Yes, I have had this working (with mod_nss 1.0.8 on CentOS) with non-FIPS components.<br><br>However, I need this to run in all FIPS mode:<br><ul><li>tokens initialized with "modutil -fips true"</li><li>"NSSFIPS on" in nss.conf</li>
<li>and the hardware token running in FIPS mode</li></ul>I may be able to get away with running the hardware token in FIPS mode and adjusting the ciphersuites to be FIPS-compliant and leave the other components non-FIPS, which should be OK because all the crypto/key stuff have FIPS enforced by the hardware token. And I think that is what is important.<br>
<br>I did download the latest source via CVS, built mod_nss, and I am seeing the same behavior.<br><br>I think it may actually be the hardware token and am focusing there. I think that the session key might be created on the token, which is something I can account for - I have seen other SSL apps want to create ephemeral keys in the token.<br>
<br>I am still curious about "Unable to read from pin store for slot:" error that I am seeing.<br><br>Chris<br><br><div class="gmail_quote">On Tue, Nov 9, 2010 at 10:47 AM, Rob Crittenden <span dir="ltr"><<a href="mailto:rcritten@redhat.com">rcritten@redhat.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;"><div class="im">Christopher Glidden wrote:<br>
<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
I built mod_nss 1.0.8 from source<br>
(<a href="http://directory.fedoraproject.org/sources/mod_nss-1.0.8.tar.gz" target="_blank">http://directory.fedoraproject.org/sources/mod_nss-1.0.8.tar.gz</a> as<br>
mentioned on<br>
<a href="http://www.directory.fedora.redhat.com/wiki/Mod_nss#What_can_I_get_the_source.3F" target="_blank">http://www.directory.fedora.redhat.com/wiki/Mod_nss#What_can_I_get_the_source.3F</a>)<br>
but I have the same behavior.<br>
<br>
This archive is dated July 2008 - any ideas where I can get something<br>
newer to test with?<br>
</blockquote>
<br></div>
Those are only in the source tip. I haven't done a release recently (been trying to find time to add a couple new features first). You'd need to pull the source from CVS.<div class="im"><br>
<br>
<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
What I built also complains about nss.conf entries NSSRenegotiation and<br>
NSSRequireSafeNegotiation, which I am guessing a new recent entries to<br>
handle recent SSL exploits.<br>
<br>
Given that the Fedora-provided 1.0.8 and source-built 1.0.8 give me the<br>
same basic behavior - perhaps I am actually chasing a config or<br>
permission issue, not a software one?<br>
<br>
I did a "chmod 777" to my Certificate Database files and the same<br>
behavior remained.<br>
</blockquote>
<br></div>
The bad mac are SSL errors. I haven't had a chance to look at your ssltap output in detail yet but nothing jumped out at me.<br>
<br>
Does it work in non-FIPS mode and only fail in FIPS? Does the software token work an only the hardware token fail?<br>
<br>
rob<br>
<br>
<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;"><div class="im">
<br>
Any ideas for next steps?<br>
<br>
Chris<br>
<br>
On Tue, Nov 9, 2010 at 8:52 AM, Christopher Glidden <<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a><br></div><div><div></div><div class="h5">
<mailto:<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a>>> wrote:<br>
<br>
Hi All,<br>
<br>
Just looking for a little more help getting mod_nss to work. After<br>
moving to Fedora 14 and getting recent updates, I am still having<br>
