Openconnect supporting SafeNet eToken 5300
Pavel Gavronsky
kamm555 at hotmail.com
Thu Jun 23 06:27:30 PDT 2022
Hi Dmitri,
Thank you for the reply.
I tried to install the latest openconnect version, however when "make" the build the following error appeared:
make[1]: *** No rule to make target '../libopenconnect.la', needed by 'serverhash'. Stop.
make[1]: Leaving directory '/tmp/openconnect-9.01/tests'
make: *** [Makefile:1749: check-recursive] Error 1
I will try to install other releases which are newer than I have currently.
Regards,
Pavel
From: Dimitri Papadopoulos <dimitri.papadopoulos at cea.fr>
Sent: Tuesday, June 21, 2022 6:41 PM
To: Pavel Gavronsky <kamm555 at hotmail.com>; openconnect-devel at lists.infradead.org <openconnect-devel at lists.infradead.org>
Subject: Re: Openconnect supporting SafeNet eToken 5300
Hi,
Is this issue identical to that one filed a year ago?
https://gitlab.com/openconnect/openconnect/-/issues/242
Have you tried a newer version of OpenConnect as suggested in this issue?
Best Regards,
Dimitri
Le 21/06/2022 à 16:38, Pavel Gavronsky a écrit :
> Hello,
>
> I am using Openconnect with PULSE appliance where the authentication is done by SmartCard (ACS ACR39U ICC Reader). The connection is established without any issue.
> When trying to use SafeNet USB eToken 5300 - there is an error "Loading certificate failed. Aborting. Failed to obtain WebVPN cookie".
>
> $ uname -a
> Linux xxx-xx-A 5.10.0-10-amd64 #1 SMP Debian 5.10.84-1 (2021-12-08) x86_64 GNU/Linux
>
> Debugging info (GNUTLS_DEBUG_LEVEL=9):
>
> /usr/sbin/openconnect -V
> OpenConnect version v8.10-2+b1
> Using GnuTLS 3.7.1. Features present: TPMv2, PKCS#11, RSA software token, HOTP software token, TOTP software token, Yubikey OATH, System keys, DTLS, ESP
> Supported protocols: anyconnect (default), nc, gp, pulse
>
> openconnect --protocol=pulse pdc.xxx.xxx:443/xxxx --servercert "pin-sha256:xxxxcXCTMPxxx" -c 'pkcs11:model=ID%20Prime%20MD;manufacturer=Gemalto;serial=xxxx39;token=xxxxx;id=%B6%Axxxxx19%65%D6%5C%0C%FD%7E;object=PGCert;type=cert' -vvv
> gnutls[2]: Enabled GnuTLS 3.7.1 logging...
> gnutls[2]: getrandom random generator was detected
> gnutls[2]: Intel SSSE3 was detected
> gnutls[2]: Intel AES accelerator was detected
> gnutls[2]: Intel GCM accelerator was detected
> gnutls[2]: cfg: unable to access: /etc/gnutls/config: 2
> Attempting to connect to server x.x.x.x:443
> Connected to x.x.x.x:443
> Using PKCS#11 certificate pkcs11:model=ID%20Prime%20MD;manufacturer=Gemalto;serial=xxxx39;token=xxxxx;id=%B6%Axxxxx19%65%D6%5C%0C%FD%7E;object=PGCert;type=cert
> gnutls[2]: Initializing all PKCS #11 modules
> gnutls[2]: p11: Initializing module: p11-kit-trust
> gnutls[2]: p11: Initializing module: opensc
> gnutls[2]: p11: Initializing module: opensc-pkcs11
> gnutls[3]: ASSERT: ../../lib/pkcs11.c[compat_load]:896
> gnutls[2]: p11: No login requested.
> Trying PKCS#11 key URL pkcs11:model=ID%20Prime%20MD;manufacturer=Gemalto;serial=xxxx39;token=xxxxx;id=%B6%Axxxxx19%65%D6%5C%0C%FD%7E;object=PGCert;type=private
> PIN required for xxx
> Enter PIN:
> gnutls[2]: p11: Login result = ok (0)
> gnutls[3]: ASSERT: ../../lib/pkcs11_privkey.c[gnutls_pkcs11_privkey_import_url]:561
> gnutls[2]: p11: No login requested.
