Hello again:

I read the OSPKI book, which pointed me at the sign.sh 
script which helped quite a bit.  I'm wondering if anyone can 
help me with a few specifics.

So far, how I understand a certificate request gets signed
is:

1) put the CSR into a file.

2) generate a configuration file that specifies:

   a) CA information, including which certificate
   b) the subject DN
   c) the certificate version (SSL v2, v3)
   d) any certificate extensions (I'm still hazy on how to 
      specify certificate extensions; also if I need to 
      specify any for a cert that's coing to be a browser
      client cert, and if so which ones)
   e) any other information that's required (can someone fill 
      me in on any other essential information for tha config 
      file?)

3) sign the request, a perlish way is

   my $cert = `\usr\local\bin\openssl ca -in cert.pem`;
   
4) do whatever post processing (store it in a DB, etc) needs
   to be done

5) send it back to the user.

One more question: can Netscape SPKAC files be converted into
other formats?

  --Christopher
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to