#315 closed defect (invalid)
Malformed client SSL certificate while setting as header
Reported by: | Амир Ахмадович Касимов | Owned by: | |
---|---|---|---|
Priority: | minor | Milestone: | |
Component: | nginx-module | Version: | 1.2.x |
Keywords: | ssl, proxy | Cc: | |
uname -a: |
Linux hades 3.5.1-gentoo #17 SMP Mon Feb 4 15:03:21 IRST 2013 x86_64 Intel(R) Co
re(TM)2 Duo CPU T5800 @ 2.00GHz GenuineIntel GNU/Linux |
||
nginx -V: |
nginx version: nginx/1.2.6
TLS SNI support enabled configure arguments: --prefix=/usr --conf-path=/etc/nginx/nginx.conf --error-log -path=/var/log/nginx/error_log --pid-path=/var/run/nginx.pid --lock-path=/var/lo ck/nginx.lock --with-cc-opt=-I/usr/include --with-ld-opt=-L/usr/lib --http-log-p ath=/var/log/nginx/access_log --http-client-body-temp-path=/var/tmp/nginx/client --http-proxy-temp-path=/var/tmp/nginx/proxy --http-fastcgi-temp-path=/var/tmp/n ginx/fastcgi --http-scgi-temp-path=/var/tmp/nginx/scgi --http-uwsgi-temp-path=/v ar/tmp/nginx/uwsgi --with-ipv6 --with-pcre --with-http_realip_module --with-http _ssl_module --without-mail_imap_module --without-mail_pop3_module --without-mail _smtp_module --user=nginx --group=nginx |
Description
When i check for SSL client certificate ($ssl_client_cert with HttpSslModule set by proxy_set_header) see invalid PEM format:
-----BEGIN CERTIFICATE----- MIIDOzCCAiOgAwIBAgIAMA0GCSqGSIb3DQEBBQUAMHoxCzAJBgNVBAYTAklSMQ8w DQYDVQQIEwZUZWhyYW4xDzANBgNVBAcTBlRlaHJhbjENMAsGA1UEChMEbWVoLjEn MCUGA1UECxMeRG9jcnlwdG8gQ2VydGlmaWNhdGUgQXV0aG9yaXR5MREwDwYDVQQD EwhEb2NyeXB0bzAeFw0xMzAzMDkwNjU3MzBaFw0xNDAzMDkwNjU3MzBaMGgxCzAJ BgNVBAYTAklSMQ8wDQYDVQQIEwZUZWhyYW4xDzANBgNVBAcTBlRlaHJhbjENMAsG A1UEChMEbWVoLjEWMBQGA1UECxMNRG9jcnlwdG8gVXNlcjEQMA4GA1UEAxQHVXNl ciAjMTCBnzANBKDMWDW02!@E/DWADAOBjQAwgYkCgYEAxbaOyi8i1dSJ/61aBCFk 1GjrHL47oDvlIMd72LGN/zI4opAo4KHUMQNr/DySpF4/P04udN2iP00gPhpxcnYZ q1Qmz1Zhw2NoQFRflMMPXYz9bPrJWs8KzW6wrPso14kfZ7MiF4f7gtQteFaaXDTB xfkCUBlGOAgKRzceJBYx/78CAwEAAaNjMGEwCQYDVR0TBAIwADA1BglghkgBhvhC AQ0EKBYmcHlPcGVuU1NMIEdlbmVyYXRlZCBDbGllbnQgQ2VydGlmaWNhdGUwHQYD VR0OBBYEFHS4mh1BAojbEQx6FTvoAJcL7FAAMA0GCSqGSIb3DQEBBQUAA4IBAQB7 Asejey8exTGlEoVhMmfQAdZ2zeWJWLGEa2nIbl1wyTnHGazPCJdxygl+ildDPt0k 9dcQx6qT55wBGm85AvbeZC5T2chVEEHOwtdLcMSGO2LRVVZlAjBXK4vxv/bHMj/P OnaSZnGhRCeWYM88AgFCO1n/h7IcRj/hkoAkVV8uGuB+/SEW3VVQRYBnBBXLU32B b3bjTsMsXHOr48v55ZnPUKC66oR9RstbCaoWDLWDSLDqpwTJAWc7eOyiaey/Pox9 Iiy6D7DAMfDJVgvVBQMXl+uvTrz6ZhdBl/utzoHuiyodGmU5K5e5RX2dTYGeuh64 RrJ9UJ170Mx7OEoceIjY -----END CERTIFICATE-----
Note extraneous space after first line. This needs a hack for applications working with client certification.
Change History (2)
comment:1 by , 12 years ago
Resolution: | → invalid |
---|---|
Status: | new → closed |
comment:2 by , 12 years ago
Sorry. I though It's possible to pass header values containing LF since separator is CRLF. Seems i was wrong..
Note:
See TracTickets
for help on using tickets.
You may find unmodified client's certificate in the $ssl_client_raw_cert variable. Downside is that it can't be used in proxy_set_header as a header value due to newlines (the $ssl_client_cert variable appends a whitespace after each newline to use header continuation).