> Subject: C = DE, O = rsyslog test root CA, OU = CA, CN =
> rsyslog-test-root-ca
> Subject Public Key Info:
> Public Key Algorithm: rsaEncryption
> Public-Key: (1024 bit)
> Modulus:
> 00:c3:6b:3e:57:e5:82:2b:b8:f1:f4:c2:e9:0c:3e:
> 29:3b:c4:82:aa:ae:90:9c:af:c1:a6:db:ca:33:e6:
> 1e:06:b5:7d:b9:dd:e5:ab:a6:20:6e:93:66:bf:7f:
> f0:8a:0e:37:ae:aa:68:96:a9:3b:3d:d0:f1:4d:6f:
> e6:75:73:e6:33:bd:a8:2a:bf:cd:15:cd:9c:03:23:
> 84:5c:af:09:4d:68:aa:c1:cf:ff:57:8a:8c:02:72:
> 85:7c:b3:b1:af:57:6b:ed:64:43:d2:4e:13:73:cf:
> 81:58:93:10:8c:bd:b3:98:65:e2:48:61:05:61:66:
> 08:14:72:e6:9d:7e:19:83:23
> Exponent: 65537 (0x10001)
> X509v3 extensions:
> X509v3 Basic Constraints: critical
> CA:TRUE
> X509v3 Key Usage: critical
> Certificate Sign, CRL Sign
> X509v3 Subject Key Identifier:
> 33:61:04:20:52:6D:18:2C:D7:5A:AC:99:DC:D9:CD:4B:C5:85:42:94
> Signature Algorithm: sha1WithRSAEncryption
> Signature Value:
> b8:65:ad:1f:b2:64:a5:ad:27:fe:2c:ea:43:97:5d:0d:03:ff:
> 2d:3e:ad:6a:2b:c2:c2:5a:44:60:45:3d:6a:e9:a9:40:f5:96:
> c6:d6:32:c0:a6:8f:45:f3:35:25:33:0b:02:26:1d:f0:c4:bb:
> 4c:9f:13:61:1b:ef:47:7d:98:d3:66:3e:3a:15:e7:d7:5c:44:
> 46:45:af:05:3d:8c:f7:2c:ea:5f:a8:43:7d:1b:9e:37:b4:53:
> 7c:f5:ac:7e:6f:cd:05:35:68:8f:38:da:10:27:13:15:e9:d9:
> 89:de:cf:0b:92:62:15:b7:14:e8:f4:94:31:9e:3d:fc:93:e1:
> c4:0a
>
> > A more complete trace for ldapwhoami woul look like this:
> >
> > …
> >
> > ldap_parse_result
> >
> > ber_scanf fmt ({iAA) ber:
> >
> > ber_scanf fmt (}) ber:
> >
> > ldap_msgfree
> >
> > TLS trace: SSL_connect:before SSL initialization
> >
> > TLS trace: SSL_connect:SSLv3/TLS write client hello
> >
> > TLS trace: SSL_connect:SSLv3/TLS write client hello
> >
> > TLS trace: SSL_connect:SSLv3/TLS read server hello
> >
> > TLS trace: SSL_connect:TLSv1.3 read encrypted extensions
> >
> > TLS trace: SSL_connect:SSLv3/TLS read server certificate request
> >
> > TLS certificate verification: depth: 2, err: 0, subject: /…. Root-CA (2018),
> issuer: /… Root-CA (2018)
> >
> > TLS certificate verification: depth: 1, err: 0, subject: /… Host-CA (2018),
> issuer: /… Root-CA (2018)
> >
> > TLS certificate verification: depth: 0, err: 0, subject: /… FQHN, issuer: /…
> Host-CA (2018)
> >
> > TLS trace: SSL_connect:SSLv3/TLS read server certificate
> >
> > TLS trace: SSL_connect:TLSv1.3 read server certificate verify
> >
> > TLS trace: SSL_connect:SSLv3/TLS read finished
> >
> > TLS trace: SSL_connect:SSLv3/TLS write change cipher spec
> >
> > TLS trace: SSL_connect:SSLv3/TLS write client certificate
> >
> > TLS trace: SSL_connect:SSLv3/TLS write certificate verify
> >
> > TLS trace: SSL_connect:SSLv3/TLS write finished
> >
> > ldap_sasl_interactive_bind: user selected: EXTERNAL
> >
> > ldap_int_sasl_bind: EXTERNAL
> >
> > ldap_int_sasl_open: host=FQHN
> >
> > SASL/EXTERNAL authentication started
> >
> > ldap_sasl_bind
> >
> > ldap_send_initial_request
> >
> > ldap_send_server_request
> >
> > ber_scanf fmt ({it) ber:
> >
> > ber_scanf fmt ({i) ber:
> >
> > ber_flush2: 26 bytes to sd 3
> >
> > ldap_msgfree
> >
> > ldap_result ld 0x56432476ac30 msgid 2
> >
> > wait4msg ld 0x56432476ac30 msgid 2 (infinite timeout)
> >
> > wait4msg continue ld 0x56432476ac30 msgid 2 all 1
> >
> > ** ld 0x56432476ac30 Connections:
> >
> > * host: FQHN port: 389 (default)
> >
> > * from: IP=172.20.16.36:57868
> >
> > refcnt: 2 status: Connected
> >
> > last used: Wed Mar 5 15:42:03 2025
> >
> >
> >
> >
> >
> > ** ld 0x56432476ac30 Outstanding Requests:
> >
> > * msgid 2, origid 2, status InProgress
> >
> > outstanding referrals 0, parent count 0
> >
> > ld 0x56432476ac30 request count 1 (abandoned 0)
> >
> > ** ld 0x56432476ac30 Response Queue:
> >
> > Empty
> >
> > ld 0x56432476ac30 response count 0
> >
> > ldap_chkResponseList ld 0x56432476ac30 msgid 2 all 1
> >
> > ldap_chkResponseList returns ld 0x56432476ac30 NULL
> >
> > ldap_int_select
> >
> > read1msg: ld 0x56432476ac30 msgid 2 all 1
> >
> > ber_get_next
> >
> > TLS trace: SSL3 alert read:fatal:unsupported certificate
> >
> > ber_get_next failed, errno=0.
> >
> > ldap_err2string
> >
> > ldap_sasl_interactive_bind: Can't contact LDAP server (-1)
> >
> > …
>
> Jeff