[strongSwan] CRL check and certificates extensions
Fabrice Barconnière
fabrice.barconniere at ac-dijon.fr
Mon Jun 10 13:56:22 CEST 2013
Hello,
I have a problem with certificate status verification from a CRL :
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] using certificate "C=fr,
O=gouv, OU=education, OU=ac-dijon, CN=0711321A-01"
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] using trusted ca certificate
"C=fr, O=gouv, CN=RACINE AGRIATES"
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] checking certificate status of
"C=fr, O=gouv, OU=education, OU=ac-dijon, CN=0711321A-01"
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] fetching crl from
'http://crl1.igc.education.fr/agriates.crl' ...
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] using trusted certificate
"C=fr, O=gouv, CN=RACINE AGRIATES"
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] crl response verification failed
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] fetching crl from
'http://crl2.igc.education.fr/agriates.crl' ...
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] using trusted certificate
"C=fr, O=gouv, CN=RACINE AGRIATES"
Jun 10 13:28:13 sphynx2.3 charon: 05[CFG] crl response verification failed
Jun 10 13:28:14 sphynx2.3 charon: 05[CFG] certificate status is not
available
Certificates are issued by an external PKI.
I've built my own PKI with "ipsec pki" tool and with the same
configuration using this testing PKI, certificate status verification is OK.
The only difference i can see, is about certificates extensions.
External PKI :
* CA certificate extensions :
X509v3 extensions:
Netscape Cert Type:
SSL CA, S/MIME CA, Object Signing CA
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Subject Key Identifier:
7A:BC:B4:68:F8:B1:A2:32:44:C9:D0:EB:FD:9E:06:C2:56:01:2B:03
X509v3 Key Usage: critical
Digital Signature, Certificate Sign, CRL Sign
X509v3 Authority Key Identifier:
keyid:7A:BC:B4:68:F8:B1:A2:32:44:C9:D0:EB:FD:9E:06:C2:56:01:2B:03
* CRL extensions:
X509v3 Authority Key Identifier:
keyid:7A:BC:B4:68:F8:B1:A2:32:44:C9:D0:EB:FD:9E:06:C2:56:01:2B:03
X509v3 CRL Number:
15153
* End point Certificates extensions :
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Non Repudiation, Key Encipherment
Netscape Cert Type:
Object Signing
X509v3 Authority Key Identifier:
keyid:7A:BC:B4:68:F8:B1:A2:32:44:C9:D0:EB:FD:9E:06:C2:56:01:2B:03
X509v3 CRL Distribution Points:
URI:http://crl1.igc.education.fr/agriates.crl
URI:http://crl2.igc.education.fr/agriates.crl
My testing PKI:
* CA certificate extensions :
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Key Usage: critical
Certificate Sign, CRL Sign
X509v3 Subject Key Identifier:
1E:1E:EC:92:8B:D6:4D:0B:05:9E:40:DF:53:88:FC:8C:22:B3:13:8A
X509v3 Authority Key Identifier:
keyid:1E:1E:EC:92:8B:D6:4D:0B:05:9E:40:DF:53:88:FC:8C:22:B3:13:8A
* End point certificates extensions :
X509v3 extensions:
X509v3 Authority Key Identifier:
keyid:1E:1E:EC:92:8B:D6:4D:0B:05:9E:40:DF:53:88:FC:8C:22:B3:13:8A
X509v3 CRL Distribution Points:
URI:http://crl1.igc.education.fr/agriates.crl
* CRL Extensions :
X509v3 Authority Key Identifier:
keyid:1E:1E:EC:92:8B:D6:4D:0B:05:9E:40:DF:53:88:FC:8C:22:B3:13:8A
X509v3 CRL Number:
1
With external PKI, we found "netscapeCertType" and "Digital Signature"
extensions in the CA and the end point certificates and we found "Non
Repudiation" and "Key Encipherment" in end point certificates.
I wonder if these extensions can be the reason of the CRL problem.
Regards,
Fabrice Barconnière
http://dev-eole.ac-dijon.fr
More information about the Users
mailing list