Bert:
As indicated in other parts of the thread, this is a good application
of openssl and the SSL-Howto is a good starting point.

I'd like to extend the question however.

I've done something similar for my enterprise and have managed to get
the root certificate installed when we set up a machine for distribution,
so that problem is solved.

However, I am concerned about the number of certificates that the "ROOT"
is signing.  Or more correctly stated, I am concerned about the bottleneck
that keeping the passphrase of the ROOT key inside a small group (me and
my partner only).

So, it occurs to me that the ROOT should make a number of intermediate
CA's who have relatively short lifespans, and I can distribute those
passphrases to a wider audience.

So, I started playing with that.  I CAN create an intermediate CA
certificate (I'm pretty sure) by adding the following lines in the
config that creates the csr.

x509_extensions                 = v3_ca
req_extensions                  = v3_req
[ v3_ca ]
basicConstraints                = critical,CA:true
subjectKeyIdentifier            = hash
[ v3_req ]
nsCertType                      = objsign,email,server

I then sign this with the ROOT certificate and all seems well.

I then create a server certificate and sign it with the intermediate
CA's certificate.

All this seems to work OK.  However when I load this server certificate
into Apache, and attempt to connect to the web site, I get (from I.E.)
"The security certificate was issued by a company you have not chosen
to trust."  Now remember, the ROOT certificate IS in the trusted store.
However when I view the certificate, the "Certificate Path" is empty.

If I then load the Intermediate CA's certificate into the trusted store,
then the certificate is accepted and the certification path shows the
complete line from the server cert to the intermediate ca cert to the
ROOT.

Now, my understanding of all this is that if the ROOT is in the trusted
store, the browser should follow the certification path to the ROOT
and call it good.  I can also understand that the browser doesn't know
how to get the Intermediate CA's certificate.  That is (I think) the
problem.  However, I am also under the impression that the server cert
can be packaged such that it sends the entire trust chain as part of
it's own cert.

So, here are the questions (finally)!

1) Is my understanding correct in that I can package the entire trust
chain as part of the server cert.  If so, how?

2) If not, then how does the browser get the intermediate CA certificate
without having to explicitly load it into the browser.

3) Is my understanding completely off base, and this is not possible.

Thanks for the help.

Kevin



On Mon, Feb 04, 2002 at 12:58:53PM -0500, bjw wrote:
> Hi again,
>
> I have a second question...
>
> Can I host my own CA. Say on a Linux box (I think I can do it on NT, but
I'd
> rather not!)
>
> What are the draw backs to being my own CA (if it can be done)  I am not
> currently providing e-commerce but I would like to have my web based
data
> encrypted, but don't wish to shell out $250 (at this time) for a
verisign
> approved CA.
>
> Thanks again for any  (and all) responses!!!
>
> Bert Woods
> [EMAIL PROTECTED]
> www.efotoboths.com www.fantasyent.com



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to