[179100] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: FIXED - Re: Broken SSL cert caused by router?

daemon@ATHENA.MIT.EDU (Doug Barton)
Sat Mar 28 15:32:08 2015

X-Original-To: nanog@nanog.org
Date: Sat, 28 Mar 2015 12:32:04 -0700
From: Doug Barton <dougb@dougbarton.us>
To: Mike <mike-nanog@tiedyenetworks.com>
In-Reply-To: <5516D152.4060707@tiedyenetworks.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--RqkVnnIKfPinMuAn7aNRCNVd6eqOWFl8H
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: quoted-printable

On 3/28/15 9:05 AM, Mike wrote:
> I went back to Frank's list and did some additional testing. I have a
> different server which was set up the same way as the previous one
> discussed, and I thought I would use the above tools and see if my
> problem would have been identified by any of them. I am sorry to report=
,
> no, none of these either caught the problem either. Although I still do=

> not fully understand the dependencies involved, it seems that if my
> server was failing to supply the full certificate chain, and the browse=
r
> was compensating for it by (attempting?) to load the missing certificat=
e
> from elsewhere,  and this Meraki router was somehow able to confound
> that process, that would be an issue worthy of exploring more. I
> certainly don't blame these ssl check sites but clearly theres more
> checks needed.

The Qualsys site (https://www.ssllabs.com/ssltest/analyze.html) will=20
report whether or not the server supplied the intermediate cert. But I=20
agree with you that the other tools should make a bigger deal about it=20
if the server doesn't supply it.

FWIW, it's been the CW to do this for some time now, as there are=20
systems like the one you've run into that were designed before=20
intermediate certs were commonplace, and don't know how to handle them.

I've also experienced situations where an enterprise purchases a DV=20
certificate to be used on an offline system, and while that system has=20
access to the "root" CA certs, it cannot retrieve the intermediate cert. =

Having the end system supply the intermediate cert as well solves this=20
issue.

The method of supplying the intermediate cert is simple, just append the =

intermediate certificate to the end of the file with your server=20
certificate (the .crt file). Any reasonably modern software will handle=20
that transparently, and provide the intermediate cert along with the=20
server cert when doing its business.

hope this helps,

Doug

--=20
I am conducting an experiment in the efficacy of PGP/MIME signatures.=20
This message should be signed. If it is not, or the signature does not=20
validate, please let me know how you received this message (direct, or=20
to a list) and the mail software you use. Thanks!


--RqkVnnIKfPinMuAn7aNRCNVd6eqOWFl8H
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJVFwG1AAoJEFzGhvEaGryE6SoH/3r9bXPetYtAxItM3NRqzy8p
dHFIELDQP/L4yINWPucckEPtjRlsEzX/MIVxt7UY5O/Yfw5R348CjErynP2IuzHe
Y7KGiNHpAwtUMHzlFU/P8vT7O0h/Tl82KE2JhZDg+F1tL6xdEdPvqGTL4xp53PF1
QeOAguac7OfEnEhIGI/yL2F7GCLdLYQwgUBB0mIGll19IZ4BLnDE9Vi6kkxC22dw
RqudRNyIApkWdpmUZLR/jJRN/2aFPb4b0TKC/URfsyHstu03ph+Ae+cAPgXYGwtc
wYAxnmTUA/h5KA61lP/hVp0t1g6phqr03c6UKE8MFRyavRA3wsgmSPVjUz9LPmU=
=mWdD
-----END PGP SIGNATURE-----

--RqkVnnIKfPinMuAn7aNRCNVd6eqOWFl8H--

home help back first fref pref prev next nref lref last post