On Wed, Oct 08, 2008, Andrej Podzimek wrote:

>> Are any intermediate CA certificates involved?
>
> No. The CA is home-made, created using OpenSSL. It has a self-signed 
> certificate.
>
>> This command will dump all certificates received:
>> openssl s_client -connect hostname:portnum -showcerts
>
>       [EMAIL PROTECTED] ~]$ openssl s_client -connect my.server.address:5432 
> -showcerts
>       CONNECTED(00000003)
>       4386:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake 
> failure:s23_lib.c:188:
>

Hmmm.... Is that the right port for SSL/TLS if it is it looks like it isn't
just a a case of connecting to the right port to get an SSL/TLS connection. 
Might be some STARTTLS equivalent but I'm not sure what it is for that
application.

>
> As for the dates, I store all my certificates with the human-readable 
> preamble (the -text option used with x509). Dates are OK in all of them. I 
> dumped them again and got the same result.
>

It looks like an expired certificate is somehow being used. How isn't clear at
this stage. If you have CA certificates in directories or files make sure an
old one isn't in there.

The best I can suggest at this point is modifying OpenSSL or the application to
dump out any expired certificates to a temp file so you can see which one(s)
it is complaining about.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to