hello, Fred

easiest would be to insert the extension
crlDistributionPoints=URI:http://your.server.com/your.crl
in the section [usr_cert] of your working openssl.cnf.
If you need ldap-URIs, create a subsection for the URIs.

Best regards,
Michael

Am 2002-08-23 20:31 Uhr schrieb "Reimer, Fred" unter
<[EMAIL PROTECTED]>:

> Hello,
> 
> I'm definitely a newbie here, but I'm attempting to use OpenSSL with
> FreeS/WAN to connect a Linux box up to a Check Point VPN-1 NG FP-2 firewall.
> I created a CA (on a separate box) and used the CA cert to create an "OPSEC
> PKI" CA server object in the firewall.  Then I generated a request for the
> firewall and created a cert on the CA.  I also created a separate request
> for the Linux box and signed this, so the Linux box has it's key and cert in
> the /etc/ipsec.d directory and the firewall accepted the cert that was
> generated for it.  The problem, it appears is that the firewall doesn't know
> how to get a CRL for the CA, and apparently won't proceed without one.  This
> is the error it gives when the Linux box sends its cert over the IKE
> session:
> 
> 13:46:11 drop   1.1.1.1 >daemon src 2.2.2.2 dst 1.1.1.1 peer gateway
> 2.2.2.2scheme: IKE IKE: Main Mode No valid CRL.
> [EMAIL PROTECTED],CN=mack.ens.eclipsys.com,OU=IVNS,O=Eclip
> sys Corporation,ST=Georgia,C=US CookieI 3759eee447cec449 CookieR
> db05e82d36988563 methods: 3DES + MD5, RSA signatures community LinuxIntranet
> product VPN-1 & FireWall-1
> 13:46:11 keyinst 1.1.1.1 >daemon src 1.1.1.1 dst 2.2.2.2 peer gateway
> 2.2.2.2 scheme: IKE IKE: Main Mode Sent Notification: invalid certificate
> CookieI 3759eee447cec449 CookieR db05e82d36988563 community LinuxIntranet
> product VPN-1 & FireWall-1
> 
> I edited the openssl.cnf file so that nsCaRevocationUrl points to the
> correct URL for the CRL, which I generated and can get with wget, for
> instance.  After that I totally reconfigured everything, throwing away the
> whole directory structure for the CA, recreating a new CA and certificates,
> taking everything out of the firewall configuration and recreating a new CA
> with the new CA cert, replacing the keys on the Linux box, etc.  It still
> gives that error, and I don't see the URL for the CRL in any certificates.
> So, how does one specify where to get the CRL for a particular CA from?
> Apparently this is something that Check Point requires before accepting any
> certs...
> 
> 
> Thanks for any assistance!
> 
> - Fred
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

-- 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to