> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Dr. 
> Stephen Henson
> Sent: Wednesday, March 16, 2005 5:01 AM
> To: openssl-users@openssl.org
> Subject: Re: Field CN and the certificates
> 
> On Wed, Mar 16, 2005, Vu Pham wrote:
> 
> > > -----Original Message-----
> > > From: [EMAIL PROTECTED] 
> > > [mailto:[EMAIL PROTECTED] On Behalf Of Tan Eng Ten
> > > Sent: Tuesday, March 15, 2005 11:33 PM
> > > To: openssl-users@openssl.org
> > > Subject: Re: Field CN and the certificates
> > > 
> > > Back to your original problem -- You said you were 
> accessing the web 
> > > server by using IE, was that client machine in the same private 
> > > network (as the server)?
> > > 
> > > Have you tested accessing the web server from another 
> client machine?
> > > 
> > > Maybe you should start looking from the client-end.
> > 
> > Yes, I did this on 1 XP/IE on the same local network, 1 XP/IE from 
> > outside,
> > 1 W2k/IE from outside, one Solaris 10 x86/Netscape on VPN network.
> > 
> > All the IEs show the same error. Netscape on Solaris even 
> shows "You 
> > have attempted to establish a connection with "abc.mydomain.com". 
> > However the security certificate presented belongs to 
> "abc.mydomain.com" ....
> > 
> > The thing makes me confused is the two host names that the warning 
> > displays are the same.
> > 
> 
> Well firstly you can rule out DNS records. To avoid DNS 
> spoofing attacks the only thing that is important is the 
> hostname the browser uses and the server it talks to ultimately.
> 
> You mentioned using a self signed certificate for the server. 
> This can cause problems. Have you tried it with a root CA and 
> server certificate instead, as created by CA.pl for example?

Currently I have a self-signed certificate as CA root.
I use this CA root to sign the  cert B. I import CA root to my PC, and use
cert B on the web server.

The following commands are what I used :

1. To create CA root
# openssl req -x509 -newkey rsa -out cacert.pem -outform PEM
with OPENSSL_CONF set to my configuration file

2. To create a cert request
# openssl req -newkey rsa:1024 -keyout pdakeypass.pem -keyform PEM -out
pdareq.pem -outform PEM

3. To clear the passphrase in cert key
# openssl rsa -in pdakeypass.pem -out pdakey.pem

4. To sign cert in step 2.
# openssl ca -in pdareq.pem

Then I use the two files pdareq.pem and pdakey.pem for my Apache for cert
and its key.
The cacert.pem in step 1 is imported to my PC.


Are those steps correct ? I think I am missing something but do not know
what it is.

Thanks,

Vu

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to