dear Marco,

how could i insert certificate policies in a
certificate? using openssl 0.9.7 

like your certificate 

...

             X509v3 Certificate Policies: 
                 Policy: 2.16.840.1.113733.1.7.1.1
                   CPS: https://www.verisign.com/CPS
                   User Notice:
                     Organization: VeriSign, Inc.
                     Number: 1
                     Explicit Text: VeriSign's CPS
 incorp. by reference liab. ltd. (c)97 VeriSign
...

best regards

antonio






 --- Marco Rossi <[EMAIL PROTECTED]> escribió:

> 
> 
> --- "Dr. Stephen Henson" <[EMAIL PROTECTED]> wrote:
> 
> > On Tue, Sep 26, 2006, Marco Rossi wrote:
> > 
> > > Dear all,
> > > 
> > > I'd need to change my certificate purpose
> allowing
> > it to used for SSL client authentication.
> > > 
> > > I'm using openssl 0.9.8a on fedora core 5, I've
> > been following the man page about x509
> > http://www.openssl.org/docs/apps/x509.html
> > > at the section "TRUST SETTING". 
> > > 
> > > Before trying my cert purpose was
> > > # openssl x509 -in cert.pem -purpose
> > > Certificate purposes:
> > > SSL client : No
> > > SSL client CA : No
> > > SSL server : Yes
> > > SSL server CA : No
> > > Netscape SSL server : Yes
> > > Netscape SSL server CA : No
> > > S/MIME signing : No
> > > S/MIME signing CA : No
> > > S/MIME encryption : No
> > > S/MIME encryption CA : No
> > > CRL signing : Yes
> > > CRL signing CA : No
> > > Any Purpose : Yes
> > > Any Purpose CA : Yes
> > > OCSP helper : Yes
> > > OCSP helper CA : No
> > > 
> > > I issued the command 
> > > #  openssl x509 -in cert.pem -addtrust
> clientAuth
> > -setalias "clientAuth" -out trust.pem
> > > (not sure if -addtrust requires a "", but I
> tried
> > with "clientAuth" too with the same result)
> > > 
> > > But nothing changed
> > > 
> > 
> > It wont change. The purpose depends on the
> contents
> > of the extensions in the
> > certificate when it was created. If you look at:
> > 
> > openssl x509 -in cert.pem -text -noout
> > 
> > and compare that with the extensions lists
> mentioned
> > you may see why it SSL
> > client authentication isn't allowed. Then you need
> > to set the extensions
> > appropriately and create a new certificate.
> > 
> > If that doesn't help post the results of the above
> > command.
> > 
> > Steve.
> 
> Maybe I don't understand what -purpose shows:
> 
> If I issue the command you mention, I see on the
> field
> x509v3 extentions (ommiting the rest for brevity) 
> 
> #  openssl x509 -in cert.pem -noout -text
> <omit>
>  X509v3 extensions:
>             X509v3 Basic Constraints: 
>                 CA:FALSE
>             X509v3 Certificate Policies: 
>                 Policy: 2.16.840.1.113733.1.7.1.1
>                   CPS: https://www.verisign.com/CPS
>                   User Notice:
>                     Organization: VeriSign, Inc.
>                     Number: 1
>                     Explicit Text: VeriSign's CPS
> incorp. by reference liab. ltd. (c)97 VeriSign
> 
>             Netscape Cert Type: 
>                 SSL Server
>             X509v3 Extended Key Usage: 
>                 Netscape Server Gated Crypto, TLS
> Web
> Server Authentication, TLS Web Client Authentication
>             Authority Information Access: 
>                 OCSP - URI:http://ocsp.verisign.com
> 
>             X509v3 CRL Distribution Points: 
>                
>
URI:http://crl.verisign.com/Class3InternationalServer.crl
> <omit>
> 
> If i issue the command to the "-addtrust try"
> #  openssl x509 -in trust.pem -noout -text
> 
> <omit>
>  X509v3 extensions:
>             X509v3 Basic Constraints: 
>                 CA:FALSE
>             X509v3 Certificate Policies: 
>                 Policy: 2.16.840.1.113733.1.7.1.1
>                   CPS: https://www.verisign.com/CPS
>                   User Notice:
>                     Organization: VeriSign, Inc.
>                     Number: 1
>                     Explicit Text: VeriSign's CPS
> incorp. by reference liab. ltd. (c)97 VeriSign
> 
>             Netscape Cert Type: 
>                 SSL Server
>             X509v3 Extended Key Usage: 
>                 Netscape Server Gated Crypto, TLS
> Web
> Server Authentication, TLS Web Client Authentication
>             Authority Information Access: 
>                 OCSP - URI:http://ocsp.verisign.com
> 
>             X509v3 CRL Distribution Points: 
>                
>
URI:http://crl.verisign.com/Class3InternationalServer.crl
> 
>     Signature Algorithm: md5WithRSAEncryption
>        
>
79:b1:23:b2:5e:27:ce:a2:cb:1c:e2:0b:a0:c9:66:93:1e:30:
>        
>
d1:20:56:b5:77:c4:25:da:55:87:bd:0c:86:5c:12:47:d8:90:
>        
>
cb:de:fa:8a:d6:a1:6c:84:c3:29:5a:5f:d0:50:bf:d5:0f:fb:
>        
>
6c:10:bb:2d:a1:0a:ee:4a:9e:9f:70:03:e6:42:93:dd:2e:ca:
>        
>
a3:2e:90:4b:8b:c4:55:9b:8d:81:4e:74:fb:7e:fc:6d:dd:fb:
>        
>
9e:23:7d:53:e9:f8:0d:4e:6e:e2:7d:8d:1f:d0:81:74:2e:fc:
>        
>
ab:a6:ce:42:dc:d1:5b:25:c4:8b:98:3b:33:6a:e4:96:57:45:
>         c9:fe
> Trusted Uses:
>   TLS Web Client Authentication
> No Rejected Uses.
> Alias: clientAuth
> 
> But if I use -purpose on the cert 
> #  openssl x509 -in cert.pem -noout -purpose
> Certificate purposes:
> SSL client : No
> SSL client CA : No
> 
> Thanks,
> Marco Rossi
> 
> __________________________________________________
> Do You Yahoo!?
> Tired of spam?  Yahoo! Mail has the best spam
> protection around 
> http://mail.yahoo.com 
>
______________________________________________________________________
> OpenSSL Project                                
> http://www.openssl.org
> User Support Mailing List                   
> openssl-users@openssl.org
> Automated List Manager                          
> [EMAIL PROTECTED]
> 


__________________________________________________
Correo Yahoo!
Espacio para todos tus mensajes, antivirus y antispam ¡gratis! 
Regístrate ya - http://correo.espanol.yahoo.com/ 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to