Hi, my name is Marion
I try to develop a SSL
I live in France and I have to generate a key in 40 bits


This is the different steps to implement SSL

1.   I changed the file openssl.cnf

****************************openssl.cnf******************************
#
# OpenSSL example configuration file.
# This is mostly being used for generation of certificate requests.
#

RANDFILE       = .rnd


####################################################################
[ ca ]
default_ca     = CA_default         # The default ca section

####################################################################
[ CA_default ]

dir       = d:/ssl/ToolsCA          # Where everything is kept
certs          = $dir/certs         # Where the issued certs are kept
crl_dir        = $dir/crl           # Where the issued crl are kept
database  = $dir/index.txt     # database index file.
new_certs_dir  = $dir/newcerts           # default place for new certs.

certificate    = $dir/cacert.pem    # The CA certificate
serial         = $dir/serial        # The current serial number
crl       = $dir/crl.pem            # The current CRL
private_key    = $dir/private/cakey.pem# The private key
RANDFILE  = $dir/private/.rand      # private random number file

x509_extensions     = usr_cert           # The extentions to add to the cert

# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
# so this is commented out by default to leave a V1 CRL.
# crl_extensions    = crl_ext

default_days   = 1100               # how long to certify for
default_crl_days= 30                # how long before next CRL
default_md     = sha1          # which md to use.
preserve  = no            # keep passed DN ordering

# A few difference way of specifying how similar the request should look
# For type CA, the listed attributes must be the same, and the optional
# and supplied fields are just that :-)
policy         = policy_match

# For the CA policy
[ policy_match ]
countryName         = match
stateOrProvinceName = match
organizationName    = match
organizationalUnitName    = optional
commonName          = supplied
emailAddress        = optional

# For the 'anything' policy
# At this point in time, you must list all acceptable 'object'
# types.
[ policy_anything ]
countryName         = optional
stateOrProvinceName = optional
localityName        = optional
organizationName    = optional
organizationalUnitName    = optional
commonName          = supplied
emailAddress        = optional

####################################################################
[ req ]
default_bits        = 512
default_keyfile     = privkey.pem
distinguished_name  = req_distinguished_name
attributes          = req_attributes
x509_extensions     = v3_ca    # The extentions to add to the self signed cert

[ req_distinguished_name ]
countryName               = Country Name (2 letter code)
countryName_default       = FR
countryName_min                = 2
countryName_max                = 2

stateOrProvinceName       = State or Province Name (full name)
stateOrProvinceName_default    = France

localityName              = Locality Name (eg, city)
localityName_default           = La Gaude

0.organizationName        = Organization Name (eg, company)
0.organizationName_default     = AGNS

# we can do this but it is not needed normally :-)
#1.organizationName       = Second Organization Name (eg, company)
#1.organizationName_default    = World Wide Web Pty Ltd

organizationalUnitName         = Organizational Unit Name (eg, section)
organizationalUnitName_default      = CS

commonName                = Common Name (eg, YOUR name)
commonName_max            = 64

emailAddress              = Email Address
emailAddress_max          = 40

# SET-ex3           = SET extension number 3

[ req_attributes ]
challengePassword         = A challenge password
challengePassword_min          = 4
challengePassword_max          = 20

unstructuredName          = An optional company name

[ usr_cert ]

# These extensions are added when 'ca' signs a request.

# This goes against PKIX guidelines but some CAs do it and some software
# requires this to avoid interpreting an end user certificate as a CA.

basicConstraints=CA:FALSE

# Here are some examples of the usage of nsCertType. If it is omitted
# the certificate can be used for anything *except* object signing.

# This is OK for an SSL server.
# nsCertType              = server

# For an object signing certificate this would be used.
# nsCertType = objsign

# For normal client use this is typical
# nsCertType = client, email

# and for everything including object signing:
# nsCertType = client, email, objsign, server

 nsCertType = client,  server

keyUsage = cRLSign, keyCertSign
extendedKeyUsage = serverAuth, clientAuth
#extendedKeyUsage = clientAuth

# This is typical in keyUsage for a client certificate.
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment

# This will be displayed in Netscape's comment listbox.
#nsComment                = "OpenSSL Generated Certificate"

# PKIX recommendations harmless if included in all certificates.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer:always

# This stuff is for subjectAltName and issuerAltname.
# Import the email address.
# subjectAltName=email:copy

# Copy subject details
# issuerAltName=issuer:copy

#nsCaRevocationUrl        = http://www.domain.dom/ca-crl.pem
#nsBaseUrl
#nsRevocationUrl
#nsRenewalUrl
#nsCaPolicyUrl
#nsSslServerName

[ v3_ca ]

# Extensions for a typical CA


# PKIX recommendation.

subjectKeyIdentifier=hash

authorityKeyIdentifier=keyid:always,issuer:always

# This is what PKIX recommends but some broken software chokes on critical
# extensions.
#basicConstraints = critical,CA:true
# So we do this instead.
basicConstraints = CA:true

# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# left out by default.
 keyUsage = cRLSign, keyCertSign
#keyUsage = sslCA, emailCA,objCA

#extendedKeyUsage = clientAuth

# Some might want this also
 nsCertType = sslCA

# Include email address in subject alt name: another PKIX recommendation
# subjectAltName=email:copy
# Copy issuer details
# issuerAltName=issuer:copy

# RAW DER hex encoding of an extension: beware experts only!
# 1.2.3.5=RAW:02:03
# You can even override a supported extension:
# basicConstraints= critical, RAW:30:03:01:01:FF

[ crl_ext ]

# CRL extensions.
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.

# issuerAltName=issuer:copy
authorityKeyIdentifier=keyid:always,issuer:always



Then I generated my own CA certificat doing this :
Ca.pl ?newca
I converted the file .pem to .der and I installed it with my trusts certificats.


After I generated my server certificat thanks to the wizard microsoft
I install it on my local computer in personal and intermediate authority

At that time I can generate the client certificat
I do this :
Openssl dsaparam ?outform pem ?out param.pem 40
Openssl gendsa ?des ?out PrivKey.pem param.pem
Openssl req ?new ?key PrivKey.pem _out newreq.pem
I sign the certificat with the CA : ca.pl ?sign
Openssl pkcs12 ?inkey PrivKey.pem ?in newcert.pem ?export ?out marion.p12

I install it in my personal certificat

And with internet explorer I do
https://mydomain

I can see a dialog box with my client certificat but the connexion doesn?t work
as if my certificat couldn?t work

What s wrong with my certificat
Did I forget something ?
Please some answer to be able to run it very soon?.
Marion


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to