I'm attempting to use CA.pl on a Solaris 10 Sparc
system.  OpenSSL is provided on the distribution CD's
(OpenSSL 0.9.7d 17 Mar 2004).  I use the following
commands:

1.  CA.pl -newca
2.  CA.pl -newreq
3.  CA.pl -signreq      {problems at this step}

During the signreq, the program cannot open the CA
private key and produces a core file:

---------

Using configuration from /etc/sfw/openssl/openssl.cnf
Error opening CA private key
/etc/sfw/openssl/private/cakey.pem
20715:error:0E06D06C:configuration file
routines:NCONF_get_string:no
value:/on10/builds/on10_74l3/usr/src/common/openssl/crypto/conf/conf_lib.c:329:group=CA_default
name=unique_subject
20715:error:0200100D:system library:fopen:Permission
denied:/on10/builds/on10_74l3/usr/src/common/openssl/crypto/bio/bss_file.c:276:fopen('/etc/sfw/openssl/private/cakey.pem','r')
20715:error:20074002:BIO routines:FILE_CTRL:system
lib:/on10/builds/on10_74l3/usr/src/common/openssl/crypto/bio/bss_file.c:278:
unable to load CA private key
Signed certificate is in newcert.pem

------

The file "newcert.pem" is not created.

The CA private key apparently is contained in
"./demoCA/private/cakey.pem".

Should I use a custom openssl.cnf to fix this problem?
 Or modify CA.pl?

Thanks,

-David



--- "Dr. Stephen Henson" <[EMAIL PROTECTED]> wrote:

> On Tue, Nov 08, 2005, david kine wrote:
> 
> > In the book "Network Security with OpenSSL" on
> pages
> > 124-125 is a list of OpenSSL commands to create a
> root
> > CA, and a server CA signed with the root CA.
> > 
> > My question is, how would I use the openssl CA
> command
> > to revoke the server CA certificate by the root
> CA,
> > and generate a CRL?  
> > 
> > I have tried "openssl ca -revoke ....." and
> "openssl
> > ca -crl ......" without success.
> > 
> > ----
> > 
> > Here are the commands to create the root CA:
> > 
> > 1.  openssl req -newkey rsa:1024 -sha1 -keyout
> > rootkey.pem -out rootreq.pem
> > 
> > 2.  openssl x509 -req -in rootreq.pem -sha1
> > -extensions v3_ca -signkey rootkey.pem -out
> > rootcert.pem
> > 
> > 3.  cat rootcert.pem rootkey.pem > root.pem
> > 
> > And to create the server CA signed by the root CA:
> > 
> > 4.  openssl req -newkey rsa:1024 -sha1 -keyout
> > serverCAkey.pem -out serverCAreq.pem
> > 
> > 5.  openssl x509 -req -in serverCAreq.pem -sha1
> > -extensions v3_ca -CA root.pem -CAkey root.pem
> > -CAcreateserial -out serverCAcert.pem
> > 
> > 6.  cat serverCAcert.pem serverCAkey.pem
> rootcert.pem
> > > serverCA.pem
> > 
> 
> The 'ca -gencrl' option will only directly work on a
> CA that is generated by
> the 'ca' command. Some guides still tell you to
> create certificates manually
> using the 'x509' command.
> 
> If you can instead use the CA.pl script to generate
> the certificates then the
> revoke and gencrl options should work.
> 
> Alternatively if you need to use the existing
> certificates you can create the
> necessary structure with CA.pl -newca and give it
> the root CA certificate file
> when prompted.
> 
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys:
> see homepage
> OpenSSL project core developer and freelance
> consultant.
> Funding needed! Details on homepage.
> Homepage: http://www.drh-consultancy.demon.co.uk
>
______________________________________________________________________
> OpenSSL Project                                
> http://www.openssl.org
> User Support Mailing List                   
> openssl-users@openssl.org
> Automated List Manager                          
> [EMAIL PROTECTED]
> 



        
                
__________________________________ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to