Oblio,

You're right; it is difficult getting started with OpenSSL.  Make sure
you've read the man pages at
http://www.openssl.org/docs/apps/openssl.html (go through the individual
commands).  Look at the "config" page to get a idea what the config file
looks like.  To get a better idea, look for the openssl.cnf file that is
in your distribution.

You can also look through the archives to see if someone has asked or
answered your questions already (use the support link, then one of the
"openssl-user" links (some have better search engines than others).

After that, if you have problems, try and be as specific as you can with
your question and you'll be more likely to get help.

-Bob

> -----Original Message-----
> From: Oblio [mailto:subscriber@;locustcreek.com]
> Sent: Thursday, November 07, 2002 4:38 PM
> To: [EMAIL PROTECTED]
> Subject: Re: PKCS#10?
> 
> Ok, I know it's very basic, it's just that there's no easy starting
point
> for someone who's never done this.
> 
> First, understand that I'm attempting all this under WinNT, and I
couldn't
> even get the thing to compile.  Fortunately, the folks at
> shininglightpro.com posted a win32 port, so at least I have the
> executable.  However, I don't have any of the manuals (although, I can
> kind
> of read through the .pods).
> 
> I have a cert request that I want to sign, and I don't know how to go
> about
> it.  If I do what you suggest, and use the ca command, it's looking
for a
> config file (which I don't have, nor do I know what's supposed to be
in
> it).  I've tried using the x509 command, and I get closer, but it's
either
> looking for a key, or a trusted cert.  Do I just generate an RSA (or
some
> other kind?) of key?  If so, don't I need to distribute a public key
to
> challenge the cert with?
> 
> This really isn't very straight forward, and I can use all the help I
can
> get.
> 
> Thanks,
> Oblio
> 
> At 11/7/2002 09:52 PM +0100, you wrote:
> >this is very basic.
> >
> >pkcs#10  is the standard request format.
> >under normal circumstances, the client ( person who requests a
> certificate)
> >sends a pkcs#10 to the ca and the ca signs this request.
> >
> >in openssl this is done with
> >
> >openssl ca -in thePKCS#10.pem -out theCert.pem,
> >
> >using different options for CA-name, validity, keyfile, directories,
> >extensions, batch mode, ...
> >you find this with
> >
> >man ca
> >
> >Best regards,
> >Michael
> >
> >Am 2002-11-07 21:30 Uhr schrieb "Oblio" unter
> <[EMAIL PROTECTED]>:
> >
> > > Does anyone know what to do with a PKCS#10 cert request?
> > >
> > > Oblio
> > >
> > >
______________________________________________________________________
> > > OpenSSL Project
http://www.openssl.org
> > > User Support Mailing List
[EMAIL PROTECTED]
> > > Automated List Manager
[EMAIL PROTECTED]
> >
> >--
>
>***********************************************************************
*
> >Karl-Michael Werzowa
> >A-1190 Wien, Paradisgasse 28/4/6
> >+43 (664)302 4511,  fax +43 (1)328 1992 14
> >[EMAIL PROTECTED], [EMAIL PROTECTED]
>
>***********************************************************************
*
> >
>
>______________________________________________________________________
> >OpenSSL Project
http://www.openssl.org
> >User Support Mailing List
[EMAIL PROTECTED]
> >Automated List Manager
[EMAIL PROTECTED]
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to