Federico, thank for quick answer.
I'm still not sure if it is necessary to install ROOT CA on all users computers.

I generated user certificate with such commands:
openssl req -newkey rsa:1024 -keyout user.key -config openssl.cnf -out user.req
openssl ca -config openssl.cnf -out user.crt -infiles user.req

And then I tried to generate pfx file with chaon (as i understand in
this case user will not need to install ROOT CA because this
certificate will be included into user's certificate). But I got an
error:

C:\temp\CA_NEW2>cs12 -export -chain -in user.crt -inkey user.key
-certfile CondorSigningCA/signing-ca.crt -out user.pfx
Loading 'screen' into random state - done
Enter pass phrase for user.key:
Error unable to get local issuer certificate getting chain.

Or in any case I need to install ROOT CA certificate and then user
certificate on any user's computer?

thanks,
--
Tanya.


On Thu, Feb 17, 2011 at 11:40 AM, Federico Berton
<federico.ber...@trivenet.it> wrote:
> Yes, regardless of the OS because it needs to know that you approve that your 
> home-made ROOT CA is credible.
>
>
> FEDERICO BERTON
> AREA SVILUPPO
>
> Via Europa, 20
> 35015 Galliera Veneta (PD)
> TEL. 049.9988200 FAX 049.9471337
> http://www.trivenet.it
>
>
> -----Messaggio originale-----
> Da: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
> Per conto di Tanya Lozovaya
> Inviato: giovedì 17 febbraio 2011 10:25
> A: openssl-users@openssl.org
> Cc: Federico Berton
> Oggetto: Re: Problem with multiple level CA
>
> No, should I?
> If I'm going to generate user keys-certificates that will be signed by 
> SIGNING CA certificate, should I force all users to install ROOT CA as 
> trusted certificate?
>
> On Thu, Feb 17, 2011 at 11:08 AM, Federico Berton 
> <federico.ber...@trivenet.it> wrote:
>> Have you added the ROOTCA certificate in the trusted root certificate?
>>
>> FEDERICO BERTON
>> AREA SVILUPPO
>>
>> Via Europa, 20
>> 35015 Galliera Veneta (PD)
>> TEL. 049.9988200 FAX 049.9471337
>> http://www.trivenet.it
>>
>>
>> -----Messaggio originale-----
>> Da: owner-openssl-us...@openssl.org
>> [mailto:owner-openssl-us...@openssl.org] Per conto di Tanya Lozovaya
>> Inviato: giovedì 17 febbraio 2011 09:49
>> A: d...@deadhat.com; openssl-users@openssl.org
>> Oggetto: Re: Problem with multiple level CA
>>
>> I tried to open crt file on different computers and I got different errors:
>>
>> on Windows 7: The issuer of this certificate could not be found.
>> on Windows 2003: This certificate has an nonvalid digital signature.
>>
>> Do anybody know how I can make the computers to "think" that self-signed 
>> "ROOT CA" certificate is valid (trusted) and it is the parent for "SIGNING 
>> CA"?
>>
>> Thanks,
>> --
>> Tanya.
>>
>> On Wed, Feb 16, 2011 at 10:19 PM,  <d...@deadhat.com> wrote:
>>> Yes, I used your config files.
>>>
>>> With Windows 2003 (Which is a version of Windows 2000), you don't
>>> have
>>> RSA2048 support, so it can't verify the signature.
>>>
>>> However if you verify the signature in openssl, it is fine, since
>>> openssl supports RSA2048.
>>>
>>> E.G.:
>>> [root@dj-desk1 ~]# openssl verify -CAfile root-ca.crt signing-ca.crt
>>> signing-ca.crt: OK
>>>
>>>
>>>
>>>> I use Windows 2003.
>>>>
>>>> Did you try my config files?
>>>>
>>>> Thanks,
>>>> --
>>>> Tanya.
>>>>
>>>> On Wed, Feb 16, 2011 at 8:15 PM,  <d...@deadhat.com> wrote:
>>>>> It worked for me.
>>>>>
>>>>> Are you using Windows XP? Except for a recent update, XP didn't
>>>>> support
>>>>> 2048 RSA.
>>>>>
>>>>> Regards,
>>>>> David
>>>>>
>>>>>
>>>>>> Hi guys,
>>>>>>
>>>>>> I have tried to configure multiple level CA structure: ROOT CA ->
>>>>>> SIGNING CA -> Users certificates I use RootSSL.cnf file and these
>>>>>> commands to generate root certificate:
>>>>>>       openssl genrsa -des3 -out root-ca.key 2048
>>>>>>       openssl req -new -x509 -days 3650 -key root-ca.key -out
>>>>>> root-ca.crt -config RootSSL.cnf
>>>>>>
>>>>>> In order to generate intermediate CA I use OpenSSL.cnf file and
>>>>>> these
>>>>>> commands:
>>>>>>       openssl genrsa -des3 -out signing-ca.key 2048
>>>>>>       openssl req -new -days 1095 -key signing-ca.key -out
>>>>>> signing-ca.csr -config openssl.cnf
>>>>>>       openssl ca -config openssl.cnf -name CA_root -extensions
>>>>>> v3_ca -out signing-ca.crt -infiles signing-ca.csr
>>>>>>
>>>>>> As the result I have OK root certificate, but I see error message
>>>>>> for signing certificate: "This certificate has an nonvalid digital
>>>>>> signature."
>>>>>>
>>>>>> Can somebody advise me what I do wrong?
>>>>>>
>>>>>> Thanks,
>>>>>> --
>>>>>> Tanya Lozovaya.
>>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>>
>>>> --
>>>> Tanya Lozovaya.
>>>>
>>>
>>>
>>
>>
>>
>> --
>> Tanya Lozovaya.
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>>
>
>
>
> --
> Tanya Lozovaya.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>



-- 
Tanya Lozovaya.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to