> Trying PKCS#11 key URL pkcs11:model=ID%20Prime%20MD;manufacturer=Gemalto;serial=xxxx39;token=xxxxx;id=%B6%Axxxxx19%65%D6%5C%0C%FD%7E;object=PGCert;type=private
> gnutls[2]: p11: Login result = ok (0)
> gnutls[3]: ASSERT: ../../lib/pkcs11_privkey.c[gnutls_pkcs11_privkey_import_url]:561
> Trying PKCS#11 key URL pkcs11:model=ID%20Prime%20MD;manufacturer=Gemalto;serial=xxxx39;token=xxxxx;id=%B6%Axxxxx19%65%D6%5C%0C%FD%7E;object=PGCert;type=private
> gnutls[2]: p11: Login result = ok (0)
> gnutls[3]: ASSERT: ../../lib/pkcs11_privkey.c[gnutls_pkcs11_privkey_import_url]:561
> Error importing PKCS#11 URL pkcs11:model=ID%20Prime%20MD;manufacturer=Gemalto;serial=xxxx39;token=xxxxx;id=%B6%Axxxxx19%65%D6%5C%0C%FD%7E;object=PGCert;type=private: The requested data were not available.
> Loading certificate failed. Aborting.
> Failed to obtain WebVPN cookie
>
>
>
>
> pkcs11-tool --module /usr/lib/libeToken.so --list-token-slots
> Available slots:
> Slot 0 (0x0): SafeNet eToken 5300 [eToken 5300] (FFFFFFFFFFFF) 00 00
> token label : xxxx
> token manufacturer : Gemalto
> token model : ID Prime MD
> token flags : login required, rng, token initialized, PIN initialized, other flags=0x200
> hardware version : 0.0
> firmware version : 0.0
> serial num : xxxx39
> pin min/max : 4/16
> Slot 1 (0x1): ACS ACR39U ICC Reader 01 00
> token label : GSTEST01
> token manufacturer : SafeNet, Inc.
> token model : eToken
> token flags : login required, rng, token initialized, PIN initialized, other flags=0x200
> hardware version : 0.0
> firmware version : 0.0
> serial num : xx
> pin min/max : 8/20
>
>
> pkcs11-tool --module /usr/lib/libeTokenHID.so -v -l -t --slot 0
> Using slot with ID 0x0
> Logging in to "xxxx".
> Please enter User PIN:
> C_SeedRandom() and C_GenerateRandom():
> seems to be OK
> Digests:
> all 4 digest functions seem to work
> SHA-1: OK
> Signatures (currently only for RSA)
> testing key 0 ()
> ERR: C_SignUpdate failed: CKR_KEY_FUNCTION_NOT_PERMITTED (0x68)
> error: PKCS11 function C_Sign failed: rv = CKR_FUNCTION_FAILED (0x6)
> Aborting.
>
>
> pkcs11-tool --module /usr/lib/libeTokenHID.so -v -l -t --slot 1
> Using slot with ID 0x1
> Logging in to "xxxx".
> Please enter User PIN:
> C_SeedRandom() and C_GenerateRandom():
> seems to be OK
> Digests:
> all 4 digest functions seem to work
> SHA-1: OK
> Signatures (currently only for RSA)
> testing key 0 (No Friendly Name Available)
> ERR: C_SignUpdate failed: CKR_KEY_FUNCTION_NOT_PERMITTED (0x68)
> testing signature mechanisms:
> RSA-PKCS: OK
> SHA256-RSA-PKCS: OK
> Verify (currently only for RSA)
> testing key 0 (No Friendly Name Available)
> RSA-PKCS: OK
> Decryption (currently only for RSA)
> testing key 0 (No Friendly Name Available)
> -- mechanism can't be used to decrypt, skipping
> -- mechanism can't be used to decrypt, skipping
> -- mechanism can't be used to decrypt, skipping
> -- mechanism can't be used to decrypt, skipping
> -- mechanism can't be used to decrypt, skipping
> -- mechanism can't be used to decrypt, skipping
> RSA-PKCS: OK
> RSA-PKCS-OAEP: mgf not set, defaulting to MGF1-SHA256
> OAEP parameters: hashAlg=SHA256, mgf=MGF1-SHA256, source_type=0, source_ptr=(nil), source_len=0
> OK
> 1 errors
>
>
> Any ideas?
>
> Thank you in advance,
> Pavel
> _______________________________________________
> openconnect-devel mailing list
> openconnect-devel at lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/openconnect-devel
More information about the openconnect-devel
mailing list