• Chromium and self-signed certificates

    From bp@www.zefox.net@3:770/3 to All on Tue Aug 13 18:50:34 2024
    I'm trying to get chromium under RasPiOS to open an
    https connection to a private webserver that's using
    a self-signed certificate. Apache starts up without
    reporting any errors, chromium opens the page but
    reports only an http connection. All I'm aiming for
    at this point is encryption, not authentication.

    Looking at the page that opens and examining the
    certificate reports only one thing that looks like
    it might be an error. Under Certificate Basic Constraints
    the field value contains:

    Critical
    Is a Certification Authority
    Maximum number of intermediate CAs: unlimited

    Anybody got a link to a good description of how to
    troubleshoot this sort of problem? For example, where
    does chromium put its error logs?

    Thanks for reading, and apologies for the naive question!

    bob prohaska

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Lawrence D'Oliveiro@3:770/3 to All on Wed Aug 14 07:08:22 2024
    On Tue, 13 Aug 2024 18:50:34 -0000 (UTC), bp wrote:

    I'm trying to get chromium under RasPiOS to open an https connection to
    a private webserver that's using a self-signed certificate.

    The usual way I would do this is create your own CA (root) cert as the self-signed certificate; then the actual SSL certificate that the server
    is using will be signed with this certificate.

    On the browser side, import the CA cert into the key store, and it will automatically trust certs signed with this CA cert.

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Richard Kettlewell@3:770/3 to bp@www.zefox.net on Wed Aug 14 15:27:46 2024
    <bp@www.zefox.net> writes:
    I'm trying to get chromium under RasPiOS to open an
    https connection to a private webserver that's using
    a self-signed certificate. Apache starts up without
    reporting any errors, chromium opens the page but
    reports only an http connection. All I'm aiming for
    at this point is encryption, not authentication.

    Looking at the page that opens and examining the
    certificate reports only one thing that looks like
    it might be an error. Under Certificate Basic Constraints
    the field value contains:

    Critical
    Is a Certification Authority
    Maximum number of intermediate CAs: unlimited

    Anybody got a link to a good description of how to
    troubleshoot this sort of problem? For example, where
    does chromium put its error logs?

    On the one hand that’s just a description of something it found in the certificate. On the other hand it’s the kind of thing that browsers don’t like so it’s a reasonable candidate for your first problem.

    Normally the error page when you try to visit an ill-configured https
    site can be persuaded to give you some kind of error indicator - you
    should check that before assuming that the unlimited path length is
    really the (only) issue.


    If it is the problem:

    pathLenConstraint is documented here:
    https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.9

    If that is indeed the issue then you need to go back to where the
    self-signed certificate was generated and regenerate it with a pathLenConstraint. How you do that depends on how you generated it.


    The bigger picture:

    No modern web browser is likely to accept a self-signed certificate
    without complaint (although the degree of moaning may vary), so getting
    past this issue may not improve matters as much as you hope.

    Personally I use LetsEncrypt even for purely ‘internal’ certificates; it
    is a lot less painful than either self-signed certificates (which means
    tedious browser warnings) or running my own private CA (which means
    deploying the root to all the clients on my network, and fitting in with browser requirements, which can be a moving target).

    --
    https://www.greenend.org.uk/rjk/

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From bp@www.zefox.net@3:770/3 to Richard Kettlewell on Thu Aug 15 16:51:38 2024
    Richard Kettlewell <invalid@invalid.invalid> wrote:
    <bp@www.zefox.net> writes:
    I'm trying to get chromium under RasPiOS to open an
    https connection to a private webserver that's using
    a self-signed certificate. Apache starts up without
    reporting any errors, chromium opens the page but
    reports only an http connection. All I'm aiming for
    at this point is encryption, not authentication.

    Looking at the page that opens and examining the
    certificate reports only one thing that looks like
    it might be an error. Under Certificate Basic Constraints
    the field value contains:

    Critical
    Is a Certification Authority
    Maximum number of intermediate CAs: unlimited

    Anybody got a link to a good description of how to
    troubleshoot this sort of problem? For example, where
    does chromium put its error logs?

    On the one hand that’s just a description of something it found in the certificate. On the other hand it’s the kind of thing that browsers don’t like so it’s a reasonable candidate for your first problem.

    Normally the error page when you try to visit an ill-configured https
    site can be persuaded to give you some kind of error indicator - you
    should check that before assuming that the unlimited path length is
    really the (only) issue.


    If it is the problem:

    pathLenConstraint is documented here:
    https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.9

    If that is indeed the issue then you need to go back to where the
    self-signed certificate was generated and regenerate it with a pathLenConstraint. How you do that depends on how you generated it.


    The bigger picture:

    No modern web browser is likely to accept a self-signed certificate
    without complaint (although the degree of moaning may vary), so getting
    past this issue may not improve matters as much as you hope.

    Personally I use LetsEncrypt even for purely ‘internal’ certificates; it is a lot less painful than either self-signed certificates (which means tedious browser warnings) or running my own private CA (which means
    deploying the root to all the clients on my network, and fitting in with browser requirements, which can be a moving target).


    It's very slowly dawning on me just how much I've bitten off here 8-(
    Your reply makes it clear that I didn't understand the relationship between
    a certificate and a CA-certificate, doubtless there's much more to learn.

    My original goal was to get gmail to accept mail from my private mail
    server. When that proved opaque it seemed easier to get ssl/tls working
    with apache as a sort of rehearsal as it appeared better-documented.
    A single host handles both mail and web service and I supposed that
    one ssl/tls installation would work for both. Even if true the learning
    curve is much steeper than expected.

    Thanks very much for enlightening replies!

    bob prohaska

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Richard Kettlewell@3:770/3 to bp@www.zefox.net on Sun Sep 1 19:28:39 2024
    <bp@www.zefox.net> writes:
    That much I gathered. Still, it looks like there are are three uses for encrypted, authenticated communications between hosts: Mail, web traffic
    and remote logins. SSL is installed and working for remote logins on all
    the hosts under my control by default.

    Possibly you have confused SSL with SSH (SSL/TLS can in principle be
    used for remote login but it’s unusual to do so).

    Can a single ssl/tls configuration support all three services?

    If all multiple TLS-equipped services same domain name you can use a
    single key and certificate for all three of them.

    Am I wrong to think of ssl and tls as one thing?

    SSL was renamed to TLS in 1999 when TLS 1.0 was introduced. So different versions of the same thing.

    SSH is a different protocol.

    --
    https://www.greenend.org.uk/rjk/

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From bp@www.zefox.net@3:770/3 to Richard Kettlewell on Sun Sep 1 22:49:42 2024
    Richard Kettlewell <invalid@invalid.invalid> wrote:

    SSL was renamed to TLS in 1999 when TLS 1.0 was introduced. So different versions of the same thing.

    SSH is a different protocol.

    That clears the fog a little. Are the certificates and keys
    the same between SSH and TLS?

    Thank you!

    bob prohaska

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Lawrence D'Oliveiro@3:770/3 to All on Mon Sep 2 03:46:39 2024
    On Sun, 1 Sep 2024 16:12:50 -0000 (UTC), bp wrote:

    In principle it would make sense to make a root CA for the three domains (zefox.com, zefox.net and zefox.org) under my control but if I disturb
    that one CA up all three become unreliable.

    If these are names intended to be accessed by the general public, then you
    need certs signed by official CAs that are trusted as standard by the
    browsers that the general public uses.

    Setting up your own private CA only works for authentication between
    machines that you control.

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Lawrence D'Oliveiro@3:770/3 to All on Mon Sep 2 03:44:44 2024
    On Sun, 1 Sep 2024 22:49:42 -0000 (UTC), bp wrote:

    Are the certificates and keys the same between SSH and TLS?

    The basic encryption algorithms may be the same, but the usage is a little different. SSH has no concept of “certificates”, only of “host keys” versus “user keys”. Each key is of course actually a key pair, consisting of a public key (freely redistributable, but recipients need to be sure
    they get them from a trusted source) and a corresponding private key
    (never to be disclosed to anybody else).

    There is a file in your SSH client config called “known_hosts”, which contains the public host keys of all the hosts you’ve previously connected to; this is used to guard against somebody trying to impersonate any of
    those hosts when you next try to connect.

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Richard Kettlewell@3:770/3 to bp@www.zefox.net on Mon Sep 2 08:11:14 2024
    <bp@www.zefox.net> writes:
    Richard Kettlewell <invalid@invalid.invalid> wrote:

    SSL was renamed to TLS in 1999 when TLS 1.0 was introduced. So
    different versions of the same thing.

    SSH is a different protocol.

    That clears the fog a little. Are the certificates and keys
    the same between SSH and TLS?

    There’s an overlap in key types (e.g. both can use ECDSA) but in
    practice you wouldn’t normally share keys between them.

    The certificates formats are different. Many (probaly most) users don’t
    use certificates with SSH at all.

    --
    https://www.greenend.org.uk/rjk/

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From bp@www.zefox.net@3:770/3 to Lawrence D'Oliveiro on Mon Sep 2 22:05:11 2024
    Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
    On Sun, 1 Sep 2024 16:12:50 -0000 (UTC), bp wrote:

    In principle it would make sense to make a root CA for the three domains
    (zefox.com, zefox.net and zefox.org) under my control but if I disturb
    that one CA up all three become unreliable.

    If these are names intended to be accessed by the general public, then you need certs signed by official CAs that are trusted as standard by the browsers that the general public uses.

    Setting up your own private CA only works for authentication between
    machines that you control.

    I understand that's the general intention, but can't browsers be told
    to trust a particular self-signed certificate by a user? That's what
    I was trying to do in my initial experiment, but apparently didn't
    construct the certificate correctly. If there's something else I'm doing
    wrong it'd to good to know now. The facility to export and import
    certificates to Chromium under Raspian Bookworm seems to suggest so.

    Thanks for writing, and again for your patience!

    bob prohaska

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Lawrence D'Oliveiro@3:770/3 to Richard Kettlewell on Mon Sep 2 23:56:33 2024
    On Mon, 02 Sep 2024 08:11:14 +0100, Richard Kettlewell wrote:

    The certificates formats are different. Many (probaly most) users don’t
    use certificates with SSH at all.

    You know, I never realized SSH had the concept of “certificates” at all. I just read that part of the ssh-keygen(1) man page <https://manpages.debian.org/1/ssh-keygen.1.en.html> for the first time.

    According to the above, SSH certs have options to impose all kinds of (SSH-specific) restrictions on their usage: what command you can use,
    whether you can forward X11 or other ports etc.

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Richard Kettlewell@3:770/3 to bp@www.zefox.net on Tue Sep 3 08:40:35 2024
    <bp@www.zefox.net> writes:
    I understand that's the general intention, but can't browsers be told
    to trust a particular self-signed certificate by a user? That's what I
    was trying to do in my initial experiment, but apparently didn't
    construct the certificate correctly. If there's something else I'm
    doing wrong it'd to good to know now.

    You could follow the suggestions you’ve already received...?

    --
    https://www.greenend.org.uk/rjk/

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From bp@www.zefox.net@3:770/3 to Lawrence D'Oliveiro on Sat Sep 7 01:39:00 2024
    Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
    On Sun, 1 Sep 2024 22:49:42 -0000 (UTC), bp wrote:

    Are the certificates and keys the same between SSH and TLS?

    The basic encryption algorithms may be the same, but the usage is a little different. SSH has no concept of “certificates”, only of “host keys” versus “user keys”. Each key is of course actually a key pair, consisting of a public key (freely redistributable, but recipients need to be sure
    they get them from a trusted source) and a corresponding private key
    (never to be disclosed to anybody else).

    There is a file in your SSH client config called “known_hosts”, which contains the public host keys of all the hosts you’ve previously connected to; this is used to guard against somebody trying to impersonate any of
    those hosts when you next try to connect.

    I was confusing host keys and server certificates. One more puzzle down.

    Your scripts seem to work on both FreeBSD and RasPiOS. Now to see if
    I can stumble through making them work between _between_ FreeBSD and
    RasPiOS. One obvious question is setting the "listen_addr" in the
    try_server script. Can it be set to "any" or a range by IP or FQEN?
    A list would be fine, I have only eight addresses total.

    Thank you!

    bob prohaska

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From Lawrence D'Oliveiro@3:770/3 to All on Sun Sep 8 00:47:15 2024
    On Sat, 7 Sep 2024 01:39:00 -0000 (UTC), bp wrote:

    Your scripts seem to work on both FreeBSD and RasPiOS. Now to see if I
    can stumble through making them work between _between_ FreeBSD and
    RasPiOS.

    Hey, great.

    One obvious question is setting the "listen_addr" in the
    try_server script. Can it be set to "any" or a range by IP or FQEN?

    That has to be a valid interface address, or just make it “0.0.0.0” to listen on all interfaces on the local machine. This makes it visible
    across your network, with the consequent security implications, which is
    why I used “127.0.0.1” (loopback interface, only visible on the local machine) in the published code.

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
  • From bp@www.zefox.net@3:770/3 to Lawrence D'Oliveiro on Mon Sep 9 15:23:56 2024
    Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
    On Sat, 7 Sep 2024 01:39:00 -0000 (UTC), bp wrote:

    Your scripts seem to work on both FreeBSD and RasPiOS. Now to see if I
    can stumble through making them work between _between_ FreeBSD and
    RasPiOS.

    Hey, great.

    One obvious question is setting the "listen_addr" in the
    try_server script. Can it be set to "any" or a range by IP or FQEN?

    That has to be a valid interface address, or just make it “0.0.0.0” to listen on all interfaces on the local machine. This makes it visible
    across your network, with the consequent security implications, which is
    why I used “127.0.0.1” (loopback interface, only visible on the local machine) in the published code.

    Ok, that'll work fine.

    Thanks for all your help!

    bob prohaska

    --- SoupGate-Win32 v1.05
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)