Portál AbcLinuxu, 9. května 2025 00:25
Mon Oct 5 21:27:19 2015 MULTI: multi_create_instance called
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 Re-using SSL/TLS context
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 LZO compression initialized
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 Local Options hash (VER=V4): '530fdded'
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 Expected Remote Options hash (VER=V4): '41690919'
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 TLS: Initial packet from 93.91.149.5:1488, sid=ac10d7b8 34235c81
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: /C=CZ/ST=kkk/L=lll/O=ooo/OU=ouou/CN=nnn/emailAddress=nnn@ddd.cz
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 TLS_ERROR: BIO read tls_read_plaintext error: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificat
e returned
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 TLS Error: TLS object -> incoming plaintext read error
Mon Oct 5 21:27:19 2015 93.91.149.5:1488 TLS Error: TLS handshake failed
Řešení dotazu:
unable to get local issuer certificateTo vypada, ze se nepodarilo overit klientsky certifikat u CA. Protoze go nemuze najit:
SSL3_GET_CLIENT_CERTIFICATE:no certificatOtestuj:
openssl verify -CAfile CA.crt kloient.crt
openssl x509 -text -in klient.crt
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=CZ, ST=kk, L=ll, O=ooo, CN=Podnik Personals CA
Validity
Not Before: Sep 25 10:54:29 2015 GMT
Not After : Sep 24 10:54:29 2017 GMT
Subject: C=CZ, ST=kk, L=ll, O=ooo, OU=OC, CN=klient/emailAddress=klient@podnik.cz
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
xxxxxxxxxxx
xxxxxxxxxxx
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
YaST Generated Client Certificate
Netscape Cert Type:
SSL Client, S/MIME, Object Signing
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Subject Key Identifier:
72:8D:85:99:56:47:4B:79:15:1B:CE:48:16:84:D5:A6:EC:77:28:CC
X509v3 Authority Key Identifier:
keyid:FB:36:9D:C2:FB:C0:A9:39:DD:5E:42:54:59:0E:61:E1:C6:26:02:A9
DirName:/C=CZ/ST=kk/L=ll/O=podnik/CN=podnik ROOT CA/emailAddress=rootca@podnik.cz
serial:02
X509v3 Subject Alternative Name:
email:doubravova.hana@jednota.podborany.cz
Signature Algorithm: sha1WithRSAEncryption
xxxxxxxxxxxxx
xxxxxxxxxxxxx
-----BEGIN CERTIFICATE-----
xxxxxxx
xxxxxxx
-----END CERTIFICATE-----
pokud se v tom vyznáte a máte nějaký nápad, budu vděčný.
Milan
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.