Hello,
unfortunately it did not work. But I think it's not a problem but a misconfiguration: I've checked my openssl.cnf and I've noticed a property called nsCertType, which, if not set, means every purpose but object signing. I think this could be the problem with my user certificates.

Could it be that my problem? From the screenshots (not included), I see that the CA certificate is, as explained, taken as valid, but the personal certificates although linked to the CA, are invalid: "This certificate issuer entity seems not authorized to issue certificates or it can not be used as a certificate for a final entity" (sorry, message actually is in Spanish, that's only a translation).

In the openssl.cnf file I've also seen other property: CA: which can be FALSE or TRUE. I've understood that FALSE is for certificates and TRUE for CA's. But it's under X509v3 properties. Should I convert the cacert.pem file into x509 format as some howto's suggest?

Kind regards
Jose

Dr. Stephen Henson wrote:

On Mon, Nov 28, 2005, Jos Luis Gmez wrote:

Hello,
I have installed Openssl 0.9.8 in a Linux box. Then I've created my own CA (CA.sh -newca). Then, I create a certificate for a Windows machine, with CA.sh -newreq, then CA.sh -sign to sign it. Then I convert them into PKCS12 format to export to a Windows 2000 Professional machine. This p12 contains the personal key and the server certificate: /usr/local/ssl/misc# openssl pkcs12 -export -in newcert.pem -inkey newkey.pem -certfile demoCA/cacert.pem -out /tmp/client.p12

(some howtos explain that the key is in newreq.pem, but I've checked they are actually, at least for this version, in newkey.pem; actually if I try the former command with newreq.pem it complains about the missing private key).

Once under Windows, I import the file p12 under Root Certificate Authorities; Windows 2000 considers valid such CA certificate for all purposes.

Then, I import the p12 again as it contains the client key, under Personal certificates. But when I double click in it, it says that the certificate is invalid or the CA does not have authority to issue certificates. Hence I cannot use IPSEC with this certificate, as IPSEC complains of not having any valid certificate.

I've installed previously the High Encription package in Windows 2000 Professional box, so I don't understand the problem. The service pack is SP4, which, I think, it's the last available version.

Any help?


Don't use CA.sh use CA.pl instead.

Don't import the PKCS#12 file under root authorities. Instead import
cacert.pem and it should be added as a trusted root.

Then when you later import the PKCS#12 file it should verify correctly.
Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]



begin:vcard
fn;quoted-printable:Jos=C3=A9 Luis G=C3=B3mez
n;quoted-printable;quoted-printable:G=C3=B3mez;Jos=C3=A9 Luis
email;internet:[EMAIL PROTECTED]
x-mozilla-html:TRUE
version:2.1
end:vcard

Reply via email to