Hello, the FAQ "Why do browsers complain that they cannot verify my Verisign Global ID server certificate?" [1] shouldn't be Verisign specific, since at least Thawte is also using intermediate certs.
I've tried to generalize the FAQ entry. See the attached patch to the svn apache-docs. I'd be nice if the patch could be applied. Thanks, *t [1] http://httpd.apache.org/docs/trunk/ssl/ssl_faq.html#gid
Index: manual/ssl/ssl_faq.html.en =================================================================== --- manual/ssl/ssl_faq.html.en (Revision 1182246) +++ manual/ssl/ssl_faq.html.en (Arbeitskopie) @@ -207,7 +207,7 @@ <li><a href="#pemder">How can I convert a certificate from PEM to DER format?</a></li> <li><a href="#gid">Why do browsers complain that they cannot -verify my Verisign Global ID server certificate?</a></li> +verify my server certificate?</a></li> </ul> <h3><a name="keyscerts" id="keyscerts">What are RSA Private Keys, CSRs and Certificates?</a></h3> @@ -476,15 +476,23 @@ <h3><a name="gid" id="gid">Why do browsers complain that they cannot -verify my Verisign Global ID server certificate?</a></h3> -<p>Verisign uses an intermediate CA certificate between the root CA - certificate (which is installed in the browsers) and the server - certificate (which you installed on the server). You should have - received this additional CA certificate from Verisign. - If not, complain to them. Then, configure this certificate with the +verify my server certificate?</a></h3> +<p>One reason this might happen is because your server certificate is signed + by an intermediate CA. Various CAs, such as Verisign or Thawte, have started + signing certificates not with their root certificate but with intermediate + certificates.</p> + +<p>Intermediate CA certificates lie between the root CA certificate (which is + installed in the browsers) and the server certificate (which you installed + on the server). In order for the browser to be able to traverse and verify + the trust chain from the server certificate to the root certificate it + needs need to be given the intermediate certificates. The CAs should + be able to provide you such intermediate certificate packages that can be + installed on the server.</p> + +<p>You need to include those intermediate certificates with the <code class="directive"><a href="../mod/mod_ssl.html#sslcertificatechainfile">SSLCertificateChainFile</a></code> - directive. This ensures that the intermediate CA certificate is - sent to the browser, filling the gap in the certificate chain.</p> + directive..</p> </div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div> <div class="section">
--------------------------------------------------------------------- To unsubscribe, e-mail: docs-unsubscr...@httpd.apache.org For additional commands, e-mail: docs-h...@httpd.apache.org