Hi guys,

I know it is really a frequently asked question but after a long time attempt I 
still cannot solve it, so any suggestion will be appreciated

My Chain Structure is like this:  hongdiz-root-ca --> hongdiz-ca1 --> 
hongdiz-router-1 

Upon verifying cert, it always failed between hongdiz-ca1 and hongdiz-router-1

>From previous mail threads and document, OpenSSL will first use subject/issuer 
>name to match cert, then Subject Key 
ID/Authority Key ID. Seems they are matched in my cert chain. I enclosed all 
the certs in attachment.

1. Verify hongdiz-root-ca --> hongdiz-ca1 --> hongdiz-router-1  [Failed]
[r...@hongdiz-server-1 hongdiz-router-1]# openssl verify -CAfile 
../hongdiz-root-ca/hongdiz-root-ca_cert.pem -untrusted 
../hongdiz-ca1/hongdiz-ca1_cert.pem hongdiz-router-1_cert.pem
hongdiz-router-1_cert.pem: 
/C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-router-1.crdc.cisco.com
error 20 at 0 depth lookup:unable to get local issuer certificate

2. Verify hongdiz-root-ca --> hongdiz-ca1 [OK]
[r...@hongdiz-server-1 hongdiz-router-1]# openssl verify -CAfile 
../hongdiz-root-ca/hongdiz-root-ca_cert.pem ../hongdiz-ca1/hongdiz-ca1_cert.pem
../hongdiz-ca1/hongdiz-ca1_cert.pem: OK

3. Verify hongdiz-ca1 --> hongdiz-router-1 [Failed]
[r...@hongdiz-server-1 hongdiz-router-1]# openssl verify -CAfile 
../hongdiz-ca1/hongdiz-ca1_cert.pem 
../hongdiz-router-1/hongdiz-router-1_cert.pem
../hongdiz-router-1/hongdiz-router-1_cert.pem: 
/C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-router-1.crdc.cisco.com
error 20 at 0 depth lookup:unable to get local issuer certificate


4. OpenSSL Server/Client verify Failed (put hongdiz-root-ca cert and 
hongdiz-ca1 cert into ca-chain.pem)
[r...@hongdiz-server-1 hongdiz-router-1]# openssl s_server -cert 
hongdiz-router-1_cert.pem -key hongdiz-router-1_key.pem -CAfile ../ca-chain.pem
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MHUCAQECAgMBBAIAOQQgIKlqp1dJzX9YCO1IF8XOIrS7COcmwKcb7/AYeTP+1xgE
MO7GI9I3jTWuYTmcPrvBWuIaJWXMYyDDh68MQDXCetdAqDiOcOkRhbuZlKi7gbCG
CaEGAgRMYV4MogQCAgEspAYEBAEAAAA=
-----END SSL SESSION PARAMETERS-----
Shared 
ciphers:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA:CAMELLIA256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:DHE-RSA-SEED-SHA:DHE-DSS-SEED-SHA:SEED-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-SHA:CAMELLIA128-SHA:RC4-SHA:RC4-MD5:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-RC4-MD5
CIPHER is DHE-RSA-AES256-SHA

[r...@hongdiz-server-1 OpenSSL]# openssl s_client -connect localhost:4433 
-CAfile ca-chain.pem
CONNECTED(00000003)
depth=0 /C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-router-1.crdc.cisco.com
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 /C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-router-1.crdc.cisco.com
verify error:num=27:certificate not trusted
verify return:1
depth=0 /C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-router-1.crdc.cisco.com
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
 0 s:/C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-router-1.crdc.cisco.com
   i:/C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-ca1.crdc.cisco.com
 1 s:/C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-ca1.crdc.cisco.com
   i:/C=CN/ST=Shanghai/L=A12/O=Cisco/OU=IPCBU/CN=hongdiz-root-ca.crdc.cisco.com
 2 s:/C=CN/ST=Shanghai/L=A12/O=Cisco/OU=IPCBU/CN=hongdiz-root-ca.crdc.cisco.com
   i:/C=CN/ST=Shanghai/L=A12/O=Cisco/OU=IPCBU/CN=hongdiz-root-ca.crdc.cisco.com
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-router-1.crdc.cisco.com
issuer=/C=CN/ST=Shanghai/O=Cisco/OU=IPCBU/CN=hongdiz-ca1.crdc.cisco.com
---
No client certificate CA names sent
---
SSL handshake has read 2752 bytes and written 279 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 1024 bit
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID: 20A96AA75749CD7F5808ED4817C5CE22B4BB08E726C0A71BEFF0187933FED718
    Session-ID-ctx:
    Master-Key: 
EEC623D2378D35AE61399C3EBBC15AE21A2565CC6320C387AF0C4035C27AD740A8388E70E91185BB9994A8BB81B08609
    Key-Arg   : None
    Krb5 Principal: None
    Start Time: 1281449484
    Timeout   : 300 (sec)
    Verify return code: 21 (unable to verify the first certificate)
---




 

                                          

Attachment: CA1.pem
Description: Binary data

Attachment: rootCA.pem
Description: Binary data

Attachment: router-1.pem
Description: Binary data

Reply via email to