Hello again: I read the OSPKI book, which pointed me at the sign.sh script which helped quite a bit. I'm wondering if anyone can help me with a few specifics.
So far, how I understand a certificate request gets signed is: 1) put the CSR into a file. 2) generate a configuration file that specifies: a) CA information, including which certificate b) the subject DN c) the certificate version (SSL v2, v3) d) any certificate extensions (I'm still hazy on how to specify certificate extensions; also if I need to specify any for a cert that's coing to be a browser client cert, and if so which ones) e) any other information that's required (can someone fill me in on any other essential information for tha config file?) 3) sign the request, a perlish way is my $cert = `\usr\local\bin\openssl ca -in cert.pem`; 4) do whatever post processing (store it in a DB, etc) needs to be done 5) send it back to the user. One more question: can Netscape SPKAC files be converted into other formats? --Christopher ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]