-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review and test TLS Client Certificate Authentication #11
Comments
Hi! I tested the latest release against our own test server:
Test1:
Here we get the following error:
Test2:
With the other spelling of the user we get this message: We will investigate this with our colleagues. |
This issue is only related to TLS Client Certificate authentication, and not any other TLS topic |
We are currently testing out All tests were made with the following version Certificate based auth is possible as long as you are connecting to a server that does not have TLS 1.3 activated. Windows Server 2022 is the only OS (right now) that have TLS 1.3 support and is enabled by default. When using TLS 1.3 the following error occurs
The problem seems to reside within Windows and only when connecting using certificate. When using basic auth to connect to a TLS 1.3-activated server it all works fine.
And when using certificate based auth when TLS 1.3 has been disabled on the server
When investigating network traffic using wireshark it tries to use TLS 1.3 but server downgrades to TLS 1.2 and communication continues. No errors there, but for some reason the server terminates the session when using TLS 1.3 and certificate based auth. To make
A workaround could also be to make create a new parameter to force TLS 1.2. We did the tests with the winrm library rebuilt with MinVersion and MaxVersion set to TLS 1.2. But I think that the main issue is with Microsoft.. But it would be awesome if a newer release added the tls parameter Another thing to mention is the warning that sould not occur when using |
WinRM and the plugin support authentication via a certificate instead of credentials.
The text was updated successfully, but these errors were encountered: