Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
 Post subject: CACert, vhosts, ssl
PostPosted: Fri Jan 23, 2009 6:02 pm 
Offline
Junior Member

Joined: Sun Jan 20, 2008 8:20 pm
Posts: 25
Hi Linoders,

I am having a problem with ssl.

Even though my hosts file was edited to the form:

127.0.0.1 localhost.example localhost
xxx.xxx.xxx.xxx webserver.example.com webserver

and the /etc/hostname file like:
webserver.example.com

When I navigate to https://ssl.example.com (after creating a vhost on the Ubuntu 8.10 LAMP server and a2ensite...) I am getting the expected warning of self signed certificate, but I am also getting a warning stating that the certificate is only valid for li5-102.members.linode.com.

So, for some reason, the cn is being read as li5-102.members.linode.com rather than the common name I entered when creating the csr, which was, example.com...

I should also add that I am attempting to get the multiple ssl sites going on one IP using the CACert.org method as described in the following links... I have a long way to go to sort out how to get that working, but even if I set one site up, I get the same issue... How can I get the cert to register the actual host name and not the linode name? Anyone know what it is I am doing wrong?

http://wiki.cacert.org/wiki/VhostTaskForce

http://wiki.cacert.org/wiki/CSRGenerator?action=show&redirect=VhostsApache

Thanks


Top
   
 Post subject:
PostPosted: Fri Jan 23, 2009 6:10 pm 
Offline
Linode Staff
User avatar

Joined: Sat Jun 21, 2003 2:21 pm
Posts: 160
Location: Absecon, NJ
How are you actually creating the certificate?

-James


Top
   
PostPosted: Fri Jan 23, 2009 6:50 pm 
Offline
Junior Member

Joined: Sun Jan 20, 2008 8:20 pm
Posts: 25
which looks like so:

Code:
#!/bin/sh
# csr.sh: Certificate Signing Request Generator
# Copyright(c) 2005 Evaldo Gardenali <evaldo@gardenali.biz>
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in the
#    documentation and/or other materials provided with the distribution.
# 3. Neither the name of the author nor the names of its contributors may
#    be used to endorse or promote products derived from this software
#    without specific prior written permission.
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
#
# ChangeLog:
# Mon May 23 00:14:37 BRT 2005 - evaldo - Initial Release

# be safe about permissions
LASTUMASK=`umask`
umask 077

# OpenSSL for HPUX needs a random file
RANDOMFILE=$HOME/.rnd

# create a config file for openssl
CONFIG=`mktemp -q /tmp/openssl-conf.XXXXXXXX`
if [ ! $? -eq 0 ]; then
    echo "Could not create temporary config file. exiting"
    exit 1
fi

echo "Private Key and Certificate Signing Request Generator"
echo "This script was designed to suit the request format needed by"
echo "the CAcert Certificate Authority. www.CAcert.org"
echo

printf "Short Hostname (ie. imap big_srv www2): "
read HOST
printf "FQDN/CommonName (ie. www.example.com) : "
read COMMONNAME

echo "Type SubjectAltNames for the certificate, one per line. Enter a blank line to finish"
SAN=1        # bogus value to begin the loop
SANAMES=""   # sanitize
while [ ! "$SAN" = "" ]; do
    printf "SubjectAltName: DNS:"
    read SAN
    if [ "$SAN" = "" ]; then break; fi # end of input
    if [ "$SANAMES" = "" ]; then
        SANAMES="DNS:$SAN"
    else
        SANAMES="$SANAMES,DNS:$SAN"
    fi
done

# Config File Generation

cat <<EOF > $CONFIG
# -------------- BEGIN custom openssl.cnf -----
 HOME                    = $HOME
EOF

if [ "`uname -s`" = "HP-UX" ]; then
    echo " RANDFILE                = $RANDOMFILE" >> $CONFIG
fi

cat <<EOF >> $CONFIG
 oid_section             = new_oids
 [ new_oids ]
 [ req ]
 default_days            = 730            # how long to certify for
 default_keyfile         = $HOME/${HOST}_privatekey.pem
 distinguished_name      = req_distinguished_name
 encrypt_key             = no
 string_mask = nombstr
EOF

if [ ! "$SANAMES" = "" ]; then
    echo "req_extensions = v3_req # Extensions to add to certificate request" >> $CONFIG
fi

cat <<EOF >> $CONFIG
 [ req_distinguished_name ]
 commonName              = Common Name (eg, YOUR name)
 commonName_default      = $COMMONNAME
 commonName_max          = 64
 [ v3_req ]
EOF

if [ ! "$SANAMES" = "" ]; then
    echo "subjectAltName=$SANAMES" >> $CONFIG
fi

echo "# -------------- END custom openssl.cnf -----" >> $CONFIG

echo "Running OpenSSL..."
openssl req -batch -config $CONFIG -newkey rsa:2048 -out $HOME/${HOST}_csr.pem
echo "Copy the following Certificate Request and paste into CAcert website to obtain a Certificate."
echo "When you receive your certificate, you 'should' name it something like ${HOST}_server.pem"
echo
cat $HOME/${HOST}_csr.pem
echo
echo The Certificate request is also available in $HOME/${HOST}_csr.pem
echo The Private Key is stored in $HOME/${HOST}_privatekey.pem
echo

rm $CONFIG

#restore umask
umask $LASTUMASK


Top
   
PostPosted: Sat Jan 24, 2009 9:40 pm 
Offline
Junior Member

Joined: Sun Jan 20, 2008 8:20 pm
Posts: 25
and CACert all together... I am creating my own Certificate Authority, and self signing... Howerver, the browser is still reporting the CN as being "li5-102.members.linode.com" rather than 'ssl.example.com'

A 'hostname' and 'hostname -f' both result in 'ssl.example.com', and when I created the csr and key files I used 'ssl.example.com'... so I am still at a loss as to where the browser is getting the common name as 'li5-102.members.linode.com' from.

Thanks


Top
   
 Post subject:
PostPosted: Sun Jan 25, 2009 1:07 am 
Offline
Senior Member

Joined: Tue Apr 29, 2008 6:26 pm
Posts: 58
Website: http://blog.shadypixel.com/
Well, li5-102.members.linode.com is the reverse dns for your ip address. Are you browsing to the site by IP address? Did you repeat the CommonName as a SubjectAltName (one of the links you posted suggested that to avoid domain name mismatch)?

I would seriously consider using IP-based virtual hosts if you want to use SSL. There's a reason that everyone else does it that way.


Top
   
 Post subject:
PostPosted: Sun Jan 25, 2009 3:35 pm 
Offline
Senior Member
User avatar

Joined: Fri Oct 24, 2003 3:51 pm
Posts: 965
Location: Netherlands
btmorex wrote:
I would seriously consider using IP-based virtual hosts if you want to use SSL. There's a reason that everyone else does it that way.

Non IP-based solutions involve workarounds for the problem that, without their particular trickery, the server name is not available until SSL/TLS negotiation has been completed. Getting round his introduces additional complexity, more failure modes and new ways for the bad guys to subvert your security. Not worth the bother.

_________________
/ Peter


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group