Please post the openssl x509 -noout -text output of your client certificate?

-Kyle H

On Wed, May 13, 2009 at 2:43 AM, Kent Tong <k...@cpttm.org.mo> wrote:
>
>
>
>> 'the' CA being a private or internal one, obviously.
>> (I assume this CA is also trusted by some/all people you communicate
>> with, otherwise you're not accomplishing anything by using it.)
>
> Yes, it is a private CA trusted by all people in our organization.
>
>> I'm not familiar with thunderbird, but how do you determine this?
>
> I can verify that by deleting the CA cert, then Thunderbird will say that my
> personal cert could not be verified.
>
>> It looks to me you did right. You could check by (re)displaying
>> each certfile with openssl x509 -text and verify that only
>> the validity and signature differ, and in particular any
>> attributes relating to keyusage are the same.
>
> Yes, I did. Only the validity and the signature algorithm. Just in case, I'm
> including them below.
>
>> When you 'install' the CAcert can you choose anything
>> about intended or allowed usage? Maybe some tickboxes?
>
> Yes, I checked "can identify web sites" and "can identify mail users".
>
>> Could thunderbird have cached some info about the old
>> CAcert that is now confusing it e.g. a fingerprint?
>
> I don't think so. Is it possible that the signed mails actually contain
> the full chain?
>
>> Could you redo from scratch by making a new install,
>> installing new-CAcert first, then your entity key+cert?
>> (Or on the active copy after a VERIFIED GOOD backup?)
>
> I've tried it on multiple computers with the same effect.
>
>> Also I wonder if the error message might be inaccurate.
>> That sometimes happens in software. Some other problems
>> I can think of that SHOULD be described differently are:
>>
>> - entitycert (separately) expired
>>
>> - entitycert doesn't actually chain correctly
>>
>> As a test, preferably on a copy on a scratch system,
>> could you put the old-CAcert back in, falsify the
>> system date, and check it (still) works?
>
> I'll try. Thanks.
>
>> It doubt it. Any decent software less than 10 years old
>> (and I'm pretty sure thunderbird satisfies that <G>)
>> should support SHA1, and if it didn't it should give a
>> quite different error message. But if you want to test,
>> just add -md5 to your x509 command line.
>
> Tried it and it didn't make any difference.
>
>
> Old cert:
> Certificate:
>    Data:
>        Version: 3 (0x2)
>        Serial Number: 0 (0x0)
>        Signature Algorithm: md5WithRSAEncryption
>        Issuer: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
>        Validity
>            Not Before: May 12 05:31:33 2004 GMT
>            Not After : May 11 05:31:33 2009 GMT
>        Subject: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
>        Subject Public Key Info:
>            Public Key Algorithm: rsaEncryption
>            RSA Public Key: (1024 bit)
>                Modulus (1024 bit):
>                    00:bc:e6:03:28:6b:54:83:c7:6e:f1:65:6e:bc:70:
>                    c1:9e:ee:6d:42:0f:84:14:e5:ee:a9:b6:ec:29:bd:
>                    39:78:cd:40:1c:5e:c0:0c:d0:5b:0b:7f:58:41:17:
>                    cb:ad:2a:f1:0e:fa:45:66:04:33:be:37:dd:ea:ac:
>                    ca:78:1b:49:3b:4f:b2:06:85:3c:69:87:e7:74:85:
>                    e9:91:ee:d0:b1:47:ac:78:a4:c6:ef:06:e2:fe:dd:
>                    22:2a:68:1f:b4:81:f3:9b:3a:ab:1b:9c:5e:46:56:
>                    cc:77:38:cc:a1:c3:0b:b0:f7:4c:ad:eb:90:6b:2c:
>                    10:bd:d4:cb:1d:99:c6:58:f7
>                Exponent: 65537 (0x10001)
>        X509v3 extensions:
>            X509v3 Subject Key Identifier:
>                B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1C
>            X509v3 Authority Key Identifier:
>
> keyid:B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1
> C
>                DirName:/C=MO/ST=Macau SAR/L=Macau/O=CPTTM/CN=CA
>                serial:00
>
>            X509v3 Basic Constraints:
>                CA:TRUE
>    Signature Algorithm: md5WithRSAEncryption
>        5f:c2:97:fb:ce:22:9d:2c:6e:b2:8b:e4:d4:c6:2e:15:e3:a5:
>        de:a2:d4:50:ee:9d:e0:df:c6:96:90:1e:56:00:b5:42:1c:be:
>        cc:de:8e:b5:50:35:72:50:d1:31:91:30:bd:ea:26:74:40:a8:
>        ee:fa:43:aa:70:b9:a1:23:d1:4c:9e:81:26:07:78:d9:77:a1:
>        e9:77:31:65:dc:ba:03:17:60:b4:9f:44:cb:5c:ac:8e:76:f3:
>        c8:d0:c0:fc:05:a0:6b:e3:d5:32:78:a4:b2:b6:71:e2:f6:95:
>        75:57:9a:79:f8:18:32:cc:05:ad:82:a9:b6:d3:85:d2:08:f1:
>        0b:10
>
> New cert:
> Certificate:
>    Data:
>        Version: 3 (0x2)
>        Serial Number: 0 (0x0)
>        Signature Algorithm: sha1WithRSAEncryption
>        Issuer: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
>        Validity
>            Not Before: May 11 09:28:37 2009 GMT
>            Not After : May  9 09:28:37 2019 GMT
>        Subject: C=MO, ST=Macau SAR, L=Macau, O=CPTTM, CN=CA
>        Subject Public Key Info:
>            Public Key Algorithm: rsaEncryption
>            RSA Public Key: (1024 bit)
>                Modulus (1024 bit):
>                    00:bc:e6:03:28:6b:54:83:c7:6e:f1:65:6e:bc:70:
>                    c1:9e:ee:6d:42:0f:84:14:e5:ee:a9:b6:ec:29:bd:
>                    39:78:cd:40:1c:5e:c0:0c:d0:5b:0b:7f:58:41:17:
>                    cb:ad:2a:f1:0e:fa:45:66:04:33:be:37:dd:ea:ac:
>                    ca:78:1b:49:3b:4f:b2:06:85:3c:69:87:e7:74:85:
>                    e9:91:ee:d0:b1:47:ac:78:a4:c6:ef:06:e2:fe:dd:
>                    22:2a:68:1f:b4:81:f3:9b:3a:ab:1b:9c:5e:46:56:
>                    cc:77:38:cc:a1:c3:0b:b0:f7:4c:ad:eb:90:6b:2c:
>                    10:bd:d4:cb:1d:99:c6:58:f7
>                Exponent: 65537 (0x10001)
>        X509v3 extensions:
>            X509v3 Subject Key Identifier:
>                B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1C
>            X509v3 Authority Key Identifier:
>
> keyid:B4:79:E5:05:D8:43:2D:E7:C2:C9:67:C7:44:03:30:AB:9A:E0:BD:1
> C
>                DirName:/C=MO/ST=Macau SAR/L=Macau/O=CPTTM/CN=CA
>                serial:00
>
>            X509v3 Basic Constraints:
>                CA:TRUE
>    Signature Algorithm: sha1WithRSAEncryption
>        ab:e3:08:e6:50:1b:1d:40:65:09:6b:d4:9c:bb:5a:01:4e:8f:
>        36:5e:5a:e6:8b:b0:2b:71:e5:b8:a3:eb:e2:fd:ba:01:01:b1:
>        52:4a:d7:e9:76:ad:8d:fd:14:13:46:f0:7d:e9:eb:88:8c:eb:
>        d3:4f:e5:92:28:36:03:28:f2:37:93:0d:8e:29:68:5b:98:92:
>        80:3f:20:99:47:1e:3a:0e:48:00:ca:ae:51:54:3b:90:51:54:
>        52:b9:7d:7c:75:6d:99:9e:73:27:50:1a:f2:eb:2f:4d:cd:8a:
>        5e:a8:1d:10:d2:42:7c:b7:ac:95:b8:47:55:f9:82:c8:17:61:
>        5f:f6
>
>
> -----
> --
> Kent Tong
> Wicket tutorials freely available at http://www.agileskills2.org/EWDW
> Axis2 tutorials freely available at http://www.agileskills2.org/DWSAA
> --
> View this message in context: 
> http://www.nabble.com/renewing-a-CA-tp23497730p23518626.html
> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to