issues on the SSL Server side - my clients are giving me "bad mac<br>
alert" errors and terminating the SSL connection. I am running<br>
everything I can in FIPS mode - NSS, mod_nss, and my PKCS#11 hardware.<br>
<br>
<br>
I am currently re-re-testing with Fedora 14 and the built-in mod_nss:<br>
<br>
Name : httpd<br>
Arch : i686<br>
Version : 2.2.16<br>
Release : 1.fc14<br>
Size : 2.7 M<br>
--<br>
Name : mod_nss<br>
<br>
Arch : i686<br>
Version : 1.0.8<br>
Release : 7.fc14<br>
Size : 215 k<br>
--<br>
Name : nspr<br>
Arch : i686<br>
Version : 4.8.6<br>
Release : 1.fc14<br>
Size : 258 k<br>
--<br>
Name : nss<br>
Arch : i686<br>
Version : 3.12.8<br>
Release : 2.fc14<br>
Size : 2.3 M<br>
<br>
I am still getting an "bad record mac" error from my client, which<br>
is currently just openssl:<br>
<br>
# openssl s_client -state -showcerts -connect <a href="http://10.1.1.220:345" target="_blank">10.1.1.220:345</a><br></div></div>
<<a href="http://10.1.1.220:345/" target="_blank">http://10.1.1.220:345/</a>><div class="im"><br>
CONNECTED(00000003)<br>
SSL_connect:before/connect initialization<br>
SSL_connect:SSLv2/v3 write client hello A<br>
SSL_connect:SSLv3 read server hello A<br>
depth=1 /C=local/O=cglidden/CN=optiplex745<br>
verify error:num=19:self signed certificate in certificate chain<br>
verify return:0<br>
SSL_connect:SSLv3 read server certificate A<br>
SSL_connect:SSLv3 read server done A<br>
SSL_connect:SSLv3 write client key exchange A<br>
SSL_connect:SSLv3 write change cipher spec A<br>
SSL_connect:SSLv3 write finished A<br>
SSL_connect:SSLv3 flush data<br>
SSL3 alert read:fatal:bad record mac<br>
SSL_connect:failed in SSLv3 read finished A<br>
6000:error:140943FC:SSL routines:SSL3_READ_BYTES:sslv3 alert bad<br>
record mac:s3_pkt.c:1102:SSL alert number 20<br>
6000:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake<br>
failure:s23_lib.c:188:<br>
<br>
The ssltap server side looks like:<br>
<br>
[cglidden@f14-apache-nssmod ~]$ sudo ssltap -sl -p 345<br></div>
<a href="http://10.1.1.220:8443" target="_blank">10.1.1.220:8443</a> <<a href="http://10.1.1.220:8443/" target="_blank">http://10.1.1.220:8443/</a>><div class="im"><br>
Looking up "10.1.1.220"...<br>
Proxy socket ready and listening<br>
Connection #1 [Mon Nov 8 17:49:27 2010]<br></div>
Connected to <a href="http://10.1.1.220:8443" target="_blank">10.1.1.220:8443</a> <<a href="http://10.1.1.220:8443/" target="_blank">http://10.1.1.220:8443/</a>><div><div></div><div class="h5"><br>
--> [<br>
recordLen = 121 bytes<br>
(121 bytes of 121)<br>
[Mon Nov 8 17:49:27 2010] [ssl2] ClientHelloV2 {<br>
version = {0x03, 0x01}<br>
cipher-specs-length = 78 (0x4e)<br>
sid-length = 0 (0x00)<br>
challenge-length = 32 (0x20)<br>
cipher-suites = {<br>
(0x000039) TLS/DHE-RSA/AES256-CBC/SHA<br>
(0x000038) TLS/DHE-DSS/AES256-CBC/SHA<br>
(0x000035) TLS/RSA/AES256-CBC/SHA<br>
(0x000016) SSL3/DHE-RSA/3DES192EDE-CBC/SHA<br>
(0x000013) SSL3/DHE-DSS/DES192EDE3CBC/SHA<br>
(0x00000a) SSL3/RSA/3DES192EDE-CBC/SHA<br>
(0x0700c0) SSL2/RSA/3DES192EDE-CBC/MD5<br>
(0x000033) TLS/DHE-RSA/AES128-CBC/SHA<br>
(0x000032) TLS/DHE-DSS/AES128-CBC/SHA<br>
(0x00002f) TLS/RSA/AES128-CBC/SHA<br>
(0x030080) SSL2/RSA/RC2CBC128/MD5<br>
(0x000005) SSL3/RSA/RC4-128/SHA<br>
(0x000004) SSL3/RSA/RC4-128/MD5<br>
(0x010080) SSL2/RSA/RC4-128/MD5<br>
(0x000015) SSL3/DHE-RSA/DES56-CBC/SHA<br>
(0x000012) SSL3/DHE-DSS/DES56-CBC/SHA<br>
(0x000009) SSL3/RSA/DES56-CBC/SHA<br>
(0x060040) SSL2/RSA/DES56-CBC/MD5<br>
(0x000014) SSL3/DHE-RSA/DES40-CBC/SHA<br>
(0x000011) SSL3/DHE-DSS/DES40-CBC/SHA<br>
(0x000008) SSL3/RSA/DES40-CBC/SHA<br>
(0x000006) SSL3/RSA/RC2CBC40/MD5<br>
(0x040080) SSL2/RSA/RC2CBC40/MD5<br>
(0x000003) SSL3/RSA/RC4-40/MD5<br>
(0x020080) SSL2/RSA/RC4-40/MD5<br>
(0x0000ff) TLS_EMPTY_RENEGOTIATION_INFO_SCSV<br>
}<br>
session-id = { }<br>
challenge = { 0xce62 0x904b 0x15d4 0x2915 0x0028 0x54e5<br>
0xec2f 0x6eeb 0x9da4 0x3458 0xa686 0x6178 0xebd5 0x3924 0x7c6d 0x2435 }<br>
}<br>
]<br>
<-- [<br>
(2481 bytes of 2476)<br>
SSLRecord { [Mon Nov 8 17:49:27 2010]<br>
type = 22 (handshake)<br>
version = { 3,1 }<br>
length = 2476 (0x9ac)<br>
handshake {<br>
type = 2 (server_hello)<br>
length = 77 (0x00004d)<br>
ServerHello {<br>
server_version = {3, 1}<br>
random = {...}<br>
session ID = {<br>
length = 32<br>
contents = {...}<br>
}<br>
cipher_suite = (0x0035) TLS/RSA/AES256-CBC/SHA<br>
compression method = (00) NULL<br>
extensions[5] = {<br>
extension type renegotiation_info, length [1] = {<br>
0: 00 | .<br>
}<br>
}<br>
}<br>
type = 11 (certificate)<br>
length = 2387 (0x000953)<br>
CertificateChain {<br>
chainlength = 2384 (0x0950)<br>
Certificate {<br>
size = 1354 (0x054a)<br>
data = { saved in file 'cert.001' }<br>
}<br>
Certificate {<br>
size = 1024 (0x0400)<br>
data = { saved in file 'cert.002' }<br>
}<br>
}<br>
type = 14 (server_hello_done)<br>
length = 0 (0x000000)<br>
}<br>
}<br>
]<br>
--> [<br>
(326 bytes of 262, with 59 left over)<br>
SSLRecord { [Mon Nov 8 17:49:27 2010]<br>
type = 22 (handshake)<br>
version = { 3,1 }<br>
length = 262 (0x106)<br>
handshake {<br>
type = 16 (client_key_exchange)<br>
length = 258 (0x000102)<br>
ClientKeyExchange {<br>
message = {...}<br>
}<br>
}<br>
}<br>
(326 bytes of 1, with 53 left over)<br>
SSLRecord { [Mon Nov 8 17:49:27 2010]<br>
type = 20 (change_cipher_spec)<br>
version = { 3,1 }<br>
length = 1 (0x1)<br>
}<br>
(326 bytes of 48)<br>
SSLRecord { [Mon Nov 8 17:49:27 2010]<br>
type = 22 (handshake)<br>
version = { 3,1 }<br>
length = 48 (0x30)<br>
< encrypted ><br>
}<br>
]<br>
<-- [<br>
(7 bytes of 2)<br>
SSLRecord { [Mon Nov 8 17:49:27 2010]<br>
type = 21 (alert)<br>
version = { 3,1 }<br>
length = 2 (0x2)<br>
fatal: bad_record_mac<br>
}<br>
]<br>
Read EOF on Client socket. [Mon Nov 8 17:49:27 2010]<br>
Read EOF on Server socket. [Mon Nov 8 17:49:27 2010]<br>
Connection 1 Complete [Mon Nov 8 17:49:27 2010]<br>
<br>
And my debug output contains (with nss and httpd set to debug to<br>
same file):<br>
<br>
[Mon Nov 08 17:47:02 2010] [notice] SELinux policy enabled; httpd<br>
running as context unconfined_u:system_r:httpd_t:s0<br>
[Mon Nov 08 17:47:02 2010] [notice] suEXEC mechanism enabled<br>
(wrapper: /usr/sbin/suexec)<br>
[Mon Nov 08 17:47:02 2010] [info] Initializing SSL Session Cache of<br>
size 10000. SSL2 timeout = 100, SSL3/TLS timeout = 86400.<br>
[Mon Nov 08 17:47:13 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:13 2010] [info] Init: Initializing (virtual)<br>
servers for SSL<br>
[Mon Nov 08 17:47:13 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:13 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:13 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:13 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:13 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:13 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:13 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:13 2010] [info] Server: Apache/2.2.15, Interface:<br></div></div>
