Hello and thanks for reading this:


I use OpenSSL 0.9.5a, Red Hat Linux 6.2, Intel platform.

I'm trying to produce PKCS#12 files to be able to keep the all generation
process under my control and to distribute only one file (BTW: why is it
taken for such a security bug?). I do it the following way:

First I generate the certificate request
openssl req -new -out certreq.pem -keyout certreq-privkey.pem -outform PEM

...then I sign it...
openssl x509 -req -CA cacert.pem -CAkey private/cakey.pem -CAcreateserial
-in /usr/local/ssl/certreq.pem -outform pem -out newcert.pem

...and then I try to export it in PKCS#12 format
openssl pkcs12 -export -inkey certreq-privkey.pem -certfile cacert.pem -in
newcert.pem -out pkcs12cert.p12

My openssl.cnf contains in its default section:
x509_extensions = usr_cert

and my [ usr_cert ] section contains only
basicConstraints=CA:FALSE

I've also tried to uncomment
nsCertType = client, email

When I test source PEMs for pkcs12 with x509 -purpose, it says they can be
used for S/MIME signing and encryption.

BUT: whenever I import this PKCS#12 file to Netscape Communicator 4.73
(what works smoothly) and try to send a signed e-mail, it says that I don't
have an e-mail certificate.


My experimental certificate authority obviously works ok,
because when I generate a request from Netscape Communicator using
<KEYGEN>,
then format it into
C= ...
ST= ...
...
SPKAC=...

file, sign it with

openssl ca -spkac req.raw -out ucert

and download this file with small script as x-x509-user-cert to Netscape, I
CAN send signed e-mail.



What's wrong with my PKCS#12 file? Any idea, what else could be wrong?


===> Thanks in advance! <===


Ivan Dolezal




______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to