> Reply-to: openssl-users@openssl.org
> X-Sender: Victor Duchovni
> <[EMAIL PROTECTED]>
> X-List-Manager: OpenSSL Majordomo [version 1.94.5]
> X-List-Name: openssl-users
> Content-Length: 4899
> 
> On Tue, Apr 08, 2008 at 08:43:51PM -0400, Big BDI
> wrote:
> 
> > Is something wrong with my certificates(Pasted
> below)?
> > I generated them with ECCcertgen.sh bundled with
> > openssl...  Apache does not generate any errors.
> One
> > of my test keypairs is pasted below (I used a
> > secp521r1 curve, but I didn't change the comments.
> 
> > They still indicate secp160r1 or something like
> that).
> 
> The cert does not have basicConstraints or keyUsage
> bits. It is
> an X509 cert, not an X509v3 cert. Otherwise it looks
> fine.
> 
> Try this pair of CA cert/key and Server cert/key.
> Don't worry (for
> me), they are fresh random keys not used anywhere.
> Identically built
> certs work with TLS in pre-release Postfix 2.6. If
> these work better,
> perhaps the extentions are relevant. If so, you just
> need to craft
> a suitable extension section in the "conf" file.
> These use secp256r1
> (aka prime256v1).

Thank you for your suggestion, I was successful in
getting Firefox to connect with the addition of v3
extensions. In order to get it working, ECCcertgen.sh
and openssl.cnf was modified.  In openssl.cnf, the
[v3_ca] section of the file was copied and renamed to
[v3_server] and modified slightly. Some of the fields
may not belong, adjust them to your liking:

Added to openssl.cnf:

[ v3_server ]
subjectKeyIdentifier=hash

authorityKeyIdentifier=keyid:always,issuer:always

basicConstraints = critical,CA:false

keyUsage = critical, nonRepudiation, digitalSignature,
keyEncipherment, dataEncipherment

nsCertType = server

issuerAltName=issuer:copy

Added to ECCcertgen.sh:
-Make sure it points to your preferred openssl.cnf,
openssl locations, and output dir locations.
-Edit the curve type, files names, O, OU, CN, 
settings to your liking.

Add "-extensions v3_server \" to the server signing
section -->
$OPENSSL_CMD x509 -req -days $DAYS \
    -extfile $OPENSSL_DIR/apps/openssl.cnf \
    -extensions v3_server \
    -in $CERTS_DIR/$TEST_SERVER_FILE.req.pem \
    -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
    -CAkey $KEYS_DIR/$TEST_CA_FILE.key.pem \
    -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem
-CAcreateserial

Add it to the client signing section as well -->
$OPENSSL_CMD x509 -req -days $DAYS \
    -extfile $OPENSSL_DIR/apps/openssl.cnf \
    -extensions v3_server \
    -in $CERTS_DIR/$TEST_CLIENT_FILE.req.pem \
    -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
    -CAkey $KEYS_DIR/$TEST_CA_FILE.key.pem \
    -out $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem
-CAcreateserial

After generating the new certs, Apache was running,
finally!  Thank you very much for your help.  

I had one last question; Will ECC support be added to
mod_ssl in the future?

Thanks again

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to