Folgende Quellcode-Auszug von mod_tls.c zeigt die Implementierung hierfür auf.
In meiner Umgebung komme ich aber über die server-seitige tls_log-Meldung leider noch nicht hinaus:
2022-07-13 11:01:52,280 mod_tls/2.7[4757]: [info] ok: SSL negotiation finished successfully
2022-07-13 11:01:52,280 mod_tls/2.7[4757]: [info] accepting: SSL negotiation finished successfully
2022-07-13 11:01:52,280 mod_tls/2.7[4757]: client supports secure renegotiations
2022-07-13 11:01:52,280 mod_tls/2.7[4757]: TLSv1.2 connection accepted, using cipher ECDHE-RSA-AES256-GCM-SHA384 (256 bits)
2022-07-13 11:01:52,280 mod_tls/2.7[4757]: [msg] received protocol record message (5 bytes)
2022-07-13 11:01:52,280 mod_tls/2.7[4757]:
TLS/X509 .tlslogin check failed for user 'xyz0815'
/* Possible authentication combinations:
*
* TLS handshake + passwd (default)
* TLS handshake + .tlslogin (passwd ignored)
*/
if ((tls_flags &
TLS_SESS_ON_CTRL) && (tls_opts &
TLS_OPT_ALLOW_DOT_LOGIN)) {
if (
tls_dotlogin_allow(cmd->argv[1])) {
tls_log("TLS/X509 .tlslogin check successful for user '%s'",
cmd->argv[0]);
pr_log_auth(
PR_LOG_NOTICE, "USER %s: TLS/X509 .tlslogin authentication "
"successful", cmd->argv[1]);
session.auth_mech = "mod_tls.c";
return
mod_create_data(cmd, (void *)
PR_AUTH_RFC2228_OK);
} else
tls_log("TLS/X509 .tlslogin check failed for user '%s'",
cmd->argv[1]);
}
return
DECLINED(cmd);
}