Certificate issues while accepting incoming connection [message #1844757] |
Fri, 24 September 2021 03:07  |
Eclipse User |
|
|
|
Good morning,
I have a TTCN-3 port used for incoming notification messages over TCP/TLS.
The mapping of this port is working fine.
Unfortunately, while accepting an incoming connection, I have this error message:
Dynamic test case error: Abstract socket: ssl_certificate_chain_file is not defined in the configuration file
I created my own bundle of certificates, with a self signed root certificate, and I got the following error during TLS negotiations:
MTC@FSCOM-DEV: Abstract socket: Accept SSL connection request
MTC@FSCOM-DEV: Abstract socket: SSL operation result:
MTC@FSCOM-DEV: Abstract socket: SSL_ERROR_SSL
MTC@FSCOM-DEV: Abstract socket: SSL error queue content:
MTC@FSCOM-DEV: Abstract socket: Library: SSL routines
MTC@FSCOM-DEV: Abstract socket: Function: tls_post_process_client_hello
MTC@FSCOM-DEV: Abstract socket: Reason: no shared cipher
MTC@FSCOM-DEV: Abstract socket: warning: Connection from client 8 is refused
MTC@FSCOM-DEV: Abstract socket: leaving SSL_Socket::add_user_data()
Note that I provided root certificate, a certificate signed by my root certificate and my certificate private key using Abstract socket methods:
parameter_set(ssl_trustedCAlist_file_name(), "../certificates/out/certs/CA_dsa.cert.pem");
parameter_set(ssl_private_key_file_name(), "../certificates/out/privates/e5e11abad8003766e4a7b721afb175a189b5f4cc7046af9b0d8eaebb86f28c40_server_dsa.key.pem");
parameter_set(ssl_certificate_file_name(), "../certificates/out/certs/e5e11abad8003766e4a7b721afb175a189b5f4cc7046af9b0d8eaebb86f28c40_server_dsa.cert.pem");
I have no idea how to fix it. Please can you provide my some hints?
Many thanks in advance,
BR\ Yann
|
|
|
|
|
|
|
|
|
Re: Certificate issues while accepting incoming connection [message #1844881 is a reply to message #1844850] |
Tue, 28 September 2021 11:26  |
Eclipse User |
|
|
|
Right, Yann, the verification was not done.
I updated in the Client cfg (TLSTest_C.cfg) as follows:
*.tlsPort.mode := "advanced"
*.tlsPort.ssl_use_ssl := "yes"
*.tlsPort.server_mode := "no"
*.tlsPort.ssl_trustedCAlist_file := "/home/olaf/TLSTest/rootCA.crt"
*.tlsPort.ssl_verify_certificate := "yes"
*.tlsPort.use_connection_ASPs := "yes"
This works, i.e. the Client verifies the Server certificate using rootCA.crt as the CA.
The tricky part is the keys and certificate generation for testing. I followed the instructions as written in Certification-Info.txt in the project I sent before. There are probably many other ways to generate keys and certificates.
Refards,
Olaf
|
|
|
Powered by
FUDForum. Page generated in 0.03714 seconds