Hi all,

I am still getting the same error:
7(Certificate Signature Failure)

@Sandeep : I am using following commands for server and client respectively.

openssl s_server -accept 9000 -cert ~/certs/server.pem
openssl s_client -connect localhost:9000

@Goetz - Well, I hope I am doing it. But maybe I dont get your point quite
clearly. This is what I do(names changed)

$> openssl ca -config openssl.my.cnf -policy policy_anything -out
certs/server.crt -infiles server.csr

I hope this is enough. But I dont provide any such argument of
certificates at the client end. Do I need to? However initially when I
encountered this error I created a several certificate for client.
Using the same procedure the way I created the server certificate.

@Dave : I think you have a same point as Goetz. I think we all are on
the same pitch but something somewhere is definitely wrong.

I am sorry that I took so much of time to reply. I was writing a small
code to test the same client/server communication. But no good.

Thank you everyone,
-Vishal



On Thu, Aug 20, 2009 at 7:56 PM, Dave Thompson <
dave.thomp...@princetonpayments.com> wrote:

> >       From: owner-openssl-us...@openssl.org On Behalf Of vishal saraswat
> >       Sent: Tuesday, 18 August, 2009 07:44
>
> >       I am sorry, I forgot to tell you that the final PEM I create
> > is composed of key and certificate both.
> >       cat server_key.pem server server_cert.pem > server.pem
> >       I read on some blogs that some server require both to be in one
> file
>
> > that why to be on safer side I started following this practice. I hope
> its
> fine.
>
> It's OK. OpenSSL commandline does not require this, but does allow it.
>
> >       Now I suppose that one a client is successfully connected
> > it should return me code as 0 and an OK message. Right?
> > But I get return value as 7(Certificate Signature Failure),
> > 21(Unable to verify the first certificate.)
>
> Signature failure? Not just "unable to get issuer"?
>
> To verify, any client does need to have available the CA cert
> that signed the cert the server uses. In the general case with
> the client on a different machine than the server this must be
> a copy, and thus you need to make sure the right file (version)
> gets copied, but for loopback testing you can use the same file(s).
>
> s_client supports two ways: a single file containing either one CAcert
> or several concatenated, specified with -CAfile; or a directory specified
> by -CApath that contains a file for each CA cert with its filename or
> a symlink to it using the hash of the cert's name, allowing lookup.
>
> In your earlier email s_client specified neither of these and should
> have gotten 20 unable to get local issuer cert (and 21 unable to verify).
> I think the only way you should get signature failure is if
> you give s_client a CAcert which is for the correct CA name
> but has a different public key. Perhaps, if you've tried this
> (sort of) test several times, the file from an earlier iteration.
>
> >       p.s. - Can I connect multiple s_client to a single s_server ?
>
> In sequence, but not concurrently. For that you need  a real server. <G>
>
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to