I have a problem. I would like to add the client authentication with the conf and the certificates generated by the encrypt but it does not work either the certificate is not requested or it is rejected.
I tried to look on the forum for an equivalent subject but without success.
I generated the certificate via openssl and even adding the SSLCA … File / Path this does not work
I thought I read on some forum that adding authentication via client certification with letencrypt was not working.
Otherwise, do you have an example of a conf that seems to work.
Whether it’s in DocumentRoot or a directory I can’t get it to work, previously via a self-signed certificate it worked
My conf apache2 =>
....
SSLCipherSuite HIGH:!aNULL:!MD5
SSLHonorCipherOrder on
SSLEngine on
SSLVerifyClient none
Include /etc/letsencrypt/options-ssl-apache.conf
SSLCertificateFile /etc/letsencrypt/live/xxxxxx.fr/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/xxxxxx.fr/privkey.pem
SSLCertificateChainFile /etc/letsencrypt/live/xxxxxx.fr/chain.pem
Redirect "/git-repository/""https://xxxxxx.fr/cgit"
To apache2 doc you can force clients to authenticate using certificates for a particular URL, but still allow any anonymous client to access the rest of the server.
…
SSLEngine on
SSLVerifyClient none
Include /etc/letsencrypt/options-ssl-apache.conf
SSLCertificateFile /etc/letsencrypt/live/xxxxxx.fr/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/xxxxxx.fr/privkey.pem
SSLCertificateChainFile /etc/letsencrypt/live/xxxxxx.fr/chain.pem
SSLCACertificateFile /etc/apache2/cert_trustclient/xxxxxx.crt
…
<Directory “/usr/lib/cgit/”>
SSLRequireSSL
SSLOptions +StrictRequire
Satisfy any
SSLVerifyClient require
Options ExecCGI FollowSymlinks
It seems you are trying to use the LE provided DA cert (your "client cert") as a trusted CA to authorize similar "client certs".
That is not possible, your LE cert would have had to be given Intermediate CA rights [which will never happen].
For completeness: Let's Encrypts end leaf certificates (and all other CA's) have the following flag:
X509v3 Basic Constraints: critical
CA:FALSE
This would break the chain if this cert was used to sign another certificate.
However, while you can't use the LE certs to sign other certs, you can use the LE certs directly as a client certificate as they have the X509v3 Extended Key Usagealso set for TLS Web Client Authentication. One could for example make a special subdomain user and have a separate subdomain under that subdomain for every user. I.e., koalas.user.example.com or rg305.user.example.com or osiris.user.example.com. Of course these certs would also need to be renewed within every 90 days.