Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS 1.2 HandShakeFailed / spurious handshake after sending client certificate #350

Closed
lovehermadly opened this issue Jan 28, 2019 · 3 comments
Assignees

Comments

@lovehermadly
Copy link

No description provided.

@lovehermadly
Copy link
Author

When trying to use warp-tls with a self-signed X509v3 certificate having key usages digitalSignature and keyEnciperherment set and being signed with RSA and SHA256 hashing, the TLS 1.2 handhake aborts with a "spurious handshake" message after a fatal alert InternalError.

My warp-tls instance is configured with tlsWantClientCert = True and with a onClientCertificate Serverhook which always returns CertificateUsageAccept for testing purposes.

The same issue can be reproduces with several recent browsers, e.g. Firefox Quantum 64 Bits on Ubuntu 18.04.

BTW, warp-tls currently does not support configuration of a CA certificate for providing it to the client during the certificate request message as a typical client certificate selection criterion.

@ocheron
Copy link
Contributor

ocheron commented Jan 29, 2019

Yes, same with tls-1.4.1 and current master.
The state machine used by the server fails when ClientKeyXchg and CertVerify are in the same packet.
I'll send a patch soon.

@ocheron ocheron self-assigned this Jan 29, 2019
@kazu-yamamoto
Copy link
Collaborator

BTW, warp-tls currently does not support configuration of a CA certificate for providing it to the client during the certificate request message as a typical client certificate selection criterion.

Would you bring this to https://github.com/yesodweb/wai?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants