<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACE-SSL Certificate chain broken in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781713#M35403</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have chance of testing this with PCs (not mobile devices) ? Does it work for PCs ? is this problem only for Mobile devices ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if it's only for mobile devices, please make sure certs are in the order under the chain group "show crypto chaingroup cg-vsign-test" .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As in the below URL&lt;/P&gt;&lt;P&gt; "Typically, it is not necessary to add the&amp;nbsp; certificates to the chain group in any type of hierarchical order&amp;nbsp; because the device that verifies the certificates determines the correct&amp;nbsp; order. However, some mobile devices may not be able to order the&amp;nbsp; certificates properly and will display an error message. In this case,&amp;nbsp; you need to add the certificates to the chain group in the correct&amp;nbsp; order. "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA4_1_0/configuration/ssl/guide/certkeys.html#wp999546"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA4_1_0/configuration/ssl/guide/certkeys.html#wp999546&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Aug 2011 11:38:09 GMT</pubDate>
    <dc:creator>tkumarag</dc:creator>
    <dc:date>2011-08-10T11:38:09Z</dc:date>
    <item>
      <title>ACE-SSL Certificate chain broken</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781712#M35402</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking into a problem, where various clients (mostly Android-devices) complain about a "broken certificate chain" when accessing a secure website. The ACE handles ssl-offload and the configuration pertaining to the ssl-proxy service is a follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto chaingroup cg-vsign-test&lt;/P&gt;&lt;P&gt;&amp;nbsp; cert vsign-ca-root-cert.cer&lt;/P&gt;&lt;P&gt;&amp;nbsp; cert vsign-ca-intmed-cert.cer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type ssl pmap-ssl-cipher-128MD5&lt;/P&gt;&lt;P&gt;&amp;nbsp; cipher RSA_WITH_RC4_128_MD5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl-proxy service sslpxy-mobilbank-test&lt;/P&gt;&lt;P&gt;&amp;nbsp; key c100-t-mbbk-070311-key.pem&lt;/P&gt;&lt;P&gt;&amp;nbsp; cert c100-t-mbbk-070311-cert.pem&lt;/P&gt;&lt;P&gt;&amp;nbsp; chaingroup cg-vsign-test&lt;/P&gt;&lt;P&gt;&amp;nbsp; ssl advanced-options pmap-ssl-cipher-128MD5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm no authority on certificates and cannot as such validate the content of the certificate-files. I just receive them and install 'em according to the SSL-configuration guide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But whenever a client, which does not hold the Root- and intermediate certificate on its own, attempts to access the site in question, it complains about a broken certificate chain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any specific guidelines as far as making ACE expose the entire certificate chain during ssl-handshake?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Ulrich&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2011 11:02:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781712#M35402</guid>
      <dc:creator>Ulrich Hansen</dc:creator>
      <dc:date>2011-08-10T11:02:42Z</dc:date>
    </item>
    <item>
      <title>ACE-SSL Certificate chain broken</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781713#M35403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have chance of testing this with PCs (not mobile devices) ? Does it work for PCs ? is this problem only for Mobile devices ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if it's only for mobile devices, please make sure certs are in the order under the chain group "show crypto chaingroup cg-vsign-test" .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As in the below URL&lt;/P&gt;&lt;P&gt; "Typically, it is not necessary to add the&amp;nbsp; certificates to the chain group in any type of hierarchical order&amp;nbsp; because the device that verifies the certificates determines the correct&amp;nbsp; order. However, some mobile devices may not be able to order the&amp;nbsp; certificates properly and will display an error message. In this case,&amp;nbsp; you need to add the certificates to the chain group in the correct&amp;nbsp; order. "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA4_1_0/configuration/ssl/guide/certkeys.html#wp999546"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA4_1_0/configuration/ssl/guide/certkeys.html#wp999546&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Aug 2011 11:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781713#M35403</guid>
      <dc:creator>tkumarag</dc:creator>
      <dc:date>2011-08-10T11:38:09Z</dc:date>
    </item>
    <item>
      <title>ACE-SSL Certificate chain broken</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781714#M35404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for replying.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done some testing from a PC and it works fine, no failure messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 'sh crypto chaingroup cg-vsign-test' returns the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vsign-ca-root-cert.cer:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Subject: /C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5&lt;/P&gt;&lt;P&gt;&amp;nbsp; Issuer: /C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vsign-ca-intmed-cert.cer:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; Subject: /C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.verisign.com/rpa"&gt;https://www.verisign.com/rpa&lt;/A&gt;&lt;SPAN&gt; (c)10/CN=VeriSign Class 3 International Server CA - G3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Issuer: /C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, I'm not an expert on certificates, but if I'm looking at the chaingroup and the above reflects the order of the certificates in the chaingroup, the root-cert preceeds the intermediate-cert and I take it, that this is the correct order. This problem does not apply to all mobile devices. Evidently iPhone customers are not experiencing this. However, some Firefox 4 computers are also affected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Ulrich&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Aug 2011 11:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781714#M35404</guid>
      <dc:creator>Ulrich Hansen</dc:creator>
      <dc:date>2011-08-10T11:59:43Z</dc:date>
    </item>
    <item>
      <title>ACE-SSL Certificate chain broken</title>
      <link>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781715#M35405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem solved!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The chaingroup has a misconfiguration, the root certificate preceeded the intermediate certificate in the order. Corrected the chaingroup config and can now present a full unbroken certificate-chain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Ulrich&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 11:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-ssl-certificate-chain-broken/m-p/1781715#M35405</guid>
      <dc:creator>Ulrich Hansen</dc:creator>
      <dc:date>2011-08-11T11:37:09Z</dc:date>
    </item>
  </channel>
</rss>

