On Wed, May 19, 2004, Oliver Bogosavljevic wrote:

> hello mailing list,
> i'm trying to get openldap using tls/ssl
> using a selfsind cert for test purpose.
> when i do:
> ./openssl s_client -connect mvplab2.desy.de:636 -showcerts
> i get (last part of the output):
> 
> Server certificate
> subject=/C=DE/ST=Germany/L=Hamburg/O=Desy/OU=TTF/CN=mvplab2.desy.de/[EMAIL PROTECTED]
> issuer=/C=DE/ST=Germany/L=Hamburg/O=Desy/OU=TTF/CN=DESY
> ROOTCA/[EMAIL PROTECTED]
> ---
> No client certificate CA names sent
> ---
> SSL handshake has read 2057 bytes and written 346 bytes
> ---
>  New, TLSv1/SSLv3, Cipher is AES256-SHA Server public key is 1024 bit
> SSL-Session:
>     Protocol : TLSv1
>     Cipher : AES256-SHA
>     Session-ID:
> FCE8526F5FD3CEB4834832740E6A8AA95A0BD3FD3EC01990019CE7B81F8A0A37
>     Session-ID-ctx:
>     Master-Key:
> F501B633DD2268C69FDDF26A7A6A1D4598BF7B8318C4EF1BDB104EA77B05F00B84F18653989530919EEE93083E1A938A
>     Key-Arg : None
>     Start Time: 1084978220
>     Timeout : 300 (sec)
>     Verify return code: 19 (self signed certificate in certificate chain
> 
> 
> what does the line "No client certificate CA names sent" mean
> 

When a server requests a client certificate it includes a list of acceptable CA
names. The message simply means that the list was empty which probably means
it didn't request a client certificate.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to