Yet another easy fix : 

I am feeling quite silly, but openssl is not that easy...
        -- openssl smime -verify  -in test_message.smime -CAfile
./democa/cacert.pem

this will choose the ca file, which is needed to verify that the message was
signed.
Of course, properly configured, openssl should find this automatically,
right?

Anyway I am now getting the message :
Verification Failure
1024:error:2107B084:PKCS7 routines:SMIME_text:mime no content
type:.\crypto\pkcs7\pk7_mime.c:343:
1024:error:21075081:PKCS7 routines:PKCS7_verify:smime text
error:.\crypto\pkcs7\pk7_smime.c:241:
And that one the file created by smime itself...

Back to work!

mike


-----Original Message-----
From: Dupont, Michael [mailto:[EMAIL PROTECTED]]
Sent: Dienstag, 17. April 2001 13:43
To: '[EMAIL PROTECTED]'
Subject: yet another new user question about SMIME and
X509_V_ERR_UNABLE_T O_GET_ISSUER_CERT_LOCALLY


Hello,
I am a new user to open ssl working on S/MIME signing and verification of
emails.

Here is what I have done: 
First I create a ca and request :
        -- CA.pl -newca
      -- CA.pl -newreq
      -- CA.pl -signreq

Then I concat the newreq.pem + newcert.pem to make the testcat.pem. (with
dos)
        -- copy newreq.pem + newcert.pem testcat.pem

Then I create a signed messages from the test_message.txt 
        -- openssl smime -sign -signer testcat.pem  -in test_message.txt >
test_message.smime

When I try and verify a message, It does not know the issuer certificate :
        -- openssl smime -verify  -in test_message.smime

The question that I have is about the error code : 
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY

Which produces the error message :
"1676:error:21075075:PKCS7 routines:PKCS7_verify:certificate verify
error:.\crypto\pkcs7\pk7_smime.c:213:Verify error:unable to get local issuer
certificate"

Is caused because the lookup of the certificate is failing?
Is that caused because I have not installed the certificate that signed the
message to be trusted?
What am I doing wrong, and how can I register a pem to be known?

Can anyone assist or point me in the right direction?
Thanks,
Mike
Attached is the test message created :

and following this line : 
---------- CUT ------------
MIME-Version: 1.0
Content-Type: multipart/signed ; protocol="application/x-pkcs7-signature" ;
micalg=sha1 ; boundary="----B0088C00F32A99B56B5136FF0C048D3B"

This is an S/MIME signed message

------B0088C00F32A99B56B5136FF0C048D3B
 This is a test message, it has no meaning other than to test the SMIME
signature feature of OpenSSL. OpenSSL is one of the worlds most trusted
Secure Socket Layer Programs. More information about open ssl is available
on http://www.openssl.org/. It was signed using openssl version 0.9.6. The
command used was "openssl smime sign". The certificate used to sign was
created by test certificate authority, you should not trust the test
certificate authority because it is not a public authority. We will have to
get a certificate from an external certificate authority for real security.
It was send using Perl Binary build 623 provided by ActiveState Tool Corp.
http://www.ActiveState.com. The module used was  Net::SMTP version 2.15. The
mail relay server was devfp0.wcom.de [170.127.144.70]). You should be able
to verify that the message has not been modified.  Michael DuPont ++4969
97268-165 De-SoftDev Country Applications Europe MCI Worldcom GmbH
Brönnerstr. 15  60313 Frankfurt am Main, Germany  
------B0088C00F32A99B56B5136FF0C048D3B
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------B0088C00F32A99B56B5136FF0C048D3B--
---------- CUT ------------

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to