(resend because it seems not to have arrived at the list, maybe because it is
subscribers only?)

Sorry if this has been asked before, but i have a few questions regarding creating a 
ca root certificate:
I create the root certificate like this:

../openssl req -config ../ca.cnf -x509 -new -days 3652 -out domain_comCA.cert -keyout 
domain_comCA.key

The resulting .cert file i use in apache's SSLCACertificateFile config entry

Then i create a pkcs12 file for people to download (because that supports the 
"friendly name")
../openssl pkcs12 -export -nokeys -inkey domain_comCA.key -in domain_comCA.cert -out 
file.p12 -caname "Domain.com 
Certification Authority" -name "Domain.com"

Later on i create a site certificate for a server, which will get signed by this root 
certificate.
It all works really nice, however i do have some questions:

How can i add a "issuer statement" so you user can check on with the CA's policy is.
(this is usually a url)
The pkcs12 exports the private key as well, allthough i thought -nokeys should prevent 
that. Why is that?
I saw no difference with or without -nokeys in the exported pkcs12 file. (the have the 
same size)
I dont want my private key up for download, so how can i prevent that?

Please include my email when replying, as i am not on this list.

Thanx!
Th.

-- 
__Thijmen Klok________







______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to