Some thoughts for you..

SSL server presents a list of valid CA Certifiates to the browser, the
IE browers use this list to filter the client certs they have and
present appropriate ones to user for selection.

An empty selection box suggests your server has not provided the CA cert
to the client!

Installation of a CA Cert onto Microsoft server is as follows:

- Convert your CA cert to a binary format (use sssleay x509 -in ca.pem
-out ca.der -outform DER)
- Open the file with Internet Explorer, on the server, to install it
into the registry
- Run utility IISCA that comes with the IIS Server

Good Luck!

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, 25 January 2000 11:29 PM
To: [EMAIL PROTECTED]
Subject: SSL my last hope...




Hi, my name is Marion
I try to develop a SSL
I live in France and I have to generate a key in 40 bits


This is the different steps to implement SSL

1.   I changed the file openssl.cnf

****************************openssl.cnf******************************
#
# OpenSSL example configuration file.
# This is mostly being used for generation of certificate requests.
#

RANDFILE       = .rnd


####################################################################
[ ca ]
default_ca     = CA_default         # The default ca section

####################################################################
[ CA_default ]

dir       = d:/ssl/ToolsCA          # Where everything is kept
certs          = $dir/certs         # Where the issued certs are kept
crl_dir        = $dir/crl           # Where the issued crl are kept
database  = $dir/index.txt     # database index file.
new_certs_dir  = $dir/newcerts           # default place for new certs.

certificate    = $dir/cacert.pem    # The CA certificate
serial         = $dir/serial        # The current serial number
crl       = $dir/crl.pem            # The current CRL
private_key    = $dir/private/cakey.pem# The private key
RANDFILE  = $dir/private/.rand      # private random number file

x509_extensions     = usr_cert           # The extentions to add to the
cert

# Extensions to add to a CRL. Note: Netscape communicator chokes on V2
CRLs
# so this is commented out by default to leave a V1 CRL.
# crl_extensions    = crl_ext

default_days   = 1100               # how long to certify for
default_crl_days= 30                # how long before next CRL
default_md     = sha1          # which md to use.
preserve  = no            # keep passed DN ordering

# A few difference way of specifying how similar the request should look
# For type CA, the listed attributes must be the same, and the optional
# and supplied fields are just that :-)
policy         = policy_match

# For the CA policy
[ policy_match ]
countryName         = match
stateOrProvinceName = match
organizationName    = match
organizationalUnitName    = optional
commonName          = supplied
emailAddress        = optional

# For the 'anything' policy
# At this point in time, you must list all acceptable 'object'
# types.
[ policy_anything ]
countryName         = optional
stateOrProvinceName = optional
localityName        = optional
organizationName    = optional
organizationalUnitName    = optional
commonName          = supplied
emailAddress        = optional

####################################################################
[ req ]
default_bits        = 512
default_keyfile     = privkey.pem
distinguished_name  = req_distinguished_name
attributes          = req_attributes
x509_extensions     = v3_ca    # The extentions to add to the self
signed cert

[ req_distinguished_name ]
countryName               = Country Name (2 letter code)
countryName_default       = FR
countryName_min                = 2
countryName_max                = 2

stateOrProvinceName       = State or Province Name (full name)
stateOrProvinceName_default    = France

localityName              = Locality Name (eg, city)
localityName_default           = La Gaude

0.organizationName        = Organization Name (eg, company)
0.organizationName_default     = AGNS

# we can do this but it is not needed normally :-)
#1.organizationName       = Second Organization Name (eg, company)
#1.organizationName_default    = World Wide Web Pty Ltd

organizationalUnitName         = Organizational Unit Name (eg, section)
organizationalUnitName_default      = CS

commonName                = Common Name (eg, YOUR name)
commonName_max            = 64

emailAddress              = Email Address
emailAddress_max          = 40

# SET-ex3           = SET extension number 3

[ req_attributes ]
challengePassword         = A challenge password
challengePassword_min          = 4
challengePassword_max          = 20

unstructuredName          = An optional company name

[ usr_cert ]

# These extensions are added when 'ca' signs a request.

# This goes against PKIX guidelines but some CAs do it and some software
# requires this to avoid interpreting an end user certificate as a CA.

basicConstraints=CA:FALSE

# Here are some examples of the usage of nsCertType. If it is omitted
# the certificate can be used for anything *except* object signing.

# This is OK for an SSL server.
# nsCertType              = server

# For an object signing certificate this would be used.
# nsCertType = objsign

# For normal client use this is typical
# nsCertType = client, email

# and for everything including object signing:
# nsCertType = client, email, objsign, server

 nsCertType = client,  server

keyUsage = cRLSign, keyCertSign
extendedKeyUsage = serverAuth, clientAuth
#extendedKeyUsage = clientAuth

# This is typical in keyUsage for a client certificate.
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment

# This will be displayed in Netscape's comment listbox.
#nsComment                = "OpenSSL Generated Certificate"

# PKIX recommendations harmless if included in all certificates.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer:always

# This stuff is for subjectAltName and issuerAltname.
# Import the email address.
# subjectAltName=email:copy

# Copy subject details
# issuerAltName=issuer:copy

#nsCaRevocationUrl        = http://www.domain.dom/ca-crl.pem
#nsBaseUrl
#nsRevocationUrl
#nsRenewalUrl
#nsCaPolicyUrl
#nsSslServerName

[ v3_ca ]

# Extensions for a typical CA


# PKIX recommendation.

subjectKeyIdentifier=hash

authorityKeyIdentifier=keyid:always,issuer:always

# This is what PKIX recommends but some broken software chokes on
critical
# extensions.
#basicConstraints = critical,CA:true
# So we do this instead.
basicConstraints = CA:true

# Key usage: this is typical for a CA certificate. However since it will
# prevent it being used as an test self-signed certificate it is best
# left out by default.
 keyUsage = cRLSign, keyCertSign
#keyUsage = sslCA, emailCA,objCA

#extendedKeyUsage = clientAuth

# Some might want this also
 nsCertType = sslCA

# Include email address in subject alt name: another PKIX recommendation
# subjectAltName=email:copy
# Copy issuer details
# issuerAltName=issuer:copy

# RAW DER hex encoding of an extension: beware experts only!
# 1.2.3.5=RAW:02:03
# You can even override a supported extension:
# basicConstraints= critical, RAW:30:03:01:01:FF

[ crl_ext ]

# CRL extensions.
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.

# issuerAltName=issuer:copy
authorityKeyIdentifier=keyid:always,issuer:always



Then I generated my own CA certificat doing this :
Ca.pl ?newca
I converted the file .pem to .der and I installed it with my trusts
certificats.


After I generated my server certificat thanks to the wizard microsoft
I install it on my local computer in personal and intermediate authority

At that time I can generate the client certificat
I do this :
Openssl dsaparam ?outform pem ?out param.pem 40
Openssl gendsa ?des ?out PrivKey.pem param.pem
Openssl req ?new ?key PrivKey.pem _out newreq.pem
I sign the certificat with the CA : ca.pl ?sign
Openssl pkcs12 ?inkey PrivKey.pem ?in newcert.pem ?export ?out
marion.p12

I install it in my personal certificat

And with internet explorer I do
https://mydomain

I can see a dialog box with my client certificat but the connexion
doesn?t work
as if my certificat couldn?t work

What s wrong with my certificat
Did I forget something ?
Please some answer to be able to run it very soon?.
Marion


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

smime.p7s

Reply via email to