> 'the' CA being a private or internal one, obviously. 
> (I assume this CA is also trusted by some/all people you communicate 
> with, otherwise you're not accomplishing anything by using it.)

Yes, it is a private CA trusted by all people in our organization.

> I'm not familiar with thunderbird, but how do you determine this?

I can verify that by deleting the CA cert, then Thunderbird will say that my
personal cert could not be verified.

> It looks to me you did right. You could check by (re)displaying 
> each certfile with openssl x509 -text and verify that only 
> the validity and signature differ, and in particular any 
> attributes relating to keyusage are the same.

Yes, I did. Only the validity and the signature algorithm. Just in case, I'm
including them below.

> When you 'install' the CAcert can you choose anything 
> about intended or allowed usage? Maybe some tickboxes?

Yes, I checked "can identify web sites" and "can identify mail users".

> Could thunderbird have cached some info about the old 
> CAcert that is now confusing it e.g. a fingerprint? 

I don't think so. Is it possible that the signed mails actually contain
the full chain?

> Could you redo from scratch by making a new install, 
> installing new-CAcert first, then your entity key+cert?
> (Or on the active copy after a VERIFIED GOOD backup?)

I've tried it on multiple computers with the same effect.

> Also I wonder if the error message might be inaccurate.
> That sometimes happens in software. Some other problems
> I can think of that SHOULD be described differently are:
> 
> - entitycert (separately) expired
> 
> - entitycert doesn't actually chain correctly 
> 
> As a test, preferably on a copy on a scratch system, 
> could you put the old-CAcert back in, falsify the 
> system date, and check it (still) works?

I'll try. Thanks.

> It doubt it. Any decent software less than 10 years old 
> (and I'm pretty sure thunderbird satisfies that <G>) 
> should support SHA1, and if it didn't it should give a 
> quite different error message. But if you want to test,
> just add -md5 to your x509 command line.

Tried it and it didn't make any difference.


Old cert:
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 0 (0x0)
        Signature Algorithm: md5WithRSAEncryption
        Issuer: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
        Validity
            Not Before: May 12 05:31:33 2004 GMT
            Not After : May 11 05:31:33 2009 GMT
        Subject: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):
                    00:bc:e6:03:28:6b:54:83:c7:6e:f1:65:6e:bc:70:
                    c1:9e:ee:6d:42:0f:84:14:e5:ee:a9:b6:ec:29:bd:
                    39:78:cd:40:1c:5e:c0:0c:d0:5b:0b:7f:58:41:17:
                    cb:ad:2a:f1:0e:fa:45:66:04:33:be:37:dd:ea:ac:
                    ca:78:1b:49:3b:4f:b2:06:85:3c:69:87:e7:74:85:
                    e9:91:ee:d0:b1:47:ac:78:a4:c6:ef:06:e2:fe:dd:
                    22:2a:68:1f:b4:81:f3:9b:3a:ab:1b:9c:5e:46:56:
                    cc:77:38:cc:a1:c3:0b:b0:f7:4c:ad:eb:90:6b:2c:
                    10:bd:d4:cb:1d:99:c6:58:f7
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1C
            X509v3 Authority Key Identifier:
               
keyid:B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1
C
                DirName:/C=MO/ST=Macau SAR/L=Macau/O=CPTTM/CN=CA
                serial:00

            X509v3 Basic Constraints:
                CA:TRUE
    Signature Algorithm: md5WithRSAEncryption
        5f:c2:97:fb:ce:22:9d:2c:6e:b2:8b:e4:d4:c6:2e:15:e3:a5:
        de:a2:d4:50:ee:9d:e0:df:c6:96:90:1e:56:00:b5:42:1c:be:
        cc:de:8e:b5:50:35:72:50:d1:31:91:30:bd:ea:26:74:40:a8:
        ee:fa:43:aa:70:b9:a1:23:d1:4c:9e:81:26:07:78:d9:77:a1:
        e9:77:31:65:dc:ba:03:17:60:b4:9f:44:cb:5c:ac:8e:76:f3:
        c8:d0:c0:fc:05:a0:6b:e3:d5:32:78:a4:b2:b6:71:e2:f6:95:
        75:57:9a:79:f8:18:32:cc:05:ad:82:a9:b6:d3:85:d2:08:f1:
        0b:10

New cert:
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 0 (0x0)
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
        Validity
            Not Before: May 11 09:28:37 2009 GMT
            Not After : May  9 09:28:37 2019 GMT
        Subject: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):
                    00:bc:e6:03:28:6b:54:83:c7:6e:f1:65:6e:bc:70:
                    c1:9e:ee:6d:42:0f:84:14:e5:ee:a9:b6:ec:29:bd:
                    39:78:cd:40:1c:5e:c0:0c:d0:5b:0b:7f:58:41:17:
                    cb:ad:2a:f1:0e:fa:45:66:04:33:be:37:dd:ea:ac:
                    ca:78:1b:49:3b:4f:b2:06:85:3c:69:87:e7:74:85:
                    e9:91:ee:d0:b1:47:ac:78:a4:c6:ef:06:e2:fe:dd:
                    22:2a:68:1f:b4:81:f3:9b:3a:ab:1b:9c:5e:46:56:
                    cc:77:38:cc:a1:c3:0b:b0:f7:4c:ad:eb:90:6b:2c:
                    10:bd:d4:cb:1d:99:c6:58:f7
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1C
            X509v3 Authority Key Identifier:
               
keyid:B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1
C
                DirName:/C=MO/ST=Macau SAR/L=Macau/O=CPTTM/CN=CA
                serial:00

            X509v3 Basic Constraints:
                CA:TRUE
    Signature Algorithm: sha1WithRSAEncryption
        ab:e3:08:e6:50:1b:1d:40:65:09:6b:d4:9c:bb:5a:01:4e:8f:
        36:5e:5a:e6:8b:b0:2b:71:e5:b8:a3:eb:e2:fd:ba:01:01:b1:
        52:4a:d7:e9:76:ad:8d:fd:14:13:46:f0:7d:e9:eb:88:8c:eb:
        d3:4f:e5:92:28:36:03:28:f2:37:93:0d:8e:29:68:5b:98:92:
        80:3f:20:99:47:1e:3a:0e:48:00:ca:ae:51:54:3b:90:51:54:
        52:b9:7d:7c:75:6d:99:9e:73:27:50:1a:f2:eb:2f:4d:cd:8a:
        5e:a8:1d:10:d2:42:7c:b7:ac:95:b8:47:55:f9:82:c8:17:61:
        5f:f6


-----
--
Kent Tong
Wicket tutorials freely available at http://www.agileskills2.org/EWDW
Axis2 tutorials freely available at http://www.agileskills2.org/DWSAA
-- 
View this message in context: 
http://www.nabble.com/renewing-a-CA-tp23497730p23518626.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to