I have set up a CA chain with a CA and a subCA. The subCA is used to issue user certificates and also to issue certificate for the Apache httpd/opnessl/modssl configuration.
I went ahead and created a private key for the Apache server using openssl. Then I created the csr file for using the private key. I used this request to generate a certificate from the windows 2003 subCA. Used the following configuration in httpd.conf <VirtualHost www.domainname.com:443> SSLEngine On SSLProtocol all SSLCertificateFile conf/ssl/certfile.cer SSLCertificateKeyFile conf/ssl/server.key SSLCACertificateFile conf/ssl/certfile.cer SSLVerifyClient require SSLVerifyDepth 3 </VirtualHost> I tried testing the ssl connection using openssl. When I try this in IE no certificate is shown in the certificate popup. Does this mean there is a discrepancy in the URL and the certificate chain which is used to issue the certificate. I do see the subCA in the intermediate trust store and the main CA cert in the trusted CA store in IE. E:\OpenSSL\bin>openssl s_client -connect abc.domainname.com:443 Loading 'screen' into random state - done CONNECTED(00000790) depth=0 /CN=abc.domainname.com verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 /CN=abc.domainname.com verify error:num=27:certificate not trusted verify return:1 depth=0 /CN=abc.domainname.com verify error:num=21:unable to verify the first certificate verify return:1 --- Certificate chain 0 s:/CN=abc.domainname.com i:/DC=com/DC=domainname/DC=dev/CN=subCAname --- Server certificate -----BEGIN CERTIFICATE----- server certificate key -----END CERTIFICATE----- subject=/CN=abc.domainname.com issuer=/DC=com/DC=domainname/DC=dev/CN=subCAname --- No client certificate CA names sent --- SSL handshake has read 1764 bytes and written 345 bytes --- New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA Server public key is 1024 bit Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : DHE-RSA-AES256-SHA Session-ID: Session-ID-ctx: Master-Key: AF858448C17F3CEFA326AA7678058116B7347A6C87AE450002B1CC34E72A8F23006536FD53F455AC6501 FF3ABAE6CBC6 Key-Arg : None Start Time: 1123080310 Timeout : 300 (sec) Verify return code: 21 (unable to verify the first certificate) --- read:errno=10093 Thanks xml_abh __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]