Forum Discussion
Xavier_Gillmann
Nimbostratus
Sep 15, 2005Certs chains and authenticate depth...
Hi everybody,
I'm currently encountering problems with (client) certificate validation: when the client registers all certificate chain in its browser, this one (at least IE) submits all the chain when negociating with BigIP... which seems to provoque validation failure on BigIP
... well at least this how I understand the following logs
Code:
when CLIENTSSL_CLIENTCERT {
log LOCAL0.debug "nbr certs: [SSL::cert count] verifyResult: [SSL::verify_result] // [X509::verify_cert_error_string [SSL::verify_result]]"
set i 0
while {$i < [SSL::cert count]} {
log LOCAL0.debug "[X509::subject [SSL::cert $i]]"
incr i
}
Log:
Sep 15 11:30:40 tmm tmm[716]: 01260014:4: Peer cert verify error: unsupported certificate purpose (depth 0; cert /O=...(the Root CA)...)
Sep 15 11:30:40 tmm tmm[716]: Rule sslSymDEV : nbr certs: 3 verifyResult: 26 // unsupported certificate purpose
Sep 15 11:30:40 tmm tmm[716]: Rule sslSymDEV : /C=...(my cert)...
Sep 15 11:30:40 tmm tmm[716]: Rule sslSymDEV : /C=...(the signing CA)
Sep 15 11:30:40 tmm tmm[716]: Rule sslSymDEV : /O=...(the Root)
Of course, when my client do not register the all chain, the only submitted certificate is its own ... and the verification goes right (as that one can be used for authentication)...
Log:
Sep 15 11:46:14 tmm tmm[716]: Rule sslSymDEV : nbr certs: 1 verifyResult: 0 // ok
Sep 15 11:46:14 tmm tmm[716]: Rule sslSymDEV : /C=... (my cert) ...
I tried to set the authenticate depth... but it do no seem to have any effect.
Does anybody have an idea of what I could do wrong?
Thanks in advance,
Xavier
- Carla_Molenda_1
Nimbostratus
We had a similar problem where we received "unsupported certificate purpose" with the certificate authority listed as the failing certificate. The problem was in the code - it did not understand part of the encoding in the CA certificate. F5 created a hot fix for us. If you are not receivng failures just submitting the client cert then your problem is also likely one of the CA certs. - Xavier_Gillmann
Nimbostratus
Hello, - Steve_Brockman_
Nimbostratus
Fyi, I just ran into this problem today (unsupported certificate purpose) and thought I would post my solution. Maybe it will help someone else in the future!- Matt_Duguid_589
Nimbostratus
Thanks very much your post did help us 7 years down the track :) We are testing a solution where we automatically deploy client authentication certificates to iOS/Andriod devices via Microsoft Intune/NDES, these are presented from "F5 Edge Client 2.0.4 (7060.2014.1006.1)" to "F5 Appliance 11.4" to connect via VPN. We were failing with the following in the SSL debug logs of the F5 Appliance, ------------------------- May 20 13:20:40 DEVICEX debug tmm[17839]: 01260006:7: Peer cert verify error: unsupported certificate purpose (depth 0; cert /CN=USERX) May 20 13:20:40 DEVICEX debug tmm[17839]: 01260009:7: Connection error: ssl_shim_vfycerterr:2912: unsupported certificate purpose (42) ------------------------- On the ADCS certificate template the "intended purpose" of "server authentication" had been enabled in addition to "client authentication". As soon as we removed the "server authentication" and reissued the certificates our issue went away as well and access worked. MD
- Steve_Brockman_
Nimbostratus
Hello again, - Steve_Brockman_
Nimbostratus
Sorry to repost,
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects