[EMAIL PROTECTED] wrote:
> 
> Marc Jadoul wrote:
> >
> > Hi,
> >
> > >From RFC2246 (TLS V1.0)
> >
> >   certificate_list
> >        This is a sequence (chain) of X.509v3 certificates. The sender's
> >        certificate must come first in the list. Each following
> >        certificate must directly certify the one preceding it. Because
> >        certificate validation requires that root keys be distributed
> >        independently, the self-signed certificate which specifies the
> >        root certificate authority may optionally be omitted from the
> >        chain, under the assumption that the remote end must already
> >        possess it in order to validate it in any case.
> >
> > In mod_ssl there is a chain for client auhentication
> > (SSLCACertificatePath,
> > SSLCACertificateFile ), but i do not see where to configure the chain
> > for the server certificate.
> >
> > Is there somewhere a possibility to configure this chain to send with
> > the server certificate ?
> >
> 
> Isn't it the  SSLCACertificatePath ??
> 
> See ya,
> 

Yes ... and No. 

This problem has been resolved on the mod-ssl mailing list. Please read
it.
There is an open issue: This chain is also send to the client as
containing the trusted roots for client authentication.

Marc.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to