://old.nabble.com/CA-cert-installed-imported-but-they-are-not-trusted-tp28179665p28737639.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User
Did you check with openssll s_client ?
Just try openssl s_client -connect hostname:port -showcerts -CAfile
CAceritificate
Regards
Arava
On Thu, Apr 8, 2010 at 7:25 PM, Götz Reinicke - IT Koordinator
goetz.reini...@filmakademie.de wrote:
Hallo and one more thing,
recently I started to set
Hi,
not yet. I'm still not total familier with the different checking
methods. So thanks for your suggestion.
ldap master - ldap slave
[r...@ldap1 ~]# openssl s_client -connect ldap2.filmakademie.de:389
-showcerts -CAfile /etc/openldap/CA_falu/CA.pem
CONNECTED(0003)
5063:error:140790E5:SSL
On Apr 9, 2010, at 3:02 AM, Götz Reinicke - IT Koordinator wrote:
[r...@ldap1 ~]# openssl s_client -connect ldap1.filmakademie.de:389
-showcerts -CAfile /etc/openldap/CA_falu/CA.pem
CONNECTED(0003)
5066:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
failure:s23_lib.c:188:
What
Hallo and one more thing,
recently I started to set up a master/slave OpenLDAP system with
tls/certs. (Red Hat 5.x, openssl-0.9.8e-12, openldap-2.3.43-3 )
For that pourpose I set up a CA, generated certs, requests and keys,
installed tham on the corresponding servers and my OS X client and my
On Apr 8, 2010, at 6:55 AM, Götz Reinicke - IT Koordinator wrote:
So dose my local ldap client (Apache Directory Studio (ADS) on mac OS X
10.6.x ).
Nearly, because the servers and the ADS client both alert me, that I use
invalide certificates and the cerificate can't be validated.
But I