You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When you run a check with a client certificate against a tls secured secured service, but your client certificate requires a chain file, the check will fail with sslv3 alert bad certificate. The openssl s_client doesn't suppurt respect the certificate chain in a bundle, but rather requires the -chainCAfile commandline parameter.
To Reproduce
Create a Root and Intermediate CA, sign the client certificate with the intermediate CA. Run checks.
The option -chainCAfile is only available from OpenSSL 3.0. I'll implement the fix but I have to think what to do with older versions ...
As I used the -chainCAfile option with openssl 1.1.1w on Debian 11. I would assume that it could work. And when you use this as an optional commandline parameter for check_ssl_cert , then people can decide weither they wanna use it or not.
On the other hand, when you only want to monitor the expiration date and state of the remote certificate, we could simply ignore the "bad certificate alarm" with something like --ignore-clientcert.
Describe the bug
When you run a check with a client certificate against a tls secured secured service, but your client certificate requires a chain file, the check will fail with
sslv3 alert bad certificate
. The openssl s_client doesn't suppurt respect the certificate chain in a bundle, but rather requires the-chainCAfile
commandline parameter.To Reproduce
Create a Root and Intermediate CA, sign the client certificate with the intermediate CA. Run checks.
Expected behavior
Request should work out of the box
System:
openssl version
): OpenSSL 1.1.1wAdditional context/output
Test with plain openssl
without chain:
with chain:
Solution
Either provide a
--clientchainfile
commandline option or set-cert
and-chainCAfile
to the same value. That actually worksThe text was updated successfully, but these errors were encountered: