AnsweredAssumed Answered

Is the SSL Report Supposed to be Able to Recognize Mismatched CA Issuer/Signing Chains

Question asked by nexmap on Apr 3, 2019
Latest reply on Apr 5, 2019 by nexmap

I've found a site that is sending a CA signing chain that is not properly matched to server certificate sent by the server.  That is the issuer named for the server certificate is found no where in the CA signing chain.

 

openssl is able to recognized this flaw in the return code: "Verify return code: 21 (unable to verify the first certificate)"

 

I would have thought that SSL Report would have caught this (SSL Server Test: bi.ohio.gov...).  Is this a bug?

 

Additional openssl details:

$ openssl s_client -showcerts -connect bi.ohio.gov:443 | sed -r '/^-----BEGIN CERT/,/^-----END CERT/d'
depth=0 C = US, postalCode = 43221, ST = OH, L = Columbus, street = 1320 Arthur E. Adams, O = Ohio Department of Administrative Services, OU = OIT, OU = EliteSSL, CN = bi.ohio.gov
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 C = US, postalCode = 43221, ST = OH, L = Columbus, street = 1320 Arthur E. Adams, O = Ohio Department of Administrative Services, OU = OIT, OU = EliteSSL, CN = bi.ohio.gov
verify error:num=21:unable to verify the first certificate
verify return:1
CONNECTED(00000003)
---
Certificate chain
0 s:/C=US/postalCode=43221/ST=OH/L=Columbus/street=1320 Arthur E. Adams/O=Ohio Department of Administrative Services/OU=OIT/OU=EliteSSL/CN=bi.ohio.gov
   i:/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Organization Validation Secure Server CA
1 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
3 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Organization Validation Secure Server CA
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority
---
Server certificate
subject=/C=US/postalCode=43221/ST=OH/L=Columbus/street=1320 Arthur E. Adams/O=Ohio Department of Administrative Services/OU=OIT/OU=EliteSSL/CN=bi.ohio.gov
issuer=/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Organization Validation Secure Server CA
---
No client certificate CA names sent
---
SSL handshake has read 6061 bytes and written 647 bytes
---
New, TLSv1/SSLv3, Cipher is AES128-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : AES128-SHA256
    Session-ID:
    Session-ID-ctx:
    Master-Key: 65B54656E4E51BB90EF85A416673678ABD6785191E9931836DA7902C1D2708A9ADC74092C500E544A6867EFC334C5A85
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1554313952
    Timeout   : 300 (sec)
    Verify return code: 21 (unable to verify the first certificate)
---

Outcomes