1

First, some background: I've got a C++-based client/server system that uses the OpenSSL C library to encrypt the client/server connections. This is done in (what I believe is) the canonical OpenSSL fashion; that is to say, the server holds a .pem file containing both an RSA private key and the corresponding public key "certificate" (as generated by openssl req -x509 -days 3650 -nodes -newkey rsa:1024 -keyout my_private_key.pem -out my_public_key.pem ; cat my_public_key.pem >> my_private_key.pem), and the client holds a .pem file containing only the public key "certificate". When the client connects, the client uses the OpenSSL protocol to verify that the server really is who it says it is (that is, that the server really has the private key and is not an imposter or "man in the middle") before allowing any application-level data to be encrypted and sent across the connection.

This all works fine, but the problem is that authenticating the identity of the server isn't quite what I want to accomplish; in this scenario, the server and client are both on the same private LAN, and the server is physically connected to some custom hardware, so a fake-server isn't a big concern -- any fake-server or man-in-the-middle attacker would still need to connect to the real server in order to do any damage; the worst a fake-server could do is pretend that the hardware had done things it really hadn't, and since the user will generally be physically in the room with the hardware, the user would immediately see (by observing the hardware) that his commands were not being acted on.

Rather, my primary goal for OpenSSL here is to authenticate the client -- in particular, before I allow the client machine to send any commands to the hardware, I want to verify that the client machine is actually an authorized user, and just not some hacker/saboteur who has somehow gained LAN access and is trying to cause trouble by sending malicious commands to the hardware.

In my (admittedly naive) understanding of how public/private authentication works, this should be straightforward to accomplish, simply by switching the roles of the client and the server; that is, in this scenario, I think the client machine should hold the private key, while the server should hold the public key, and that way it is the server verifying the client's identify before proceeding, rather than the other way around.

However, when I try to set up the above using OpenSSL (by having the client call both SSL_use_certificate() and SSL_use_PrivateKey_file(), while the server calls only SSL_use_certificate()), it doesn't work (the client emits an error like SSL_write() ERROR!4560385472:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:ssl/record/rec_layer_s3.c:1536:SSL alert number 40), and I'm not sure if that's because I'm simply calling something wrong, or if it's an indication that what I'm doing is unsupported by OpenSSL, or even fundamentally unsupportable for some reason.

I'm pretty certain I could obtain exactly the semantics I want by having the server make an outgoing TLS connection back to the client (so that the "client" becomes the "server" of the new connection), but I'd prefer to avoid that approach if possible (since the client could have a firewall installed that would make that reverse-connection difficult).

My questions are:

1) Is there anything fundamentally wrong-headed or futile about what I'm attempting here?

2) Assuming not, is it known that OpenSSL (as it is currently implemented in v1.1.1c) cannot or does not support this use-case?

3) Is there some other approach I should be considering (other than the usual "figure out where the mistake is in your software" one?)

  • 1
    TLS doesn't support client-only auth, but you can do server and client auth and the client would just trust any cert the server presents so no real server auth would happen. If that's what you want. – Z.T. Jun 09 '19 at 01:58
  • What I'm looking for is client-auth; server-auth also would be nice but isn't required. – Jeremy Friesner Jun 09 '19 at 02:42
  • TLS does that using client certificates the server checks using root CAs the server trusts, usually a single corporate internal CA that signs the client certs. For HTTPS, common TLS libraries (and web servers) support this natively, you don't need to write code. – Z.T. Jun 09 '19 at 02:45
  • 5
    Possible duplicate of [Is it possible to establish a secure TLS connection using only client certificate?](https://security.stackexchange.com/questions/203759/is-it-possible-to-establish-a-secure-tls-connection-using-only-client-certificat), [Is it possible to setup 1-way TLS client authentication without server certificates?](https://security.stackexchange.com/questions/210669/is-it-possible-to-setup-1-way-tls-client-authentication-without-server-certifica/210676). – Steffen Ullrich Jun 09 '19 at 02:45
  • @Z.T. no HTTPS is involved, unfortunately – Jeremy Friesner Jun 09 '19 at 02:58
  • but openssl does client certs, which is what you want. – Z.T. Jun 09 '19 at 02:59

1 Answers1

0

Once a TCP connection is established, it's symmetrical, so what you're doing is possible by having the client start a TCP connection but have the server initiates the TLS handshake.

A much simpler way though, if you really don't care about server authentication, is to configure the server with self-signed certificate and then configuring the client to ignore certificate verification.

However, I'd question the wisdom of skipping server certificate verification at all. Why do you want to skip server certificate verification in the first place?

Lie Ryan
  • 31,279
  • 6
  • 69
  • 93
  • It's not that I want to skip it; it's just that it's not my primary concern. – Jeremy Friesner Jun 09 '19 at 02:40
  • @JeremyFriesner: Why not just do server auth anyway? It takes much less time to just create a self signed certificate and do server auth than to figure out how to do client side only TLS auth. Maybe you don't feel you need it, but what's the harm in just doing it anyway? – Lie Ryan Jun 09 '19 at 03:02
  • Yes, I think you're right about that. – Jeremy Friesner Jun 09 '19 at 03:19