On Wed, 27 Oct 2004, Thomas Anders wrote:

Arne Ansper wrote:
The one in Woody has dysfunctional session cache when used together with client authentication. Client cert makes the encoded session structure too big and it is not stored in cache.

The original query said "Debian 3.1" which is Sarge, not Woody.

I must first apologize for the original poster for being off topic. I just tried to show where stock Debian mod_ssl does not work. I have not used it in Sarge only on Woody, so I mentioned it, to avoid confusion.


About original problem. I looked at the firefox source and error -8182 is bad signature:

./nss/lib/util/secerr.h:#define SEC_ERROR_BASE (-0x2000)
./nss/cmd/lib/SECerrs.h:ER3(SEC_ERROR_BAD_SIGNATURE, SEC_ERROR_BASE + 10,

I tried to understand what the original poster did but for producing self-signed certificate it seems overly complicated. Easiest way to produce correct self-signed certificate is:

openssl req -newkey rsa:1024 -x509 -days 365 -keyout key.pem -nodes -out cert.pem

Arne
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to