| Michael Leone on 25 Oct 2013 08:05:00 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
| Re: [PLUG] Fwd: Openssl config question |
On Fri, Oct 25, 2013 at 1:38 AM, brent timothy saner
<brent.saner@gmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 10/24/2013 09:53 PM, Michael Leone wrote:
>
> OH. also, be sure to check the man page, of course. the
> encoding/cipher commands especially might be useful; i have a hunch
> (which can, of course, be absolutely wrong) that it's something in how
> the cert is being generated rather than it being a Windows Thing(TM)
> ...as much as i wish i could say otherwise. ;)
I'm pretty much certain it is an openssl config mis-step on my part.
Here's why: there is such a thing as a Remote Desktop Gateway ("A
Remote Desktop Gateway (RD Gateway) server is a type of gateway that
enables authorized users to connect to remote computers on a corporate
network from any computer with an Internet connection."). It's another
component of RDS. Well, this site:
RDS: The RD Gateway server must be configured to use a valid SSL certificate
http://technet.microsoft.com/en-us/library/dd320340(v=ws.10).aspx
talks about the RD Gateway server having the exact error message that
I am having, when trying to import a certificate for an RD Gateway.
And in my configuration, since all my users are local, the RD Gateway
server is the same server that is the session host.
----------------
Certificates for RD Gateway must meet these requirements:
The intended purpose of the certificate is server authentication. The
Extended Key Usage (EKU) is Server Authentication (1.3.6.1.5.5.7.3.1).
----------------
And my current cert say:
$sudo openssl x509 -text -in --certificate-- ## as per:
http://lounge.qacafe.com/kb/articles/show/153
Mine does not show anything like this:
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
<snip>
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Key Encipherment
X509v3 CRL Distribution Points:
URI:http://SVRSecure-crl.verisign.com/SVRSecure.crl
X509v3 Certificate Policies:
Policy: 2.16.840.1.113733.1.7.23.3
CPS: https://www.verisign.com/rpa
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Authority Information Access:
OCSP - URI:http://ocsp.verisign.com
Signature Algorithm: sha1WithRSAEncryption
My cert looks different:
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
<snip >
Exponent: 65537 (0x10001)
Signature Algorithm: sha1WithRSAEncryption
I have no "Extended Key Usage" section showing in my cert. And the MS
page says I need that (well, I am inferring that I need it, anyway).
So I am guessing I need to put this in my config, to be sure and add
this property to the cert:
extendedKeyUsage=serverAuth
Just not sure where in my openssl config I need to put this
___________________________________________________________________________
Philadelphia Linux Users Group -- http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug