Sunday, April 28, 2024
 Popular · Latest · Hot · Upcoming
2
rated 0 times [  2] [ 0]  / answers: 1 / hits: 4682  / 1 Year ago, thu, may 18, 2023, 3:31:00

I have a (private) apt repository setup on a server. I'm only allowing access to this repository over SSL, and only with a client certificate. I have tested the connection using curl:



$ curl --cacert /opt/CA.crt --cert /opt/user.crt --key /opt/user.key --pass 1234 https://example.com/dists/lucid/main/binary-amd64/Packages.gz


The content is downloaded as expected.



I've created a file in /etc/apt/apt.conf.d/45example-com with



Debug::Acquire::https "true";

Acquire::https::example.com {
Verify-Peer "true";
Verify-Host "true";

CaInfo "/opt/CA.crt";

SslCert "/opt/user.crt";
SslKey "/opt/user.key";
};


I've added a file at /etc/apt/sources.list.d/example.com.list with:



deb https://example.com/ lucid main


There seems to be a problem with the CA cert, when I try an update I get the following:



# apt-get update
* Connected to example.com (8.0.0.8) port 443 (#0)
* found 1 certificates in /opt/CA.crt
* error reading X.509 key or certificate file
* Closing connection #0


The server logs on example.com show that no request got there, so I guess that apt-get is failing before trying to send the request (which matches what the log says).



I've had a hard time finding any documentation on apt-get with ssl on the interwebs, and haven't even been able to find the source code.



Does anyone have any ideas?


More From » apt

 Answers
2

After some searching I have a better idea of what is happening (but no solution yet).



I found the source code for apt at https://code.launchpad.net/~ubuntu-branches/ubuntu/lucid/apt/lucid. It uses libcurl for ssl, which in turn uses gntls.



The error message comes from libcurl, and it is complaining about the key/password, not the CA certificate. The line:



* found 1 certificates in /opt/CA.crt


is saying that CA.crt was correctly loaded. The error message comes from the following:



if(gnutls_certificate_set_x509_key_file(
conn->ssl[sockindex].cred,
data->set.str[STRING_CERT],
data->set.str[STRING_KEY] ?
data->set.str[STRING_KEY] : data->set.str[STRING_CERT],
do_file_type(data->set.str[STRING_CERT_TYPE]) ) !=
GNUTLS_E_SUCCESS) {
failf(data, "error reading X.509 key or certificate file");
return CURLE_SSL_CONNECT_ERROR;
}


(From gtls.c in http://alpha.gnu.org/gnu/gnutls/libtasn1-0.2.10.tar.gz)



The problem is with the password that is associated with that key. I've stripped the password from the key using:



$ openssl rsa -in user.key -out user-nopasswd.key


This isn't ideal, but it seems to work.


[#36688] Thursday, May 18, 2023, 1 Year  [reply] [flag answer]
Only authorized users can answer the question. Please sign in first, or register a free account.
ibuteking

Total Points: 35
Total Questions: 128
Total Answers: 138

Location: Indonesia
Member since Thu, Oct 1, 2020
4 Years ago
;