Forum Discussion
How to deploy client authentication(require) using F5's self-signed certificate
Hi All,
Is there any deployment guide using client authentication require. whenever i try to change the Client Certificate option to require, it doesn't work but if change to auto,request and none, we have no issues.
Thanks! Ferdz
39 Replies
- Rafa_Ayala
Nimbostratus
Thank you ,
Configure again and these are my results:
Debug SSL :
May 27 13:26:42 asm03 debug tmm1[14565]: 01260006:7: Peer cert verify error: self signed certificate (depth 0; cert /C=MX/ST=DISTRITO FEDERAL/L=CIUDAD DE MEXICO/O=Servicios C.V/OU=Sitemas/CN=wit.com.mx/emailAddress=xxxxxx) May 27 13:26:42 asm03 debug tmm1[14565]: 01260009:7: Connection error: ssl_shim_vfycerterr:3580: self signed certificate (48) May 27 13:26:42 asm03 info tmm1[14565]: 01260013:6: SSL Handshake failed for TCP x.x.x.x:57862 -> x.x.x.x:8120
send costumer the certificates:
remote device:
client1.p12
F5 ASM:
set in: client authentication clientCA.crt and clientCA.key
- dragonflymr
Cirrostratus
Well, from trace it looks for me that you are using self-signed certificate as client certificate (one installed in browser). I doubt it will work as only CA is certificate itself (if I can say so). Then there is no way to place any valid CA certificate in Trusted Certificate Authority field.
I did it as described in solution mentioned in my old post:
Using openssl Created private CA (generating key and certificate)
Issue CSR for client certificate
Get it signed by my CA
Then convert client key/cert pair to PKCS12
Import in browser as User certificate for authentication
Select my private CA certificate in Trusted Certificate Authority field (sure imported it first into LTM via System > File Management > SSL Certificate List)
After that everything works like a charm.
Of course if you using some public well known CA for signing client certificate you have to set this CA in Trusted Certificate Authority field (or probably build in ca-bundle will work)
Piotr
- Rafa_Ayala_1738
Nimbostratus
use the solution : SOL14499
[root@asm03:Active:Standalone] exampleCA ls client1.crt client1.key client1.p12 client1.pem client1.req clientCA.crt clientCA.key clientCA.p12 clientCA.pem client2.crt
convert client key/cert pair to PKCS12 and send costumer the certificate: client1.p12
set in my ASM trusted certificate Autorities with the certificate : clientCA.crt
set in the profile ssl configuration :
wifi_host_test1 = client2.crt(self signed by my CA "clientCA-cert) <<<<<
Thank You
- dragonflymr
Cirrostratus
I assume that it started to work? I really missed "using F5's self-signed certificate" part of this post subject :-( I doubt it's possible to use self-signed cert as client cert - it breaks logic of certificate based authentication. Piotr
- Rafa_Ayala
Nimbostratus
use the solution : SOL14499
[root@asm03:Active:Standalone] exampleCA ls client1.crt client1.key client1.p12 client1.pem client1.req clientCA.crt clientCA.key clientCA.p12 clientCA.pem client2.crt
convert client key/cert pair to PKCS12 and send costumer the certificate: client1.p12
set in my ASM trusted certificate Autorities with the certificate : clientCA.crt
set in the profile ssl configuration :
wifi_host_test1 = client2.crt(self signed by my CA "clientCA-cert) <<<<<
Thank You
- dragonflymr
Cirrostratus
I assume that it started to work? I really missed "using F5's self-signed certificate" part of this post subject :-( I doubt it's possible to use self-signed cert as client cert - it breaks logic of certificate based authentication. Piotr
- Rafa_Ayala
Nimbostratus
Not work :(
All certificates are signed by my CA.
client1.p12 signed by my CA (f5) and send costumer /install in desktop
clientCA.crt is my CA (F5)
client2.crt is my webserver cert
my TMOS version : 11.5.1 HF8
- dragonflymr
Cirrostratus
It sad to hear that. I have no idea what could be wrong here. I followed referenced SOL and my lab system started to work without any issue. Will dig in my notes and try to post troubleshooting steps that can be used - but on Monday, right now here in Europe weekend begins - time to trow away work stuff and do some partying :-)
Piotr
- nitass
Employee
All certificates are signed by my CA.
client1.p12 signed by my CA (f5) and send costumer /install in desktop
clientCA.crt is my CA (F5)how did you create client1 certificate (i.e. how did you sign client1 certificate)?
- Rafa_Ayala
Nimbostratus
Hello nitass
I followed the step : Creating and signing a client certificate in the solution :SOL14499
Thank you
- Rafa_Ayala
Nimbostratus
The problem is solved, I had a problem with the common name :)
My new error is :
Verify return code: 20 (unable to get local issuer certificate)
My web Server certificate is signed by verisign and my (authentication certificate ) is signed by my local CA
- nitass
Employee
Verify return code: 20 (unable to get local issuer certificate)
is Verisign root ca certificate in client's ca certificate store?
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com