Forum Discussion
Sonny
Cirrus
May 12, 2010Ignore "Extended Key Usage" field in Cert
Looking for help with an iRule to ignore a field in the cert. In particular, I want the F5 to ignore the "Extended Key Usage" field of the cert. Background info: I have a connection in which the server authentication is working fine but the client authentication is falling down and we have tested various scenarios and have found that if we can have an iRule that ignores that field in the cert. then the client authentication would work, too. Any help would be greatly appreciated.
6 Replies
- hoolio
Cirrostratus
Hi Sonny,
How are you validating the client cert now on LTM? Are you using an iRule? If so, can you post the iRule code and LTM version you're testing on? What issue are you seeing with the extended key usage field?
Aaron - Sonny
Cirrus
Yeah, the client is currently using this iRule to check the validity of the cert.:
when CLIENTSSL_CLIENTCERT {
log cron.warning [SSL::verify_result]
SSL::verify_result 0
log cron.warning [SSL::verify_result]
}
and from the logs...
May 13 08:55:30 tmm tmm[1249]: Rule XXXX-irule
: 26
May 13 08:55:30 tmm tmm[1249]: Rule XXXX-irule
: 0
and from the "26" code:http://www.openssl.org/docs/apps/ve...IAGNOSTICS:
26 X509_V_ERR_INVALID_PURPOSE: unsupported certificate purpose the supplied certificate cannot be used for the specified purpose.
So what we want to do is try to come up with an iRule to look at the cert and then ignore the specific "extended key usage" field in the cert. Hope this helps... We could just get another cert BUT that $$$. - Sonny
Cirrus
The "extend key usage" field on the cert. is missing the blip that say it's client auth. as well as server auth. - Sonny
Cirrus
The 26 code didn't paste well...
26 X509_V_ERR_INVALID_PURPOSE:
unsupported certificate purpose the supplied certificate cannot be used for the specified purpose.
from this link:http://www.openssl.org/docs/apps/ve...IAGNOSTICS - hoolio
Cirrostratus
Hi Sonny,
Your posts are still getting munged by the forum code. If you're checking the SSL::verify_result value, couldn't you just add logic to check for a status of 26 and change the iRule action?
I don't think there is a way to tell LTM to ignore this issue for you.
Aaron - Sonny
Cirrus
Thanks for the replying Hoolio. I ended up getting a new cert. and it worked!
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
