Be Nice ,......I am new

I Need Help with setting up CRL's
I run a small www site for a special group
I set up a Self signed CA

My Problem.......
each client has a cert that is checked
How do create a Proper crl cert
I tried..... but they still can log in

or MSIE says "cannot determine the validity of this certificate because
                        it cannot locate a valid certificate revocation list"

I  seem to get a many *.crl files, but not 1 file containing all crl's
How do i generate a crl for a distrbution point?
(eg-http://www.rabbits-r-us.com/ca.crl)
below is a script i made that revokes a crt and does rehash, and my .cnf
file ....Am i missing something??



#!/bin/sh
crt=$1
CATOP=./CA
CAKEY=./ca.key
CACERT=./ca.crt
REV="$openssl ca -gencrl $SSLEAY_CONFIG"
VERIFY="$openssl verify"
X509="$openssl x509"
openssl="/sbin/openssl"
     files=""
        ser=`echo $crt | sed -e 's;\.crt$;;'`
        csr=`echo $crt | sed 's;\.crt$;.csr;'`
        crl=`echo $crt | sed 's;\.crt$;.crl;'`
        files="$files $csr"
        echo "$files"
        echo "$ser: $crt"
$openssl ca  -verbose $SSLEAY_CONFIG -revoke ${CATOP}/certs/$crt
$openssl ca -verbose -gencrl $SSLEAY_CONFIG -batch -out
${CATOP}/crl/$crl -infiles ${CATOP}/newcerts/$csr
$openssl crl -text -in ${CATOP}/crl/$crl


./ca_rehash.make ${CATOP}/certs/ ${CATOP}/crl/ ${CATOP}

EOF

#
# OpenSSL configuration file.
HOME                    = .
RANDFILE                = $ENV::HOME/.rnd
oid_section             = new_oids
[ new_oids ]

####################################################################
[ ca ]
default_ca      = CA_default            # The default ca section

####################################################################
[ CA_default ]

dir             = ./CA                  # Where everything is kept
certs           = $dir/certs            # Where the issued certs are kept
crl_dir         = $dir/crl              # Where the issued crl are kept
database        = $dir/index.txt        # database index file.
new_certs_dir   = $dir/newcerts         # default place for new certs.

certificate     = $dir/ca.crt           # The CA certificate
serial          = $dir/serial           # The current serial number
crl             = $dir/crl/ca.crl               # The current CRL
private_key     = $dir/private/ca.key   # The private key
RANDFILE        = $dir/private/.rand    # private random number file

x509_extensions = usr_cert              # The extentions to add to the cert
default_days    = 365                   # how long to certify for
default_crl_days= 30                    # how long before next CRL
default_md      = md5                   # which md to use.
preserve        = no                    # keep passed DN ordering
policy          = policy_match

[ policy_match ]
countryName             = match
stateOrProvinceName     = match
organizationName        = match
organizationalUnitName  = optional
commonName              = supplied
emailAddress            = optional

[ policy_anything ]
countryName             = optional
stateOrProvinceName     = optional
localityName            = optional
organizationName        = optional
organizationalUnitName  = optional
commonName              = supplied
emailAddress            = optional

####################################################################
[ req ]
default_bits            = 1024
default_keyfile         = privkey.pem
distinguished_name      = req_distinguished_name
attributes              = req_attributes
x509_extensions = v3_ca # The extentions to add to the self signed cert
string_mask = nombstr

[ req_distinguished_name ]
countryName                     = Country Name (2 letter code)
countryName_default             = CA
countryName_min                 = 2
countryName_max                 = 2
stateOrProvinceName             = State or Province Name (full name)
stateOrProvinceName_default     = Ontario
localityName                    = Locality Name (eg, city)
localityName_default            = Newmarket
0.organizationName              = Organization Name (eg, company)
0.organizationName_default      = Rabbits R Us Technical Consulting
organizationalUnitName          = Organizational Unit Name (eg, section)
organizationalUnitName_default  = Tech
commonName                      = Common Name (eg, YOUR name)
commonName_max                  = 64
emailAddress                    = Email Address
emailAddress_default            = [EMAIL PROTECTED]
emailAddress_max                = 40

# SET-ex3                       = SET extension number 3

[ req_attributes ]
challengePassword               = A challenge password
challengePassword_min           = 4
challengePassword_max           = 20

unstructuredName                = An optional company name

[ usr_cert ]

basicConstraints=CA:FALSE
nsComment                       = "OpenSSL Generated Certificate"
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer:always

crlDistributionPoints=URI:http://www.rabbits-r-us.com/ca.crl
nsCaRevocationUrl               =http://www.rabbits-r-us.com/ca.crl
#nsBaseUrl
#nsRevocationUrl
#nsRenewalUrl
#nsCaPolicyUrl
#nsSslServerName

[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment

[ v3_ca ]
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = CA:true

[ crl_ext ]

# CRL extensions.
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.

# issuerAltName=issuer:copy
authorityKeyIdentifier=keyid:always,issuer:always

EOF

any Help would be Great

thanx in advance



[EMAIL PROTECTED]
            (\     /)
             \)_^_(/
             =(_T_)=
             _//  \
            ()_()  )
              \     \
             _/      (*)
             ((__((__/
Michael Harvey


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to