Indeed. Downloading the intermediate CA bundle from Thawte and installing it as 
a chain certificate file into Apache did the trick!

Thank you very much,
Ron Arts



Op 12 jan. 2011 om 05:17 heeft "Dave Thompson" <dthomp...@prinpay.com> het 
volgende geschreven:

>> From: owner-openssl-us...@openssl.org On Behalf Of Ron Arts
>> Sent: Tuesday, 11 January, 2011 17:52
> 
>> I just renewed my Thawte webserver certificate. This 
>> certicifate seems to work fine
>> with various browsers I tried, but it curl, wget on CentOS 
>> 5.5 are not able to verify it:
> <snip>
>> I followed these instructions on the above page:
>> 
>> o openssl s_client -connect xxxxx.com:443 |tee logfile
>> o type "QUIT", followed by the "ENTER" key
>> o The certificate will have "BEGIN CERTIFICATE" and "END 
>> CERTIFICATE" markers.
> 
> That gets you the *server* (entity) cert, which is only useful 
> as a CAcert if the server cert is selfsigned, which yours isn't.
> Yours is actually at level 3, under (according to FF 3.5) 
> C=US, O=Thawte, Inc., CN=Thawte SSL CA
> C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c)
> 2006 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA
> 
> You need to either 1) put those *two* certs in your client cacert file 
> if not already there (OpenSSL always verifies the whole chain up to root) 
> or 2) have your server send the level2 cert as a 'chain' cert
> AND put the level1 cert in your client cacert file if not already there 
> 
> 
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to