mod_nss/2.2.15, Library: NSS/<a href="http://3.12.6.2" target="_blank">3.12.6.2</a> <<a href="http://3.12.6.2/" target="_blank">http://3.12.6.2/</a>><div class="im"><br>
[Mon Nov 08 17:47:13 2010] [info] Shutting down SSL Session ID Cache<br>
[Mon Nov 08 17:47:13 2010] [notice] Digest: generating secret for<br>
digest authentication ...<br>
[Mon Nov 08 17:47:13 2010] [notice] Digest: done<br>
[Mon Nov 08 17:47:13 2010] [debug] util_ldap.c(1990): LDAP merging<br>
Shared Cache conf: shm=0xb75a9b08 rmm=0xb75a9b38 for VHOST:<br>
f14-apache-nssmod.cglidden.local<br>
[Mon Nov 08 17:47:13 2010] [info] APR LDAP: Built with OpenLDAP LDAP SDK<br>
[Mon Nov 08 17:47:13 2010] [info] LDAP: SSL support available<br>
[Mon Nov 08 17:47:13 2010] [info] Initializing SSL Session Cache of<br>
size 10000. SSL2 timeout = 100, SSL3/TLS timeout = 86400.<br>
[Mon Nov 08 17:47:14 2010] [info] Server: Apache/2.2.15, Interface:<br></div>
mod_nss/2.2.15, Library: NSS/<a href="http://3.12.6.2" target="_blank">3.12.6.2</a> <<a href="http://3.12.6.2/" target="_blank">http://3.12.6.2/</a>><div class="im"><br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2863 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2863 for (*)<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2866 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2867 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2868 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2865 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1837): proxy: worker<br>
proxy:reverse already initialized<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2865 for (*)<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2864 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1837): proxy: worker<br>
proxy:reverse already initialized<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2864 for (*)<br>
[Mon Nov 08 17:47:14 2010] [notice] Apache/2.2.16 (Unix) DAV/2<br></div>
mod_nss/2.2.15 NSS/<a href="http://3.12.6.2" target="_blank">3.12.6.2</a> <<a href="http://3.12.6.2/" target="_blank">http://3.12.6.2/</a>> configured --<div><div></div><div class="h5"><br>
resuming normal operations<br>
[Mon Nov 08 17:47:14 2010] [info] Server built: Jul 26 2010 09:13:08<br>
[Mon Nov 08 17:47:14 2010] [debug] prefork.c(1013): AcceptMutex:<br>
sysvsem (default: sysvsem)<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1837): proxy: worker<br>
proxy:reverse already initialized<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2866 for (*)<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1837): proxy: worker<br>
proxy:reverse already initialized<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2867 for (*)<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1837): proxy: worker<br>
proxy:reverse already initialized<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2868 for (*)<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2870 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1818): proxy:<br>
grabbed scoreboard slot 0 in child 2869 for worker proxy:reverse<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1837): proxy: worker<br>
proxy:reverse already initialized<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2869 for (*)<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1837): proxy: worker<br>
proxy:reverse already initialized<br>
[Mon Nov 08 17:47:14 2010] [debug] proxy_util.c(1934): proxy:<br>
initialized single connection worker 0 in child 2870 for (*)<br>
