Hello Walter,

the problem is that the openssl.cnf file already include this line:

This is my file:

===
# OpenSSL configuration file.
#
 
# Establish working directory.
 
dir                                     = .
 
[ ca ]
default_ca                              = CA_default
 
[ CA_default ]
serial                                  = $dir/serial
database                                = $dir/certindex.txt
new_certs_dir                           = $dir/certs
certificate                             = $dir/cacert.pem
private_key                             = $dir/private/cakey.pem
default_days                            = 365
default_md                              = sha1
preserve                                = no
email_in_dn                             = no
nameopt                                 = default_ca
certopt                                 = default_ca
policy                                  = policy_match
 
[ policy_match ]
countryName                             = match
stateOrProvinceName                     = match
organizationName                        = match
organizationalUnitName                  = optional
commonName                              = supplied
emailAddress                            = optional
 
[ req ]
default_bits                            = 2048                  # Size of keys
default_keyfile                         = key.pem               # name of 
generated keys
default_md                              = sha1                  # message 
digest algorithm
string_mask                             = nombstr               # permitted 
characters
distinguished_name                      = req_distinguished_name
req_extensions                          = v3_req
 
[ req_distinguished_name ]
# Variable name                         Prompt string
#-------------------------        ----------------------------------
0.organizationName                      = Organization Name (company)
organizationalUnitName                  = Organizational Unit Name (department, 
division)
emailAddress                            = Email Address
emailAddress_max                        = 40
localityName                            = Locality Name (city, district)
stateOrProvinceName                     = State or Province Name (full name)
countryName                             = Country Name (2 letter code)
countryName_min                         = 2
countryName_max                         = 2
commonName                              = Common Name (hostname, IP, or your 
name)
commonName_max                          = 64
 
[ v3_ca ]
basicConstraints                        = CA:TRUE
subjectKeyIdentifier                    = hash
authorityKeyIdentifier                  = issuer:always
 
[ v3_req ]
basicConstraints                        = CA:FALSE
subjectKeyIdentifier                    = hash
===

Or is there anything wrong with this file ?


   Best Regards Marcus



Am 30.10.2013 um 19:05 schrieb Walter H. <walte...@mathemainzel.info>:

> Hello,
> 
> On 30.10.2013 18:17, Marcus Schmitt wrote:
>> I have one problem after I created a root-CA, intermediate-CA and a server 
>> certificate. After I configured my apache with the server cert, key and 
>> intermediate cert and importing the root-CA to firefox 24 I received the 
>> following error when I browse to the website:
>> 
>> Could not verify this certificate because it was signed using a signature 
>> algoritm that was disabled because that algorithm is not secure
>> 
>> 
>> I assume the reason for this error message is that I see "Certificate 
>> Signatore Algorithm" is "PKCS #1 MD5 With RSA Encryption" for the 
>> Intermediate Certificate and Server Certificate. For the root-CA I see "PKCS 
>> #1 SHA With RSA Encryption".
>> 
>> Unfortunately I was not able to find the reason for this issue, please find 
>> the lines I use below:
>> 
> The problem is not in one of these lines, it is in the config file openssl.cnf
>> openssl genrsa -des3 -out private/cakey.pem 2048 -config ./openssl.cnf
>> openssl req -new -x509 -nodes -days 3650 -key private/cakey.pem -out 
>> certs/cacert.pem -config openssl.cnf
>> 
>> openssl genrsa -des3 -out private/cakey.pem 2048 -config ./openssl.cnf
>> openssl req -new -sha1 -key private/cakey.pem -out csr/ica.csr -config 
>> ./openssl.cnf
>> openssl ca -config ./openssl.cnf -days 1825 -md sha1 -in ica.csr -out 
>> ica.crt -extensions v3_ca
>> 
>> openssl genrsa -des3 -out server.key 2048 -config ./openssl.cnf
>> openssl req -new -sha1 -key private/server.key -out csr/server.csr -config 
>> ./openssl.cnf
>> openssl ca -config ./openssl.cnf -days 730 -md sha1 -in server.csr -out 
>> server.crt
>> 
> look if you find there something similiar to
> 
> default_md = md5
> 
> change this to
> 
> default_md = sha1
> 
> and generate your certificates the same way as above
> 
> Greetings,
> Walter
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to