Hi,

I'm also fairly new to OpenSSL, and I encountered a similar problem as yours, ending with the same error message.
In my case, I try to automate web connexion using a Perl script, with Crypt::SSLeay perl module, which finally use openssl.


After many hard days, a collegue of mine suggested me to use "truss" (on Unix) to trace open system calls.
And I discover that the script did not open correctly the certificate.
In the meantime, I also have understood that it is not enough to export a certificate.
And I think it's the point you also miss :


You shoud run openssl c_rehash command to create a "hash" entry (something like 6784379.O) which is simply a symbolic link
towards your exported certificate file.
This is the file required.


Well, it is only my experience, and I had not enough until now to find more explanation.

Hope it will help you !

Best Regards,
J.L.P.

padma saxena wrote:

Since your problem is 'client certificates not
available', you should set SSLVerifyClient to 'optional'
This will let the server to continue the handshake even if the client does not have a certificate.


- Padma
--- Golub Heath <[EMAIL PROTECTED]> wrote:



Sorry in advance but I am fairly new to OpenSSL and
though I have read a lot
.. .I just can't seem to get it right. Any help,
even direction pointing
(eg. a URL) would be greatly appreciative.

Problem: client certificates not available during
SSL handshake

Description: I have a server certificate that was
issued by an intermediate
CA (DOD Class 3 CA-3) that was issued by the DOD
Root CA (DoD CLASS 3 Root
CA). Some DoD issued certificates (eg. those issued
by the intermediate CA,
DOD Class 3 CA-5) work correctly, but those issued
by DoD Class 3 CA-8 do
not work.

I think what I really just need to figure out is
which certificates should
go in my ca-bundle.crt file and which certificates
should go in the
intermediate-ca.crt file.
(Should all intermediate CA certificates be added
to the intermediate
file?)

Steps Taken (where did I go wrong?):
1. I downloaded the DOD Root Certificates and
installed them for IE.
-http://www.onr.navy.mil/resources/instructions.asp
2. Using the certificate manager (mmc) in Windows
2000, I selected my
subordinate and root CAs and exported them to pkcs7
format (ended up with 2
files, 5 certs in the root ca file , 18 certs in the
subordinate list).
3. I ran openssl pkcs7 command to extract the certs
into text format.
openssl pkcs7 -inform DER -outform PEM -in
DoDRoot.p7b -out
DoDRoot-ca.crt -print_certs -text
openssl pkcs7 -inform DER -outform PEM -in
DoDSub.p7b -out
DoDSub-ca.crt -print_certs -text
4. Copied the files to my apache server
5. In httpd.conf
SSLCertificateChainFile
conf\ssl.crt\DoDSub-ca.crt
SSLCACertificateFile conf\ssl.crt\DoDRoot-ca.crt
SSLVerifyClient require
SSLVerifyDepth 2


I have also tried the certificates with just the DOD
Class 3 CA-3 in the
DoDSub-ca and all the rest in the DoDRoot-ca files.
Any advice?

Thanks in advance, Heath Golub




______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]




-- Jean-Luc Pinardon TCL&ALCATEL Mobile Phones MTD Change & Configuration Management 165, Boulevard de Valmy mailto:[EMAIL PROTECTED] 92707 Colombes Cedex Phone : +33 1 55 66 77 54 France Fax : +33 1 55 66 33 37


______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]

Reply via email to