[Mon Nov 08 17:47:15 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:15 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:15 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:15 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:15 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:15 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:15 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:15 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:15 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:15 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:15 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:15 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:15 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:15 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:15 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:15 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:15 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:15 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:15 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:16 2010] [info] Init: Seeding PRNG with 136 bytes<br>
of entropy<br>
[Mon Nov 08 17:47:16 2010] [info] Configuring server for SSL protocol<br>
[Mon Nov 08 17:47:16 2010] [info] In FIPS mode, enabling TLSv1<br>
[Mon Nov 08 17:47:16 2010] [debug] nss_engine_init.c(783): FIPS mode<br>
enabled, permitted SSL ciphers are:<br>
[+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:16 2010] [debug] nss_engine_init.c(788):<br>
Configuring permitted SSL ciphers<br>
[+rsa_rc4_128_md5,+rsa_rc4_128_sha,+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]<br>
[Mon Nov 08 17:47:16 2010] [warn] Cipher rsa_rc4_128_md5 is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:16 2010] [warn] Cipher rsa_rc4_128_sha is enabled<br>
but this is not a FIPS cipher, disabling.<br>
[Mon Nov 08 17:47:16 2010] [info] Using nickname<br>
NSSOCS:f14-apache-nssmod.<br>
[Mon Nov 08 17:47:46 2010] [error] Unable to read from pin store for<br>
slot: NSSOCS APR err: 70007<br>
[Mon Nov 08 17:48:18 2010] [info] Connection to child 2 established<br>
(server f14-apache-nssmod.cglidden.local:8443, client 10.1.1.199)<br>
[Mon Nov 08 17:48:18 2010] [info] SSL input filter read failed.<br>
[Mon Nov 08 17:48:18 2010] [error] SSL Library Error: -12273 SSL has<br>
received a record with an incorrect Message Authentication Code<br>
[Mon Nov 08 17:48:18 2010] [info] Connection to child 2 closed<br>
(server f14-apache-nssmod.cglidden.local:8443, client 10.1.1.199)<br>
[Mon Nov 08 17:49:22 2010] [info] Connection to child 0 established<br>
(server f14-apache-nssmod.cglidden.local:8443, client 10.1.1.199)<br>
[Mon Nov 08 17:49:22 2010] [info] SSL input filter read failed.<br>
[Mon Nov 08 17:49:22 2010] [error] SSL Library Error: -12273 SSL has<br>
received a record with an incorrect Message Authentication Code<br>
[Mon Nov 08 17:49:22 2010] [info] Connection to child 0 closed<br>
(server f14-apache-nssmod.cglidden.local:8443, client 10.1.1.199)<br>
[Mon Nov 08 17:49:27 2010] [info] Connection to child 3 established<br>
(server f14-apache-nssmod.cglidden.local:8443, client 10.1.1.220)<br>
[Mon Nov 08 17:49:27 2010] [info] SSL input filter read failed.<br>
[Mon Nov 08 17:49:27 2010] [error] SSL Library Error: -12273 SSL has<br>
received a record with an incorrect Message Authentication Code<br>
[Mon Nov 08 17:49:27 2010] [info] Connection to child 3 closed<br>
(server f14-apache-nssmod.cglidden.local:8443, client 10.1.1.220)<br>
