Hello All,

I wonder if someone would be so kind as to provide a bit
more detail regarding certificate chains and how it affects
the openssl setup?

For this discussion, let's assume I've created my own CA
self-signed cert, and then created a cert for each of my
virtual servers and signed each with my CA cert. (I'm
assuming I need to create one for each virtual web server
since they must have the FQDN in the subject, right?)

Now, when an outsider connects to my secure server, my server
should present that client with a certificate right? Which
certificate does it present? The server's cert, or the CA's?
Or does it need to present both? I've seen references to
the practice of concatenating the two together and I now
assume this is what might be referred to as a "chain file"?
But I'm not clear on "how" to concat the two or what in
what order? Is it as simple as
     "cat x1.pem cacert.pem > chainfile.crt"
And if so, should it be only the ---BEGIN CERT -- to ---END
CERT--- data, not all of the rest of the text, or can it
include the human readable text as well?

Also, what's the difference between the /certs and the /newcerts
directories? Is the /certs where I place the certs that I trust
and the /newcerts only stores the certs I've issued, but don't
need to trust them explicitly (since I trust the issuer)?

Or is the /certs where I place all of my server's certs? 

Do I sound confused? I sure feel confused :)
Anyone care to enlighten me? I'd sure appreciate it.

Than you,
Dann

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to