Bug 752777 - condor-aviary doesn't take openssl certificates
Summary: condor-aviary doesn't take openssl certificates
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise MRG
Classification: Red Hat
Component: condor-aviary
Version: Development
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: 2.1
: ---
Assignee: Pete MacKinnon
QA Contact: MRG Quality Engineering
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-11-10 12:23 UTC by Stanislav Graf
Modified: 2011-11-10 14:06 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-11-10 14:06:37 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 733677 0 high CLOSED Integration of aviary for job control, submission, and job/submission queries [RFE] 2021-02-22 00:41:40 UTC

Internal Links: 733677

Description Stanislav Graf 2011-11-10 12:23:08 UTC
Description of problem:
As was discussed in bug 752414 - certificates generated by certutil and openssl need to be manually reformated to be able to use with condor-aviary. Both formats (server cert first or cacert first in serv.pem) are OK for openssl.

Btw. the same problem has cumin.

When we try to verify those certificates before manual change (aviary doesn't like):
# openssl verify -CAfile                    ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:15:43] ecode=0
# openssl verify -purpose sslclient -CAfile ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:15:49] ecode=0
# openssl verify -purpose sslserver -CAfile ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:15:54] ecode=0
# openssl verify -purpose any       -CAfile ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:16:02] ecode=0

and after change (aviary likes):
# openssl verify -CAfile                    ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:13:35] ecode=0
# openssl verify -purpose sslclient -CAfile ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:13:44] ecode=0
# openssl verify -purpose sslserver -CAfile ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:13:53] ecode=0
# openssl verify -purpose any       -CAfile ./ca.pem serv.pem client.pem
serv.pem: OK
client.pem: OK
[12:14:02] ecode=0

Version-Release number of selected component (if applicable):
cumin-0.1.5098-1
condor-7.6.5-0.6
condor-aviary-7.6.5-0.6

How reproducible:
100%

Steps to Reproduce:
see bug 752414 

Actual results:
Generated certificates need manual change

Expected results:
Certificates works withou manual change

Additional info:

Comment 1 Pete MacKinnon 2011-11-10 14:00:59 UTC
The failures without the change occur in the openssl API, not aviary.

Comment 2 Pete MacKinnon 2011-11-10 14:06:37 UTC
"SSL_CTX_use_certificate_chain_file() loads a certificate chain from file into ctx. The certificates must be in PEM format and must be sorted starting with the subject's certificate (actual client or server certificate), followed by intermediate CA certificates if applicable, and ending at the highest level (root) CA. There is no corresponding function working on a single SSL object."


Note You need to log in before you can comment on or make changes to this bug.