Yes, I do it with certificate of vsftpd.
All is working fine with
I have and want to use another certificate which is from client. I want to use the following connection example:
I want to make sure vsftpd can or can't work with user/client certificate.
Last edited by Don Cragun; 02-22-2016 at 04:48 PM..
Reason: Add CODE and ICODE tags.
Hello!
I have setup a site to which users authenticate against with openssl certificates.
Everything works just fine, be I wish to be able to redirect to a error page with instructions instead of displaying the default error page that firefox displays.
How to? I got nothing out of google...... (6 Replies)
Is there a way i can only force SSL encryption if they connect from outside our network OR allow certain IP's to connect without using encryption? (0 Replies)
Hi all
Ive setup a VSFTPD server and im forcing SSL encryption. I have made a key and it works perfectly.
I have a client who wants to connect but is using software that needs the key to be added before he can connect.
Does he need me to send the key i created and that the VSFTPD.conf... (0 Replies)
Hi Friends,
I am trying to configure vsftpd server 2.0.5 on rhel5 64 bit installation.
I am getting an error when initiating an ssl connection.
I am using filezilla 3.0 ftp client.
Client is specifically using passive mode connection.
I can see the client is able to connect to the server,... (0 Replies)
Hi,
I am trying to call a http soap webservice using curl command , I have tried the below option but I am getting a failure .
curl -H "Content-Type: text/xml; charset=utf-8" -H SOAPAction:" -d @Request.xml -X POST... (1 Reply)
I have to call a webservice , I need to pass the static request from Unix which should have message signing details in the soap header . I am using cURL command for this. I do not have java , I need to do it through Unix only .
Below is the kind of Soap envelop I want to wrap around my request .... (0 Replies)
HI
I have set up vsftp on my Red hat server.
Chroot has been set up to control access to each user and folder directories.
This all works fine.
But i have one directory where i want to chroot but ensure that the ftp access is read only.
Any help appreciated
thanks
Treds (1 Reply)
We have a HPUX server that talks to a web service. We recently updated the web service certificate to a new SHA256 cert that has an updated intermediate cert. The HPUX server is now unable to connect because it cannot validate the cert chain due to it not having the new intermediate CA cert.
I... (0 Replies)
I'm wondering if vsftpd supports user subcommand?
I found I can't switch user after ftp login.
Maybe someone can give me a certain answer.
I always got the message as below,
I enabled log_ftp_protocol=YES and checked the vsftpd.log,
it didn't help much actually. The log file only... (6 Replies)
Hello Team,
I have to verify the Client server certificate validation in HTTPS request(SSL hand shake before the actual HTTPS post request), And tried various ways and failed to verify it successfully.
here are the trials and errors,
resp = requests.post(url, req, verify=True, timeout=5,... (0 Replies)
Discussion started by: chandana.hs
0 Replies
LEARN ABOUT DEBIAN
ssl_ctx_set_client_ca_list
SSL_CTX_set_client_CA_list(3SSL) OpenSSL SSL_CTX_set_client_CA_list(3SSL)NAME
SSL_CTX_set_client_CA_list, SSL_set_client_CA_list, SSL_CTX_add_client_CA, SSL_add_client_CA - set list of CAs sent to the client when
requesting a client certificate
SYNOPSIS
#include <openssl/ssl.h>
void SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *list);
void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *list);
int SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *cacert);
int SSL_add_client_CA(SSL *ssl, X509 *cacert);
DESCRIPTION
SSL_CTX_set_client_CA_list() sets the list of CAs sent to the client when requesting a client certificate for ctx.
SSL_set_client_CA_list() sets the list of CAs sent to the client when requesting a client certificate for the chosen ssl, overriding the
setting valid for ssl's SSL_CTX object.
SSL_CTX_add_client_CA() adds the CA name extracted from cacert to the list of CAs sent to the client when requesting a client certificate
for ctx.
SSL_add_client_CA() adds the CA name extracted from cacert to the list of CAs sent to the client when requesting a client certificate for
the chosen ssl, overriding the setting valid for ssl's SSL_CTX object.
NOTES
When a TLS/SSL server requests a client certificate (see SSL_CTX_set_verify_options()), it sends a list of CAs, for which it will accept
certificates, to the client.
This list must explicitly be set using SSL_CTX_set_client_CA_list() for ctx and SSL_set_client_CA_list() for the specific ssl. The list
specified overrides the previous setting. The CAs listed do not become trusted (list only contains the names, not the complete
certificates); use SSL_CTX_load_verify_locations(3) to additionally load them for verification.
If the list of acceptable CAs is compiled in a file, the SSL_load_client_CA_file(3) function can be used to help importing the necessary
data.
SSL_CTX_add_client_CA() and SSL_add_client_CA() can be used to add additional items the list of client CAs. If no list was specified before
using SSL_CTX_set_client_CA_list() or SSL_set_client_CA_list(), a new client CA list for ctx or ssl (as appropriate) is opened.
These functions are only useful for TLS/SSL servers.
RETURN VALUES
SSL_CTX_set_client_CA_list() and SSL_set_client_CA_list() do not return diagnostic information.
SSL_CTX_add_client_CA() and SSL_add_client_CA() have the following return values:
1. The operation succeeded.
0 A failure while manipulating the STACK_OF(X509_NAME) object occurred or the X509_NAME could not be extracted from cacert. Check the
error stack to find out the reason.
EXAMPLES
Scan all certificates in CAfile and list them as acceptable CAs:
SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile));
SEE ALSO ssl(3), SSL_get_client_CA_list(3), SSL_load_client_CA_file(3), SSL_CTX_load_verify_locations(3)1.0.1e 2014-08-06 SSL_CTX_set_client_CA_list(3SSL)