John Mancuso wrote:
I followed the exact procedure below numerous times with the same
frustrating error:
http://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_SSL-Using_certutil.html#certutil-procedure
!481 $ openssl verify cacert_core.asc
cacert_core.asc: /DC=tv/DC=freewheel/CN=CA
John Mancuso wrote:
That's what it was! thanks. Unfortunately going across subdomains was a no go
:
-12276 (Unable to communicate securely with peer: requested domain
name does not match the server's certificate.
I tried to generate a self signed wildcard (cn=*.mycompany.com) but no
luck
Two questions:
1. I have generated self-signed ssl/ca certs trying both the
certutil method from the redhat doc and also the standard openssl
x509 req -new method. After installing the certs and enabling secure
ldaps replication both result in
slapi_ldap_bind - Error: could not send bind request
On 09/08/2010 08:45 PM, John Mancuso wrote:
Two questions:
1. I have generated self-signed ssl/ca certs trying both the
certutil method from the redhat doc and also the standard openssl
x509 req -new method. After installing the certs and enabling secure
ldaps replication both result in
I followed the exact procedure below numerous times with the same
frustrating error:
http://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_SSL-Using_certutil.html#certutil-procedure
!481 $ openssl verify cacert_core.asc
cacert_core.asc: /DC=tv/DC=freewheel/CN=CA cert
error 18 at 0 depth