Dear all, 

When I connect to our printer server, the certificate is never verified 
correctly. When I specify the CA certificate file manually on the command 
line, it works though. The root certificate in question is installed, and 
everything looks correct to me. -> ???
 
Any help how to fix this would be greatly appreciated... for details see 
below.

Best, Andreas


========================== 1st try ============================


[EMAIL PROTECTED] ~ $ openssl s_client -connect srv609.tudelft.net:443
depth=1 /C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
verify error:num=20:unable to get local issuer certificate
verify return:0
CONNECTED(00000003)
---
Certificate chain
 0 s:/C=NL/postalCode=2628 BL/ST=Zuid Holland/L=Delft/streetAddress=Julianalaan 
134/O=TU Delft/OU=ICT/OU=EliteSSL/CN=srv609.tudelft.net
   i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
 1 s:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External 
CA Root
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=NL/postalCode=2628 BL/ST=Zuid 
Holland/L=Delft/streetAddress=Julianalaan 134/O=TU 
Delft/OU=ICT/OU=EliteSSL/CN=srv609.tudelft.net
issuer=/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
---
No client certificate CA names sent
---
SSL handshake has read 2619 bytes and written 324 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-MD5
Server public key is 1024 bit
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : RC4-MD5
    Session-ID: 521F0000C6654A45F30619B440C2810C415CFA91E2E6CF5EF34ADE1BBCE70600
    Session-ID-ctx: 
    Master-Key: 
7D2685A0C8D09F66BB5CF7140203C86010E320FE61043B19C253BCFA7E95F0E429E1683045AA742D5099833390A3408F
    Key-Arg   : None
    Start Time: 1203366089
    Timeout   : 300 (sec)
    Verify return code: 20 (unable to get local issuer certificate)
---


========== 2nd try with -CAfile=... ============================


[EMAIL PROTECTED] ~ $ openssl s_client -connect srv609.tudelft.net:443 -CAfile 
/etc/ssl/certs/AddTrust_External_Root.pem
depth=2 /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust 
External CA Root
verify return:1
depth=1 /C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
verify return:1
depth=0 /C=NL/postalCode=2628 BL/ST=Zuid 
Holland/L=Delft/streetAddress=Julianalaan 134/O=TU 
Delft/OU=ICT/OU=EliteSSL/CN=srv609.tudelft.net
verify return:1
CONNECTED(00000003)
---
Certificate chain
 0 s:/C=NL/postalCode=2628 BL/ST=Zuid Holland/L=Delft/streetAddress=Julianalaan 
134/O=TU Delft/OU=ICT/OU=EliteSSL/CN=srv609.tudelft.net
   i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
 1 s:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External 
CA Root
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=NL/postalCode=2628 BL/ST=Zuid 
Holland/L=Delft/streetAddress=Julianalaan 134/O=TU 
Delft/OU=ICT/OU=EliteSSL/CN=srv609.tudelft.net
issuer=/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST 
Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
---
No client certificate CA names sent
---
SSL handshake has read 2619 bytes and written 324 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-MD5
Server public key is 1024 bit
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : RC4-MD5
    Session-ID: 771500004C4A7AACD55CDC4E3087598FA12E6372AC21275C3AA9331DF32EBDA2
    Session-ID-ctx: 
    Master-Key: 
E3BA1AC0A3A74676861CB41B4EF15A9FCAAD65CFCA40C3FD24C8AD86FC2CA36BACE208D4DA856FC6968AA781E3BE99A7
    Key-Arg   : None
    Start Time: 1203370049
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---


================= CA certificate installation ======================

[EMAIL PROTECTED] /etc/ssl/certs $ openssl x509 -hash -noout -in 
AddTrust_External_Root.pem
3c58f906
[EMAIL PROTECTED] /etc/ssl/certs $ ls -l 3c58f906.0
lrwxrwxrwx 1 root root 26  3. Feb 20:18 3c58f906.0 -> AddTrust_External_Root.pem
[EMAIL PROTECTED] /etc/ssl/certs $ ls -l AddTrust_External_Root.pem
lrwxrwxrwx 1 root root 61  3. Feb 20:18 AddTrust_External_Root.pem -> 
/usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt
[EMAIL PROTECTED] /etc/ssl/certs $ ls -l 
/usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt
-rw-r--r-- 1 root root 1523  4. Mär 2007  
/usr/share/ca-certificates/mozilla/AddTrust_External_Root.crt
[EMAIL PROTECTED] /etc/ssl/certs $           

[EMAIL PROTECTED] /etc/ssl/certs $ openssl version -a
OpenSSL 0.9.8g 19 Oct 2007
built on: Sun Feb 17 01:46:36 CET 2008
platform: linux-elf
options:  bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) idea(int) 
blowfish(idx)
compiler: i686-pc-linux-gnu-gcc -fPIC -DOPENSSL_PIC -DZLIB_SHARED -DZLIB 
-DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN 
-DTERMIO -Wall -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DSHA1_ASM 
-DMD5_ASM -DRMD160_ASM -DAES_ASM -O2 -march=pentium-m -pipe 
-Wa,--noexecstack
OPENSSLDIR: "/etc/ssl"

Reply via email to