Disable "Acceptable client certificate CA names" on MTLS client connect. #389
Replies: 5 comments 4 replies
-
I am not able to understand what you want to configure. Can you give me more context so I can understand your situation? What issue do you have and what would you like to prevent? |
Beta Was this translation helpful? Give feedback.
-
Keystore example with CA and server certificate:
Truststore example with CA and client certificate DN "[email protected]":
Sorry but I cannot attach the keystore. I send them to you in base64. base64 --decode /path/to/file > keystore.p12 Password for keystores "changeit". You can try these keystores with the Jetty implementation that I defined at the beginning of this discussion. |
Beta Was this translation helpful? Give feedback.
-
Your solution is working perfectly :-) Partial reponse: ...
---
Server certificate
subject=CN = ssl-server-cert
issuer=CN = ssl-ca-cert
---
No client certificate CA names sent
Client Certificate Types: ECDSA sign, RSA sign, DSA sign
Requested Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
Shared Requested Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 2067 bytes and written 472 bytes
Verification error: self-signed certificate in certificate chain
---
... Thank you very much for your help and work :-) |
Beta Was this translation helpful? Give feedback.
-
I have reopened the discussion because I have detected a flaw with the solution you have proposed. Flow:
Command openssl s_client -showcerts -servername 127.0.0.1 -connect 127.0.0.1:8443 </dev/null |
Beta Was this translation helpful? Give feedback.
-
you are really fast ... |
Beta Was this translation helpful? Give feedback.
-
In MTLS configuration, by default, all allowed clients CN are returned when a client initializes an SSL communication. This can lead to many security risks and information leaks.
This is my server implementation:
Command to check issue:
openssl s_client -showcerts -servername 127.0.0.1 -connect 127.0.0.1:8443 </dev/nul
Partial reponse:
How can I disable the response of allowed clients in the truststore file?
Best regards :-)
Beta Was this translation helpful? Give feedback.
All reactions