<br>
A reference to Unable to read from pin store for slot: NSSOCS APR<br>
err: 70007 jumps out at me. Maybe nss_pcache is having problems?<br>
<br>
I am not sure - any time or help that you can offer would be<br>
appreciated. Any additional debug that would help you should be<br>
easy for me to collect.<br>
<br>
Thank you,<br>
<br>
Chris<br>
<br>
On Thu, Nov 4, 2010 at 5:29 PM, Christopher Glidden<br></div></div><div><div></div><div class="h5">
<<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a> <mailto:<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a>>> wrote:<br>
<br>
Hi All,<br>
<br>
I am having some trouble getting mod_nss in fips mode to work<br>
with my hardware pkcs#11 token.<br>
<br>
I actually think I am having more of a nss.conf issue than<br>
anything between nss and my token. Private key and certificate<br>
fulfillment/import from my CA seem to be just fine.<br>
<br>
What is the best way to go about getting a little help? What<br>
information (config, logs, ssltap output, etc.) should I provide?<br>
<br>
Also, I am currently using the NSS components that shipped with<br>
Red Hat 5 (although I must admit I using CentOS right now - I<br>
hope that doesn't affect the likelihood of receiving a response).<br>
<br>
[cglidden@el55-apache-nssmod ~]$ sudo yum info nss nss-tools<br>
mod_nss nspr httpd | grep -C2 Version<br>
Name : httpd<br>
Arch : i386<br>
Version : 2.2.3<br>
Release : 43.el5.centos<br>
Size : 3.1 M<br>
--<br>
Name : mod_nss<br>
Arch : i386<br>
Version : 1.0.3<br>
Release : 8.el5<br>
Size : 197 k<br>
--<br>
Name : nspr<br>
Arch : i386<br>
Version : 4.7.6<br>
Release : 1.el5_4<br>
Size : 245 k<br>
--<br>
Name : nss<br>
Arch : i386<br>
Version : 3.12.3.99.3<br>
Release : 1.el5.centos.2<br>
Size : 2.6 M<br>
--<br>
Name : nss-tools<br>
Arch : i386<br>
Version : 3.12.3.99.3<br>
Release : 1.el5.centos.2<br>
Size : 2.9 M<br>
<br>
Are there any known issues with these version that I should<br>
avoid right away? I am using these versions because my customer<br>
has indicated a preference. If I have a good argument for it,<br>
we'll upgrade to better versions.<br>
<br>
Thanks,<br>
<br>
Chris<br>
<br>
--<br>
~~~~~~~~~~~~~~~~~~<br>
Christopher Glidden<br></div></div>
<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a> <mailto:<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a>><br>
~~~~~~~~~~~~~~~~~~<br>
<br>
<br>
<br>
<br>
--<br>
~~~~~~~~~~~~~~~~~~<br>
Christopher Glidden<br>
<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a> <mailto:<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a>><div class="im"><br>
P: 857-222-4269<br>
~~~~~~~~~~~~~~~~~~<br>
<br>
<br>
<br>
<br>
--<br>
~~~~~~~~~~~~~~~~~~<br>
Christopher Glidden<br>
</div><a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a> <mailto:<a href="mailto:cglidden@gmail.com" target="_blank">cglidden@gmail.com</a>><br>
P: 857-222-4269<br>
~~~~~~~~~~~~~~~~~~<br>
<br>
<br>
<br>
_______________________________________________<br>
Mod_nss-list mailing list<br>
<a href="mailto:Mod_nss-list@redhat.com" target="_blank">Mod_nss-list@redhat.com</a><br>
<a href="https://www.redhat.com/mailman/listinfo/mod_nss-list" target="_blank">https://www.redhat.com/mailman/listinfo/mod_nss-list</a><br>
</blockquote>
<br>
</blockquote></div><br><br clear="all"><br>-- <br>~~~~~~~~~~~~~~~~~~<br> Christopher Glidden<br> <a href="mailto:cglidden@gmail.com">cglidden@gmail.com</a><br> P: 857-222-4269<br>~~~~~~~~~~~~~~~~~~<br>