Hi,

I am facing a problem it seems this guy from the email above also had, i just wonder what is the answer.

My problem is that i want to create a multiple level CA ...
RootAuthority RA  ....
CertAuthority CAx ...
Users

Thus, RA signs certs for CAx
CAx issue certs for users, hostname, etc.

I add the RA (root) cert to the browser, or provide it to the openssl verify function.
The user cert (for bob) contains: bobs cert and CAx cert, thus creating a chain.
* The verify function (For user cert Bob), will fail with:
error 20 at 0 depth lookup:unable to get local issuer certificate

* And the browser (firefox, for example), will not be able to follow up the chain and tell that bob's cert is trusted.

The RA cert is issued with CA:true, pathlen:1
The CAx certs are issued with CA:true, pathlen:0 (only able to sign end user certs).

How can i fix this? what is wrong?
What am i missing?

Tks in advance,

Cesc

On 6/20/05, David Busby <[EMAIL PROTECTED]> wrote:
Gurus,
   Two questions (perhasp I should have split this)

#1  When I look at Thawte or VeriSign certs that a server has there is a heirichy, Thawte then Me or VeriSign then Me.
Well I made my on CA and signed some certs but they don't have the heirichy like the commercial ones.  What gives?  Do I
need to make a root CA, then another CA signed by root then sign the certs with the second one?

/djb
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to