This is the error I would get if the service email account wasn't
configured:

Error 690
Configuration Error. You must specify at minimum a mail account for the
CA (SERVICE_MAIL_ACCOUNT)!.

This is something else:

Error 700
General Error. Cannot encrypt PIN-mail! Aborting!

This is what I get in error.log of apache:

Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
unknown option -pubkey
req [options] <infile >outfile
where options  are
 -inform arg    input format - DER or PEM
 -outform arg   output format - DER or PEM
 -in arg        input file
 -out arg       output file
 -text          text form of request
 -noout         do not output REQ
 -verify        verify signature on REQ
 -modulus       RSA modulus
 -nodes         don't encrypt the output key
 -engine e      use engine e, possibly a hardware device
 -subject       output the request's subject
 -passin        private key password source
 -key file      use the private key contained in file
 -keyform arg   key file format
 -keyout arg    file to send the key to
 -rand file:file:...
                load the file (or the files in the directory) into
                the random number generator
 -newkey rsa:bits generate a new RSA key of 'bits' in size
 -newkey dsa:file generate a new DSA key, parameters taken from CA in
'file'
 -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)
 -config file   request template file.
 -subj arg      set or modify request subject
 -new           new request.
 -batch         do not ask anything during request generation
 -x509          output a x509 structure instead of a cert. req.
 -days          number of days a certificate generated by -x509 is valid
for.
 -set_serial    serial number to use for a certificate generated by
-x509.
 -newhdr        output "NEW" in the header lines
 -asn1-kludge   Output the 'request' in a format that is wrong but some
CA's
                have been reported as requiring
 -extensions .. specify certificate extension section (override value in
config file)
 -reqexts ..    specify request extension section (override value in
config file)
 -utf8          input characters are UTF8 (default ASCII)
Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
unknown option -pubkey
req [options] <infile >outfile
where options  are
 -inform arg    input format - DER or PEM
 -outform arg   output format - DER or PEM
 -in arg        input file
 -out arg       output file
 -text          text form of request
 -noout         do not output REQ
 -verify        verify signature on REQ
 -modulus       RSA modulus
 -nodes         don't encrypt the output key
 -engine e      use engine e, possibly a hardware device
 -subject       output the request's subject
 -passin        private key password source
 -key file      use the private key contained in file
 -keyform arg   key file format
 -keyout arg    file to send the key to
 -rand file:file:...
                load the file (or the files in the directory) into
                the random number generator
 -newkey rsa:bits generate a new RSA key of 'bits' in size
 -newkey dsa:file generate a new DSA key, parameters taken from CA in
'file'
 -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)
 -config file   request template file.
 -subj arg      set or modify request subject
 -new           new request.
 -batch         do not ask anything during request generation
 -x509          output a x509 structure instead of a cert. req.
 -days          number of days a certificate generated by -x509 is valid
for.
 -set_serial    serial number to use for a certificate generated by
-x509.
 -newhdr        output "NEW" in the header lines
 -asn1-kludge   Output the 'request' in a format that is wrong but some
CA's
                have been reported as requiring
 -extensions .. specify certificate extension section (override value in
config file)
 -reqexts ..    specify request extension section (override value in
config file)
 -utf8          input characters are UTF8 (default ASCII)
Using configuration from /usr/local/OpenCA/etc/openssl/openssl.cnf
Using configuration from
/usr/local/OpenCA/etc/openssl/openssl/CA_Admin.conf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :PRINTABLE:'Ziemowit Pierzycki'
organizationalUnitName:PRINTABLE:'Trustcenter'
organizationName      :PRINTABLE:'Teleformix LLC'
countryName           :PRINTABLE:'US'
serialNumber          :PRINTABLE:'01'
Certificate is to be certified until Apr 19 21:08:36 2003 GMT (365 days)

Write out database with 1 new entries
Data Base Updated
unable to write 'random state'
unable to write 'random state'
General Error Trapped 700: Cannot encrypt PIN-mail! Aborting! at
/usr/local/OpenCA/lib/functions/misc-utils.lib line 38.
Compilation failed in require at /home/httpd/cgi-bin/ca/ca line 193.

Also, I had to create a 'ln -s /home/httpd/htdocs/ca/
/home/httpd/htdocs/ca/ca' link because when I was trying to "issue the
certificate" browser came back with an error that it can't find
'pwd.html' page.

Could all of this be realted?

Chris

On Fri, 2002-04-19 at 11:04, Ziemowit (Chris) Pierzycki wrote:
> Just installed the new snapshot from today and I still get this error:
> 
> Error 700
> General Error. Cannot encrypt PIN-mail! Aborting!
> 
> Was this a bug or a openssl package problem?
> 
> Chris
> 
> 
> _______________________________________________
> Openca-Users mailing list
> [EMAIL PROTECTED]
> https://lists.sourceforge.net/lists/listinfo/openca-users



_______________________________________________
Openca-Users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to