> From: owner-openssl-us...@openssl.org On Behalf Of DRings
> Sent: Tuesday, 05 June, 2012 13:15

> I have a restricted community application that seems a 
> perfect fit for using
> openssl to self-generate our own CA, and self-sign it, and 
> self-generate our
> own web client authentication certificate and self-sign them. 
> All this so
> that we can validate the Distinguished Name presented when web browser
> connecting to our nginx web server.
> 
If you use your own CA to issue/sign client certs, the client 
certs are not self-signed; they are signed by your CA.
The CA root is self-signed.

> I have done all this many times but have not been able to get 
> various web
> browsers to use the self-generated/self-signed client 
> authentication certs.
> 
> I have imported both the CA.crt and the client.crt into the 
> OS certificate
> store. But after that the web browser does not seem to use 
> the cert for
> authentication.
> 
What is in client.crt? If it's just the certificate, as the 
extension would indicate, that's wrong. The client (in general 
the authenticating party) needs a certificate AND KEY (more 
exactly a privatekey or keypair which includes the privatekey).

You don't say what your OS (or tool) is, but one common way 
of transporting a cert and key together is a PKCS#12 file, 
usually with extension .p12 or .pfx. There are other ways.

The other approach, which is usually considered better practice 
but can be more work, is to generate the keypair and CSR ON 
THE CLIENT, move the CSR to the CA which issues a cert, and 
move the cert back to the client and attach it to the keypair 
(may be called import or something else like update).

The clients I use don't need the CA cert to verify themself, 
but yours might. The server (system and/or app) definitely 
does need your CA.crt to verify the clients.
 
> I've tried to set the properties on the imported certificate 
> to be used for
> "web client authentication". - it just does not work!
> 
> I just cannot keep spending time on this problem. If I cannot 
> find help, I
> will urge the the requirement for client certs be dropped 
> from the project.
> 
> (personal lore) It seems that the web browsers fail because our
> self-generated/self-signed CA is not signed by some higher CA that is
> trusted. Is that true or false? 
> 
See above. If the SERVER also uses a cert signed by your CA, then 
the clients definitely do need the CA cert to verify the server.

> If it is false, I need help to overcome the failure of the 
> web browsers to
> correctly use our certs.
> 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to