Hello Lou,

my program should behave just like a browser, i.e. it should be capable of 
accepting certificates without having to install the root CA cert.

- Matthias Meixner

________________________________
Von: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
Im Auftrag von Lou Picciano
Gesendet: Donnerstag, 10. Februar 2011 16:47
An: openssl-users@openssl.org
Betreff: Re: Adding non-root certificates to the list of trusted certificates?

Matthias,

Generally, when you are 'accepting a cert' in the web browser, you are 
accepting that _server's_ cert, and not automatically saving the CA cert.

For a Certificate Authority of your own to be accepted, you'd have to manually 
install that CA's cert into the root store for that browser.

This, then, would allow SSL to verify the Server's cert against this 
newly-installed CA cert. Thus, your chain is tested.

Lou Picciano

----- Original Message -----
From: "Matthias Meixner" <mmeix...@hypercom.com>
To: openssl-users@openssl.org
Sent: Thursday, February 10, 2011 10:19:03 AM
Subject: Adding non-root certificates to the list of trusted certificates?


Hello!

When you connect to a webserver for which you do not have a trusted CA 
certificate, normally the browser allows you to permanently accept the 
certificate and continue.

How can this be done using OpenSSL? If I add this non-self-signed certificate 
to the list of trusted certificates (e.g. via CAfile), it is ignored and 
verification fails.
I have never had any success if the certificate chain was incomplete.

Example:
I have the following certificates:

   root-ca.cert -> ca.cert -> server.cert

The server uses server.cert as certificate.

If CAfile contains root-ca.cert, everything works fine.

However, if CAfile only contains server.cert verification fails. But this is 
exactly what most browsers allow: Just accept any certificate as long as the 
user has allowed to accept it.

So how can this be done using OpenSSL? Is there any option I can set? Or is 
there only the brute force way of using the verify callback, reading all the 
certificates from CAfile and comparing them manually with the server 
certificate?

Regards,

   Matthias Meixner

 ______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to