Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

self-signed cert #2607

Closed
ghost opened this issue Sep 19, 2018 · 3 comments
Closed

self-signed cert #2607

ghost opened this issue Sep 19, 2018 · 3 comments

Comments

@ghost
Copy link

ghost commented Sep 19, 2018

What version of ejabberd are you using?

18.06-3

What operating system (version) are you using?

Archlinux 4.18.8.a-1-hardened

How did you install ejabberd (source, package, distribution)?

package

What did not work as expected? Are there error messages in the log? What
was the unexpected behavior? What was the expected result?

i generate self-signed cert for my onion domain:

openssl req -x509 -nodes -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -subj /CN=b7sssd27ldcy27fj.onion,*.b7sssd27ldcy27fj.onion

but Ejabberd not accept it.
how to fix this problem?

  • [warning] <0.366.0>@ejabberd_pkix:validate:615 Failed to validate certificate from /etc/ejabberd/cert.pem: self-signed certificate
  • [warning] <0.366.0>@ejabberd_pkix:handle_call:259 No certificate found matching 'b7sssd27ldcy27fj.onion': strictly configured clients or servers will reject connections with this host; obtain a certificate for this (sub)domain from any trusted CA such as Let's Encrypt (www.letsencrypt.org)
  • [info] <0.343.0>@gen_mod:start_modules:130 Loading modules for b7sssd27ldcy27fj.onion
  • [warning] <0.343.0>@gen_mod:sort_modules:155 Module 'mod_mam' is recommended for module 'mod_muc' but is not found in the config
  • [warning] <0.366.0>@ejabberd_pkix:handle_call:259 No certificate found matching 'conference.b7sssd27ldcy27fj.onion': strictly configured clients or servers will reject connections with this host; obtain a certificate for this (sub)domain from any trusted CA such as Let's Encrypt (www.letsencrypt.org)
  • [warning] <0.366.0>@ejabberd_pkix:handle_call:259 No certificate found matching 'pubsub.b7sssd27ldcy27fj.onion': strictly configured clients or servers will reject connections with this host; obtain a certificate for this (sub)domain from any trusted CA such as Let's Encrypt (www.letsencrypt.org)
  • [warning] <0.366.0>@ejabberd_pkix:handle_call:259 No certificate found matching 'echo.b7sssd27ldcy27fj.onion': strictly configured clients or servers will reject connections with this host; obtain a certificate for this (sub)domain from any trusted CA such as Let's Encrypt (www.letsencrypt.org)
  • [info] <0.374.0>@ejabberd_listener🉑272 (<0.523.0>) Accepted connection 127.0.0.1:46196 -> 127.0.0.1:5222
    [warning] <0.523.0>@ejabberd_c2s:process_terminated:289 (tls|<0.523.0>) Failed to secure c2s connection: TLS failed: client renegotiations forbidden
@licaon-kter
Copy link
Contributor

/close as invalid

There is no issue, as the last line says, you need no setup encryption protocols better

@zinid
Copy link
Contributor

zinid commented Sep 19, 2018

how to fix this problem?

What problem exactly? All messages (except the last line) are warnings, they are correct and expected, feel free to just ignore them. Regarding the last line: I have no idea what that means, the error is generated by OpenSSL library, go figure.

@zinid zinid closed this as completed Sep 19, 2018
@prefiks
Copy link
Member

prefiks commented Sep 19, 2018

To add to this, if your server will be available to other servers by server2server communication, they wouldn't be able to access for example pubsub.b7... because there will be no valid certificate for that domain, that's why those warning is generated, only way to fix them is having extra certificates for those domain (or possibly wildcard certificate for your main domain).

About that last warning, are you using openssl 1.1.1? If so this happens when client tries to estabilish TLS1.3 connection, this problem was fixed by change in fasttls dependency, but it's not available in 18.06 release, it should work in next release that will probably arrive next week. If you aren't using openssl 1.1.1 (and so TLS1.3 is not available), then that error is expected, as this is protection for vulnerability, and means that there was MITM attack attempt.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants