Thank you for your input, it is working now.

I forgot that I had also recieved the BundledRootCA.crt file.

The following did the job:
cat yourcert.crt > combinedcert.crt
cat BundledRootCA.crt >> combinedcert.crt
mv combinedcert.crt /etc/ssl/xxx.xxx.xxx.xxx.crt

regards,
Claus


On Thu, Feb 12, 2009 at 3:39 PM, Johan Strvm <jo...@stromnet.se> wrote:

> On Feb 12, 2009, at 15:29 , Claus Larsen wrote:
>
>  I am having some problems with a SSL proxy like the one described on
>> https://calomel.org/relayd.html
>>
>> No problems getting it up and running, but the browser cannot verify the
>> signed certificates.
>>
>> Internet Explorer says:
>> The security certificate presented by this website was not issued by a
>> trusted certificate authority.
>>
>> Safari says:
>> www.xxxxx.com
>> Issued by: Comodo Class 3 Security Services CA
>> Expires: .....
>> This certificate was signed by an unknown authority
>>
>> My certificates works fine when running on apache.
>>
>> Research tells me that I need a chain/intermediate certificate to get
>> things
>> working.
>>
>> But I have not been able to find any info about this with relayd.
>>
>> I have recieved the following files with my certifcate:
>> AddTrustExternalCARoot.crt
>> UTNAddTrustServerCA.crt
>>
>
> cat yourcert.crt > combinedcert.crt
> cat UTNAddTrustServerCA.crt >> combinedcert.crt
> cat AddTrustExternalCARoot.crt >> combinedcert.crt
>
> not sure about the order though.. But I'm quite sure your own cert goes
> first, and then the others should go with the "master" last. I think. :)
>
> Make sure there are a newline at the end of each file first, or at least
> that the resulting file have a newline between each cert (not a blank line,
> but just so they dont get mixed up on the same lines)
>
> When all are added, use combinedcert.crt in /etc/ssl for your IP.
>
> Good luck :)

Reply via email to