Hi all,
I am very new to openssl and I am hoping someone can help me with the 
following problem:

I am trying to use openssl from the command line (using s_client) to get 
a file off a web server using ssl. When I run the following:

openssl s_client -prexit -showcerts -connect xx.xxx.xxx.xxx:443

and I get the following:
CONNECTED(00000003)
depth=1 /C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
verify error:num=19:self signed certificate in certificate chain
verify return:0
---
Certificate chain
0 s:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK 
SERVICES/OU=SecureTransport Server/CN=URBFTP01
i:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
-----BEGIN CERTIFICATE-----
MIICbzCCAdgCAQIwDQYJKoZIhvcNAQEEBQAwbzELMAkGA1UEBhMCVVMxDTALBgNV
BAgTBElPV0ExEjAQBgNVBAcTCVVSQkFOREFMRTEPMA0GA1UEChMGQUxMSUVEMRkw
FwYDVQQLExBORVRXT1JLIFNFUlZJQ0VTMREwDwYDVQQDEwhVUkJGVFAwMTAeFw0w
MjA1MDgxMTUyNDJaFw0wMzA1MDgxMTUyNDJaMIGQMQswCQYDVQQGEwJVUzENMAsG
A1UECBMESU9XQTESMBAGA1UEBxMJVVJCQU5EQUxFMQ8wDQYDVQQKEwZBTExJRUQx
GTAXBgNVBAsTEE5FVFdPUksgU0VSVklDRVMxHzAdBgNVBAsTFlNlY3VyZVRyYW5z
cG9ydCBTZXJ2ZXIxETAPBgNVBAMTCFVSQkZUUDAxMIGfMA0GCSqGSIb3DQEBAQUA
A4GNADCBiQKBgQDb2JJEZrpgOGzvmdALpzsPtO75kSmbYygcLdyzKLgeZDMzNMNj
/Y1BWmpH8iCLneJYlkQ6PVU307CwK5kYuvBHHHOu4rieGhUQ1aFvkQ3+30U32dKr
M+6MMoFJxCW/q6y6gFOc3bSQmRr/JGQXX4o3g1J9YhYMgY6U+UTx2xJzewIDAQAB
MA0GCSqGSIb3DQEBBAUAA4GBALmZZyiGHSwdfc4NKIH0oyzKkwMeK33gH5Xa7xFO
rtYKZNXvvuhowHW/r080rfXZrYmKRv27KlvxFGSOJYoJg3tlD7mpHkrezLMr1rhC
72MDOhE6+LAd327Czw4LVFz347GQpg/Ki8ArSfNXggcGK8o61zig+0GmpzG/XU+D
Xlq+
-----END CERTIFICATE-----
1 s:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
i:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK 
SERVICES/OU=SecureTransport Server/CN=URBFTP01
issuer=/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
---
No client certificate CA names sent
---
SSL handshake has read 1752 bytes and written 314 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
SSL-Session:
Protocol : TLSv1
Cipher : EDH-RSA-DES-CBC3-SHA
Session-ID:
Session-ID-ctx:
Master-Key: 
A4B7765876D6E1B1863B1BE32157B279394864CE8389AC199E6C395CF204406CF1B7436C48F43682A4487077C8F2C64D
Key-Arg : None
Start Time: 1026398836
Timeout : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
GET /
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<HTML><HEAD>
<TITLE>302 Found</TITLE>
</HEAD><BODY>
<H1>Found</H1>
The document has moved <A HREF= 
"https://URBFTP01.ALLIED.NWIE.NET:443/?&amp;STCO=1PS2a3cCoPQcAAAg8PS0&amp;STCOEND"; 
 >here</A>.<P>
<P>Additionally, a 302 Found
error was encountered while trying to use an ErrorDocument to handle the 
request.
</BODY></HTML>
closed
--
Certificate chain
0 s:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK 
SERVICES/OU=SecureTransport Server/CN=URBFTP01
i:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
1 s:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
i:/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK 
SERVICES/OU=SecureTransport Server/CN=URBFTP01
issuer=/C=US/ST=IOWA/L=URBANDALE/O=ALLIED/OU=NETWORK SERVICES/CN=URBFTP01
---
No client certificate CA names sent
---
SSL handshake has read 2178 bytes and written 380 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
SSL-Session:
Protocol : TLSv1
Cipher : EDH-RSA-DES-CBC3-SHA
Session-ID:
Session-ID-ctx:
Master-Key: 
A4B7765876D6E1B1863B1BE32157B279394864CE8389AC199E6C395CF204406CF1B7436C48F43682A4487077C8F2C64D
Key-Arg : None
Start Time: 1026398836
Timeout : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---

I think its because the are not sending back any information in the CA list
when I access their site using mozilla browser I get a message that the 
certificate being presented belong to them/some wierd name. Then when I 
click ok the page comes up and everything is ok.

The site that I am trying to access is not being very cooperative or 
helpful, I am trying to automate retrieving of a file off their web site 
instead of having to go to the web site and click on it. I am sure there 
are tons more better ways to do this but I am new to this job and this 
is how they have been doing it and the company doesn't want to open up 
thier machine to us.

the machine I am working off of is a red hat 7.3 linux box and I have 
downloaded and installed the latest openssl

OpenSSL> version
OpenSSL 0.9.6b [engine] 9 Jul 2001
OpenSSL>

any ideas/advice would be greatly appriciated!

dougc
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to