On 9/13/10 2:58 PM, Paul B. Henson wrote:
On Mon, 13 Sep 2010, Chris wrote:

Be careful you are not checking the web server from a browser that has
the intermediate certificate installed.
I initially installed just the new cert on the web server, and the web
browsers were generating cert security errors. I then went back and added
the SSLCACertificateFile directive and the intermediate certs on the
server; at that point the web browsers were happy. This leads me to believe
the web server is correctly configured.
SSLCACertificateFile is an adjunct to SSLCACertificatePath, and thus is for statements about what CAs your system will accept for client authentication. The directive that does only what you want is SSLCertificateChainFile, which is an ordered collection of PEM-encoded intermediate certifiers which may or may not include the root. (The root *may* be provided. X.509 tends to rely on roots being pre-shared. For various reasons, I believe that it is useful to send to the client, including the possibility of root certificate-update with the same keypair -- there's no reason not to share that information unless dissemination of the root's public key is by policy to be restricted for some reason.)

-Kyle H

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to