Hi,
I try to run the NSS security tool (ssl test tools) (bin/selfserv.exe,
bin/client.exe). Because the X.509 is not fully understood, I don't know
where the problem is.
My operation steps are as follows:
1. create DB.
2. create one self-signed certificate for CA.
3. create a certifcate request, and sign a certifcate with the CA.
4. run "selfserv"(ssl server) with the first certificate.
5. run "client" (ssl client) with the second certificate.
The console gives me the following error information:
Launched thread in slot 0
Error in function PR_Write: -12276
- Unable to communicate securely with peer: requested domain name does not
match the server's certificate.
Error in function handle_connection: -12276
- Unable to communicate securely with peer: requested domain name does not
match the server's certificate.
Thread in slot 0 returned -1
I don't know the meaning of "domain name" here, could you give me any clue
for me to continue my reading.
Thank you in advance.
kind regards
chenyu
===========================
self-signed cerficate ASCII
C:\Documents and Settings\chenyu>certutil -L -d c:\test -n johnsmith
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2147307083 (0x7ffd4e4b)
Signature Algorithm: PKCS #1 MD5 With RSA Encryption
Issuer:
"CN=My Issuer"
Validity:
Not Before: Sun Sep 04 04:15:56 2005
Not After : Sun Dec 04 04:15:56 2005
Subject:
"CN=John"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
96:e4:46:d1:9a:b7:17:15:26:7b:ab:ba:3f:bd:7d:7a:
7e:db:c7:3b:f8:26:0f:f9:24:ed:07:60:af:04:72:8f:
b5:b2:c3:6a:94:22:ae:5d:eb:cc:ee:76:bc:db:3f:d6:
0a:33:d9:f1:6d:db:5e:b4:c9:7e:c9:02:6c:58:23:c0:
f5:79:f9:17:9e:24:61:70:5c:a5:61:e8:58:c8:4e:06:
01:39:b2:67:24:d5:cc:e0:f6:4a:e6:d1:bc:f1:a0:6e:
a6:9c:1b:39:66:40:42:01:94:d2:0a:81:61:32:d1:54:
2f:b9:ab:e1:4c:69:fb:04:e6:32:0e:1f:ce:77:f8:19
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 MD5 With RSA Encryption
Signature:
a2:3b:3d:2e:1b:b7:6a:ff:a3:1e:76:d1:c6:1e:a9:fa:
6b:41:5e:b6:7c:da:3f:27:cd:e9:7f:ec:51:97:8d:82:
5e:e9:bc:3f:c4:ff:30:6e:f5:a8:09:ae:0f:47:bd:bf:
fc:79:5b:56:cb:6e:1a:e5:0d:13:11:90:00:5b:e2:14:
82:31:06:da:18:4f:03:8b:57:2d:c4:fe:6d:3f:8c:1e:
1c:61:9b:bc:07:e1:6a:1a:dd:d9:e0:63:43:8f:a8:a5:
af:a1:aa:7e:ca:cf:bf:54:41:6d:2a:1a:24:61:7c:ac:
7d:c2:12:9b:fd:6e:81:b5:ba:72:0a:37:2d:fb:b3:de
Fingerprint (MD5):
AA:9C:DC:38:21:84:8B:CA:7C:74:A4:03:73:7E:CF:22
Fingerprint (SHA1):
4A:9C:77:AC:9A:15:B6:6E:CD:79:87:47:35:EA:05:CE:79:CB:FA:2C
Certificate Trust Flags:
SSL Flags:
Valid Peer
Trusted
User
Email Flags:
Valid CA
Trusted CA
User
Object Signing Flags:
Valid CA
Trusted CA
User
===========================
client certificate
C:\Documents and Settings\chenyu>certutil -L -d c:\test -n myissuer
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1234 (0x4d2)
Signature Algorithm: PKCS #1 MD5 With RSA Encryption
Issuer:
"CN=My Issuer"
Validity:
Not Before: Sun Sep 04 04:03:44 2005
Not After : Sun Dec 04 04:03:44 2005
Subject:
"CN=My Issuer"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b3:fc:84:54:db:40:23:f2:f2:d5:30:19:03:de:ec:53:
51:25:81:f9:58:a2:e4:bf:32:fe:0a:28:ca:0f:81:5c:
a5:c3:fa:81:be:72:4d:c2:a8:80:ca:93:11:44:4f:91:
17:50:d1:07:16:17:0c:b4:e7:42:9c:4f:5d:85:9f:f8:
91:62:bd:6b:18:68:11:4e:f5:54:95:6a:43:67:83:21:
13:ee:83:e8:9c:4d:13:90:f1:96:65:a1:06:25:67:e5:
37:ac:41:bf:ec:87:09:e2:d4:4b:a7:bb:91:33:5e:23:
e8:5a:5a:8e:99:04:bb:ad:a9:a1:84:3d:6d:50:13:87
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL Client,SSL Server,S/MIME,Object Signing,Reserved,SSL
CA,
/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with a maximum path length of 3.
Name: Certificate Key Usage
Data:
fe
(1 least significant bits unused)
Signature Algorithm: PKCS #1 MD5 With RSA Encryption
Signature:
60:a1:0e:cc:92:b4:46:2b:de:93:82:bf:03:a0:b7:dd:
b8:59:0b:20:38:c4:38:4d:f4:b8:bb:d7:a1:ab:c7:ea:
f1:2c:4b:7a:69:21:b6:12:1b:72:73:d0:d9:ab:9c:c1:
ea:41:9a:fa:c9:29:a3:b5:6b:23:c5:12:b4:0b:0a:0c:
a7:90:44:10:2d:4d:f5:0e:e6:6c:b8:8c:f0:e9:1f:4a:
f1:84:d1:f1:21:3a:dc:dd:b3:b8:80:d3:9b:0a:94:6d:
fa:cf:80:86:d0:ae:89:b1:6b:d2:b6:4a:17:0c:8c:9f:
d7:42:42:60:ca:d7:56:87:f2:7b:49:99:1a:e3:f5:5d
Fingerprint (MD5):
0C:3E:1E:D3:A5:88:BC:9B:8B:76:AC:B0:76:8D:19:4B
Fingerprint (SHA1):
F2:1E:EC:8D:70:0F:77:82:CD:0F:6E:89:E3:93:82:E4:BD:6C:CC:04
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
User
Email Flags:
Valid CA
Trusted CA
User
Object Signing Flags:
Valid CA
Trusted CA
User
_______________________________________________
mozilla-crypto mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-crypto