On Thu, Mar 14, 2002 at 09:53:22AM -0800, Randy Bias wrote: > The situation: > > - Running openssl-0.9.6b, apache-1.3.22+ssl, prngd-0.9.23. > - Attempting to created self-signed cert for Apache-SSL > server. > - prngd is running: > > root 569 1 0 Mar 12 ? 0:04 /usr/local/bin/prngd > /var/spool/prngd/pool > > - First two phases of key/cert generation work properly: > > openssl req -config bs-ssleay.cnf -passout pass:ignore -new -x509 > > /tmp/new.csr > openssl rsa -passin pass:ignore -in privkey.pem -out cert.key > > - The last phase breaks: > > openssl x509 -in /tmp/new.csr -out cert.self -req -signkey cert.key > - -days 365 > > with: > > unable to load 'random state' > This means that the random number generator has not been seeded > with much random data. > Consider setting the RANDFILE environment variable to point at a file > that > 'random' data can be kept in (the file will be overwritten). > 18594:error:0906D06C:PEM routines:PEM_read_bio:no start > line:pem_lib.c:662:Expecting: CERTIFICATE REQUEST > > > I've tried various methodologies to specify the RANDFILE and it's > most definitely defined. I've set it as a temp file, I've pointed it > at the PRNGd socket. I've tried several other methods as well, > including "openssl rand" or "openssl -rand". Nothing seems to affect > the error, however.
You have been fooled and to be fair, it also took me a moment to see what is really going on... The error you are seeing has nothing to do with a PRNG problem. I was first also fooled by your analysis and I have seen, that the "x509" command does not support the "-rand" option. Then I asked myself, why would random numbers be need in x509 anyhow? Now to answer your question: your real problem is: > 18594:error:0906D06C:PEM routines:PEM_read_bio:no start > line:pem_lib.c:662:Expecting: CERTIFICATE REQUEST openssl x509 complains that it cannot recognize the input as a certificate request. (-req instructs it to expect a certificate request.) However you already generated a x509 certificate instead of a certificate request by specifying the -x509 option to the "req" command. /tmp/new.csr should already contain the self signed certificate. Use "openssl x509 -in /tmp/new.csr -text" to verify my theory. Best regards, Lutz -- Lutz Jaenicke [EMAIL PROTECTED] http://www.aet.TU-Cottbus.DE/personen/jaenicke/ BTU Cottbus, Allgemeine Elektrotechnik Universitaetsplatz 3-4, D-03044 Cottbus ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]