Bug 477696

Summary: ca-bundle breaks bi-driectional http authentication
Product: [Fedora] Fedora Reporter: Ray Todd Stevens <raytodd>
Component: ca-certificatesAssignee: Joe Orton <jorton>
Status: CLOSED WONTFIX QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: low Docs Contact:
Priority: low    
Version: 10CC: jorton, tmraz
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-12-18 07:22:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
this is the file that works
none
the ssl.conf file for etc/httpd/conf.d
none
virtual host file for ssl none

Description Ray Todd Stevens 2008-12-22 22:50:44 UTC
Created attachment 327710 [details]
this is the file that works

Description of problem:

OK this may be a bit esoteric, but I have an application that uses client certificates for ssl on apache.    The upgrade to fc10 breaks it.   After much testing I find that if I use the ca-bundle from the previous version, then everything starts working again.

The problem actually appears as an interface problem between IE and apache.   If you connect to http://www.example.com/ everything works.   If you connect to https://www.example.com/ without this client authentication, everything works.   BUT if you

a turn on SSLVerifyClient
b. use Internet Explorer
c. use a free thawte email certificate

It acts like if can't do a dns lookup of the web site.

Changing the /etc/pki/tls/certs/ca-bundle.crt file for the previous one fixes the problem and everything starts working again.

Comment 1 Joe Orton 2009-01-02 16:53:50 UTC
Please attach the mod_ssl configuration which you're using.

Comment 2 Ray Todd Stevens 2009-01-02 17:05:09 UTC
I assume you are talking about the httpd.conf file I guess.  There are a couple of other files that this might be.  I will try and get you copies of the whole thing.   PS this problem actually exists on three machines, so I will only be sending you the files from one to same some space, but if you want something from all three I will be glad to provide it.

Comment 3 Ray Todd Stevens 2009-01-02 17:15:29 UTC
Created attachment 328081 [details]
the ssl.conf file for etc/httpd/conf.d

Note that this is minus the virutal host things.   These servers have multiple virtual hosts on multiple ips, so for sake of more modular design the virtual host stuff is in seperate files.  I will send you a sample of this next.   This will only be a sample,  three severs with 2-9 virtual hosts per server is a lot of data, so unless you need all of them, which I doubt because they all work alike, I am only sending you the one.

Comment 4 Ray Todd Stevens 2009-01-02 17:20:17 UTC
Created attachment 328082 [details]
virtual host file for ssl

Here is the virtual host file for a sample.  I have removed the host name and will be sending that to you seperately in case you need it.

Comment 5 Ray Todd Stevens 2009-01-03 00:01:00 UTC
Comment on attachment 328081 [details]
the ssl.conf file for etc/httpd/conf.d

making it into text

Comment 6 Ray Todd Stevens 2009-01-03 00:03:25 UTC
The offending line is at the bottom of the vh file

SSLVerifyClient optional_no_ca

If this is commented out then everything works with the existing bundle.  But anything else causes the problem.    

Also note that we are using the free thwate email certificates.

Comment 7 Ray Todd Stevens 2009-01-18 02:53:42 UTC
OK I found another application that this breaks.   This breaks sendmail 465 level authentication.   There definitely seems to be a problem here.

Comment 8 Joe Orton 2009-01-19 13:07:32 UTC
See bug 479484 for more info on this in the sendmail context.

It could well be that there is a buggy Microsoft SSL implementation common to both problems, if you're only seeing this with MSIE/Outlook clients.

Comment 9 Joe Orton 2009-01-19 13:09:13 UTC
It would be really useful if you could try a process similar to the reporter in the sendmail bug:

1) take a copy of ca-bundle.crt and configure mod_ssl to use that
2) remove a cert from the beginning
3) test
4) goto 2 if test fails

to see if this is a similar number-of-certs-in-the-list issue.

Comment 10 Ray Todd Stevens 2009-01-19 13:20:28 UTC
Interesting, but the ms bug is not applicable.

a.   was never using MSIE and Outlook.
b.   The same problem exists going fedora to fedora.

However other than this the symptoms reported by the first reporter of this bug are the same with one one possible exception.   Don't know if he is using port 465 tls authentication.   But I would bet that he is.   I am wondering if these are indeed the same bug and that the comment on the bug in MS is not a red herring.

Comment 11 Ray Todd Stevens 2009-01-25 20:33:01 UTC
This also breaks palm access to email

Comment 12 Joe Orton 2009-01-26 10:59:46 UTC
Have you managed to try the process in comment 9 for any additional case which breaks?

Comment 13 Ray Todd Stevens 2009-01-26 12:38:57 UTC
Used the old ca bundle and that worked.

The comment as I understood it was in reference to a microsoft bug, and once again this is not involving a ms operating system.

Comment 14 Joe Orton 2009-06-23 08:47:19 UTC
Would anybody seeing this bug be willing to test out some experimental mod_ssl+OpenSSL packages?

There is a bug being tracked upstream with very similar symptoms, which is caused by a bug in OpenSSL+mod_ssl.

Comment 15 Joe Orton 2009-06-23 08:47:53 UTC
(if anybody is willing, please state what Fedora version)

Comment 16 Bug Zapper 2009-11-18 12:42:08 UTC
This message is a reminder that Fedora 10 is nearing its end of life.
Approximately 30 (thirty) days from now Fedora will stop maintaining
and issuing updates for Fedora 10.  It is Fedora's policy to close all
bug reports from releases that are no longer maintained.  At that time
this bug will be closed as WONTFIX if it remains open with a Fedora 
'version' of '10'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version prior to Fedora 10's end of life.

Bug Reporter: Thank you for reporting this issue and we are sorry that 
we may not be able to fix it before Fedora 10 is end of life.  If you 
would still like to see this bug fixed and are able to reproduce it 
against a later version of Fedora please change the 'version' of this 
bug to the applicable version.  If you are unable to change the version, 
please add a comment here and someone will do it for you.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events.  Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

The process we are following is described here: 
http://fedoraproject.org/wiki/BugZappers/HouseKeeping

Comment 17 Bug Zapper 2009-12-18 07:22:34 UTC
Fedora 10 changed to end-of-life (EOL) status on 2009-12-17. Fedora 10 is 
no longer maintained, which means that it will not receive any further 
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
Fedora please feel free to reopen this bug against that version.

Thank you for reporting this bug and we are sorry it could not be fixed.