On Sat, Oct 29, 2005, Cesc wrote:

> Hi,
> 
> I am facing a problem it seems this guy from the email above also had, i
> just wonder what is the answer.
> 
> My problem is that i want to create a multiple level CA ...
> RootAuthority RA ....
> CertAuthority CAx ...
> Users
> 
> Thus, RA signs certs for CAx
> CAx issue certs for users, hostname, etc.
> 
> I add the RA (root) cert to the browser, or provide it to the openssl verify
> function.
> The user cert (for bob) contains: bobs cert and CAx cert, thus creating a
> chain.
> * The verify function (For user cert Bob), will fail with:
> error 20 at 0 depth lookup:unable to get local issuer certificate
> 
> * And the browser (firefox, for example), will not be able to follow up the
> chain and tell that bob's cert is trusted.
> 
> The RA cert is issued with CA:true, pathlen:1
> The CAx certs are issued with CA:true, pathlen:0 (only able to sign end user
> certs).
> 
> How can i fix this? what is wrong?
> What am i missing?
> 

See what you get from this command:

openssl verify -CAfile root.pem -untrusted intermediate.pem -purpose smimesign
                                        usercert.pem

If you get an error include the -issuer_checks debugging option.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to