[gnutls-devel] A certificate is verified by Gnutls but rejected by OpenSSL/PolarSSL

Peter Williams home_pw at msn.com
Fri Apr 3 04:28:35 CEST 2015

Some libs chain on the keyids, not the names. Depends on the generation of developer. If paid / indoctrinated in the pem phase, will be name based (since one used the directory to do what we would now call openid connect discovery of tryst points (based on naming domains)). If NSA paid /influenced, it uses keyids (which are just NSA kmids, revisited)

For disclosure, I was NSA paid / influenced, but thoroughly bought into the darpa design , now realized (20 years late) as azure active directory plus openud connect.

Sent from my Windows Phone
From: Yuting Chen<mailto:chenyt at cs.sjtu.edu.cn>
Sent: ‎4/‎2/‎2015 6:49 PM
To: Nikos Mavrogiannopoulos<mailto:nmav at gnutls.org>
Cc: GnuTLS development list<mailto:gnutls-devel at lists.gnutls.org>
Subject: Re: [gnutls-devel] A certificate is verified by Gnutls but rejected by OpenSSL/PolarSSL

Another very different example: when I verify file5.pem (the attached file)
against fa_rootCA_key_cert.pem, gnutls cannot find the issuer of the cert
in file5.pem, but openssl/polarssl can find the issuer and accept it. It is
a little tricky to find the issuer by comparing the "issuer" field of one
certificate with the "subject" field of the ca certificate.

On Thu, Apr 2, 2015 at 2:07 PM, Nikos Mavrogiannopoulos <nmav at gnutls.org>

> On Thu, 2015-04-02 at 10:00 -0700, Yuting Chen wrote:
> > (2) Openssl:
> > 140637590406816:error:04091077:rsa routines:INT_RSA_VERIFY:wrong
> > signature length:rsa_sign.c:175:
> > 140637590406816:error:0D0C5006:asn1 encoding
> > routines:ASN1_item_verify:EVP lib:a_verify.c:221:
> > ZZZZZZZZZZZZZComodo_Secure_Services_root.pem: C = US, O = "VeriSign,
> > Inc.", OU = Class 4 Public Primary Certification Authority - G2, OU =
> > "(c) 1998 VeriSign, Inc. - For authorized use only", OU = VeriSign
> > Trust Network
> > error 7 at 0 depth lookup:certificate signature failure
> In the file.pem you have 2 certificates (a chain), and the fa_rootCA is
> another one. If you try openssl on each two of them (i.e., split the
> file.pem) you'll get an OK. Are you sure that openssl verify can accept
> a chain?
> regards,
> Nikos
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20150402/ec524491/attachment.html>
-------------- next part --------------
Gnutls-devel mailing list
Gnutls-devel at lists.gnutls.org

More information about the Gnutls-devel mailing list