On Mon, Feb 27, 2006, Brian Candler wrote:

> On Mon, Feb 27, 2006 at 01:41:33PM +0100, Dr. Stephen Henson wrote:
> > Since you didn't include the root CA it isn't possible to say why it isn't
> > excluded.
> > 
> > I notice the small serial numbers in the certificates and some invalid
> > extensions in there. I'd suggest using the CA.pl script (if you use OpenSSL
> > 0.9.8 get it from a recent snapshot: the included one is buggy) instead.
> 
> The root certificate is attached below. I also tried appending this to my
> server.example.com-cert.pem (so there were three certificates in all), but
> that didn't make a difference.
> 

Have you tried placing the sub CA in /etc/ssl/certs and running c_rehash on
that directory?

> Is it correct of me simply to concatenate the server certificate together
> with the sub-CA certificate and the root certificate? Or should TinyCA have
> created a certificate which incorporates the whole chain itself? Or does the
> application use some other mechanism to assemble the chain from the
> constituent certificates? I'm afraid I'm not sufficiently PKCS#7-savvy to
> know what a real certificate at the bottom of a chain should look like.
> 

It needs to have the whole chain visible somehow. Placing the subCA and root
CA in the trusted directory is one way. Concatenating them into a single file
and pointing to that using -CAfile is another.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to