Opened 3 years ago

Closed 3 years ago

Last modified 3 years ago

#1094 closed defect (worksforme)

CRL check for Estonian ID cards fails

Reported by:… Owned by:
Priority: major Milestone:
Component: nginx-core Version: 1.11.x
Keywords: Cc:
uname -a: Linux nginx-source 4.4.0-31-generic #50-Ubuntu SMP Wed Jul 13 00:07:12 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
nginx -V: nginx version: nginx/1.11.4
built by gcc 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.2)
built with OpenSSL 1.1.0b 26 Sep 2016
TLS SNI support enabled
configure arguments: --sbin-path=/usr/local/nginx/nginx --conf-path=/usr/local/nginx/nginx.conf --pid-path=/usr/local/nginx/ --with-pcre=../pcre-8.39 --with-zlib=../zlib-1.2.8 --with-http_ssl_module --with-stream --with-mail=dynamic


Nginx CRL for Estonian ID card fails with error:

2016/10/04 08:02:13 [info] 7#7: *8 client SSL certificate verify error: (3:unable to get certificate CRL) while reading client request headers, client:, server: site, request: "GET / HTTP/1.1", host: "site" - - [04/Oct/2016:08:02:13 +0000] "GET / HTTP/1.1" 400 231 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0"

Relevant config :

  listen 443 ssl;

  ssl_certificate     /etc/nginx/site.20150819.chained.crt;
  ssl_certificate_key /etc/nginx/site.20150819.nopass.key;

  ssl_verify_client on;
  ssl_verify_depth 2;

  ssl_client_certificate /etc/nginx/ee_all_20161004.pem;
  ssl_crl /etc/nginx/ee_all_20161004.crl.pem;

Here are links for certificates and CRLs;

I converted CRLs from DER to PEM and concated to one file in the same order as client certificate.

Nginx perfectly validates client certificate if no ssl_crl config is specified thus disabling use of CRLs. One note that combined CRL is more than 50MB in size.

Change History (10)

comment:1 by Maxim Dounin, 3 years ago

Resolution: worksforme
Status: newclosed

The message suggests CRLs for some of the certificates in the chain are not available in the CRL file you've created. If you need help, consider asking in the mailing list.

comment:2 by…, 3 years ago

The message is saying wrong. As I have checked and tested multiple times. CRLs are included for all presented certificates in chain: 1 for root and 3 for itermediate certs.

I'm providing a link to the files used for ssl_client_certificate and ssl_crl directives.

There is another developer who could not get CRL verification for EID working:

Last edited 3 years ago by… (previous) (diff)

comment:3 by…, 3 years ago

Resolution: worksforme
Status: closedreopened

comment:4 by Maxim Dounin, 3 years ago

The provided archive does not contain the client certificate used for authentication, and thus it is impossible to tell if the configuration is correct or not.

As previously suggested, the message logged indicates that some of the certificates in the chain do not have corresponding CRLs available in the CRL file you've created. And from the information provided there are no reasons to assume this is not true.

You may try to look into debug log for additional information about verification of client certificates, it will show detailed information of all certificate verification steps, as well as all errors detected.

comment:5 by Maxim Dounin, 3 years ago

Resolution: worksforme
Status: reopenedclosed

Feedback timeout.

comment:6 by Maxim Dounin, 3 years ago

Just for the record, it looks like the problem with the root certificate CRL, see

The root certificate, "EE Certification Centre Root CA", has a CRL available at This CRL lists Issuing Distrubution Point extension as follows:

            X509v3 Issuing Distrubution Point: critical
                Full Name:

But there are no CRL Distribution Points in the certificate itself. As a result, OpenSSL refuses to to use this CRL when it tries to verify more than just a leaf certificate, for example:

$ openssl verify -CAfile EE_Certification_Centre_Root_CA.pem.crt -CRLfile eeccrca.crl.pem -crl_check_all KLASS3-SK_2010_EECCRCA_SHA384.pem.crt
KLASS3-SK_2010_EECCRCA_SHA384.pem.crt: C = EE, O = AS Sertifitseerimiskeskus, CN = EE Certification Centre Root CA, emailAddress =
error 44 at 1 depth lookup:Different CRL scope

This probably should be reported to the team, likely they want to fix this. Simply removing the IDP extension from the CRL should do the trick.

comment:7 by jyrno42@…, 3 years ago

I will contact to get their stance on this issue.

comment:8 by jyrno42@…, 3 years ago

Also, the official IDCard Apache setup guide (page 4) contains the following lines in the configuration:

SSLCARevocationCheck leaf

which indicates that someone on their side might be aware of the problem already.

comment:9 by Maxim Dounin, 3 years ago

Given the same document also suggests to use SSLUseStapling for client certificate revocation checks, I doubt it was something seriously looked into. Contacting them directly certainly won't hurt.

comment:10 by jyrno42@…, 3 years ago

Adding the response i got from for future wanderers.

Translated response:


thanks for pointing out this issue, however we are already aware of the fact
that the root-certificate "EE Certification Centre Root CA" is missing
DP (Distribution Points) attribute.

Removing the IDP from the CRL profile would probably work as a temporary 
solution, but at this time we are not fully aware of the effects of this 
and we need to test it.

Due to this we currently have in our installation guide 
the parameter SSLCARevocationCheck set to "leaf"
Mihkel T.
SK ID Solutions AS

Original text in Estonian:


täname, et juhtisite sellele probleemile tähelepanu, aga oleme juba teadlikud, 
et juursertifikaadis "EE Certification Centre Root CA" DP (Distribution Points)
atribuut puudu on. Võimalik ajutine lahendus ehk on IDP eemaldamine 
tühistusnimekirja profiilist, aga hetkel ei tea milline on selle mõju, 
peame seda testima. 

Hetkel on sellepärast juhendis 
parameeter SSLCARevocationCheck väärtusega "leaf" 
Mihkel T.
SK ID Solutions AS
Note: See TracTickets for help on using tickets.