ssl_error_handshake_failure_alert with Commercial CA-based client certificate

12,011

Solution 1

Seeing that the handshake fails it could be that the client doesn't understand (or is configured to use) the negotiated SSL Protocol. Check eg in FF whether all SSL protocols are enabled (SSL2, SSL3, TLSv1) and match that up with the SSL protocol configured for Apache.

update: it might also be usefull to do a network trace to see what cypher suites both client and server support. Maybe they cannot find matching suite and hence the handshake fails.

or setting up the modssl log can reveal some more detail as well : http://www.modssl.org/docs/2.8/ssl_reference.html#ToC19

Solution 2

Are you by any chanced running Debian/Lenny?

We ran into a similiar issue and finally found out that accepted certificates now mustn't have MD5 (SHA-something is fine) checksum because it's considered insecure.

Our issue was with GnuTLS+OpenLDAP thou. You might want to try a renewed cert or even a self-signed cert before spending more money.

Share:
12,011

Related videos on Youtube

Admin
Author by

Admin

Updated on September 17, 2022

Comments

  • Admin
    Admin over 1 year

    Attempting to implement client authentication with an SSL cert.

    http://www.modssl.org/docs/2.8/ssl_howto.html#auth-selective

    Receive the following errors.

    Apache: Re-negotiation handshake failed: Not accepted by client!?

    Firefox:

    ssl_error_handshake_failure_alert

    I assume it is a configuration error, but have not been able to locate it.

    Additional info: Commercial CA server cert servers secure works without problem in Apache 2.2 & Passenger. Only client authentication related directives do not work.