Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unhelpful failure mode for bad certificate + key combination #136

Open
JohannesGaessler opened this issue Jul 31, 2024 · 0 comments
Open
Assignees

Comments

@JohannesGaessler
Copy link

JohannesGaessler commented Jul 31, 2024

I have two certificates/keys, one pair issued by KIT and one pair issued by CERN:

12:28 jgaessler@portal1 /home/jgaessler/.globus
% ll
total 36K
-rw------- 1 jgaessler cms 2.5K Nov 20  2023 usercert.pem
-rw------- 1 jgaessler cms 3.5K Jul 31 11:57 usercert_cern.pem
-rw------- 1 jgaessler cms 3.6K Nov 20  2023 userkey.pem
-rw------- 1 jgaessler cms 2.0K Jul 31 12:14 userkey_cern.pem
-rw------- 1 jgaessler cms  11K Jul 31 12:22 x509_proxy

By default the KIT files are used. Using the two KIT files together works as expected. Using the two CERN files together also works as expected. However, if a bad combination of files is used voms-proxy-init returns an error. This is to be expected, but the error is kind of unhelpful:

12:29 jgaessler@portal1 /home/jgaessler/.globus
% voms-proxy-init -rfc --voms cms --valid 192:00 -cert ~/.globus/usercert_cern.pem                                
sslutils.c:3140:error:400003F5:lib(128)::processing key
        File=/home/jgaessler/.globus/usercert_cern.pem

userkey.pem is in this case implicitly being used but it is not obvious that the problem is that it is the wrong key for the specified certificate. I think an error message that explicitly informs the user of the bad combination would be more helpful and reduce the time needed for troubleshooting.

@giacomini giacomini self-assigned this Aug 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants