Hi JJK

at 10.04.2014 09:27, Jan Just Keijser wrote:
> Hi Erich,
...>>
> glad to hear that this has been resolved. I agree that the error message
> is bogus, but this is what you get back from OpenSSL - and it's quite
> hard to tell whether this is due to a missing CA cert, an untrusted CA
> cert or whether it is simply a self-signed certificate. I guess it could
> be added as an extended check but it's not something you'd want to do
> for every client connecting to a server.

I did some digging in the error code and came up with

       if (subject)
         {
           /* Remote site specified a certificate, but it's not correct */
           msg (D_TLS_ERRORS, "VERIFY ERROR: depth=%d, error=%s: %s",
               ctx->error_depth,
               X509_verify_cert_error_string (ctx->error),
               subject);
         }

this is in ssl_verify_openssl.c and it shows that the error is simply 
the stuff returned from X509_verify_cert_error_string.

I _guess_ this is corresponding to the following error code

X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: self signed certificate in 
certificate chain
     the certificate chain could be built up using the untrusted 
certificates but the root could not be found locally.

It appears as if the ssl error string function throws an incomplete 
error String, it might be not that difficult to decode it and make it 
more clear.

cheers

Erich




------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to