"Christopher L. Everett" <[EMAIL PROTECTED]> writes:

> Hello again:
> 
> I read the OSPKI book, which pointed me at the sign.sh 
> script which helped quite a bit.  I'm wondering if anyone can 
> help me with a few specifics.
> 
> So far, how I understand a certificate request gets signed
> is:
> 
> 1) put the CSR into a file.
> 
> 2) generate a configuration file that specifies:
> 
>    a) CA information, including which certificate
>    b) the subject DN
>    c) the certificate version (SSL v2, v3)
You must mean X.509 and X.509v3. SSL versions aren't
in certificates.

>    d) any certificate extensions (I'm still hazy on how to 
>       specify certificate extensions; also if I need to 
>       specify any for a cert that's coing to be a browser
>       client cert, and if so which ones)
>    e) any other information that's required (can someone fill 
>       me in on any other essential information for tha config 
>       file?)
> 
> 3) sign the request, a perlish way is
> 
>    my $cert = `\usr\local\bin\openssl ca -in cert.pem`;
>    
> 4) do whatever post processing (store it in a DB, etc) needs
>    to be done
> 
> 5) send it back to the user.
> 
> One more question: can Netscape SPKAC files be converted into
> other formats?
No. The signature makes this impossible. However, it's not necessary
since OpenSSL can be told to process SPKAC messages.

-Ekr
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to