Well...
If by "trusted store" you mean my one cert file pointed to by
SSLCACertificateFile, then yes I added the Common Policy, SHA-1 Federal Root
CA and DoD Interoperability Root CA certs to the cert file on my development
site and increased the depth. I got a user with a long cert chain to try to
access the dev site and they could! But those with a short chain like myself
could not access the dev site any more.

Any thoughts?

Curtis N. Tammany


-----Original Message-----
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Dr. Stephen Henson
Sent: Thursday, May 03, 2012 12:57
To: openssl-users@openssl.org
Subject: Re: FAILED:unable to get local issuer certificate

On Thu, May 03, 2012, Tammany, Curtis wrote:

> > It sounds like some clients have the correct intermediate certificate(s)
> > installed and some do not.
> >
> > They should select the certificate, click the "view" button and see if
the
> > certificate path is complete (i.e. it says it is OK).
> 
> On systems (XP and some Win7) where the user can access the site the cert
chain is short:
> DoD Root CA2 -> DOD CA-24 -> Smith.John.1234567890
> 
> On the Windows 7 systems where the user CANNOT access the site, the cert
chain is long:
> Common Policy -> SHA-1 Federal Root CA -> DoD Interoperability Root CA 1
-> DoD Root CA2 -> DOD CA-24 -> Smith.John.1234567890
> 
> Users on those systems cannot access the site. If, however, I remove the
first three certs from their intermediate certification authorities list in
IE, the user can access the site.
> 
> Is there something I can so on my servers so that it will tolerate the
long cert chain?
> SSLVerifyDepth is currently set to 5. Increase to 6 or more?
> Do I need to add Common Policy, SHA-1 Federal Root CA and DoD
Interoperability Root CA certs to my cert file on the server?
> 

The way OpenSSL verify works is to try and build as much of the pathc as
possible from the peer and then try local storage, so you need "Common
Policy"
in your trusted store and increase the depth too.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to