On Wed, Nov 26, 2003, Anthony Neal wrote:

> Hello,
> 
> Recently our requirements have changed from using an in-house
> experimental CA to using a single self-signed certificate.  I have used
> the command:
> 
> openssl req -config config.cnf -x509 -newkey rsa -out servercert.pem
> -outform PEM -keyout serverkey.pem -nodes
> 
> to generate said certificate.  My config file contains:
> 
> [ req ]
> default_bits        = 1024
> default_md          = md5
> x509_extensions     = root_ca_extensions
> 
> [ root_ca_extensions ]
> basicConstraints = CA:true
> subjectKeyIdentifier = hash
> authorityKeyIdentifier = keyid:always,issuer:always
> keyUsage = nonRepudiation, digitalSignature, keyEncipherment
> 
> 
> When I attempt to test this using openssl s_server and s_client, I note
> the following:
> 
> % openssl s_client -showcerts -CAfile servercert.pem
> CONNECTED(00000003)
> depth=0 /C=US/ST=Alabama/L=Huntsville/O=Mutable Realms Incorporated/...
> verify error:num=20:unable to get local issuer certificate
> verify return:1
> depth=0 /C=US/ST=Alabama/L=Huntsville/O=Mutable Realms Incorporated/...
> verify error:num=21:unable to verify the first certificate
> verify return:1
> 
> 
> Of course, s_client connects and is fine, but that is because it is
> ignoring this error - my application is not.
> 
> Can someone please point out what I'm doing wrong here?  Shouldn't
> providing the server's self-signed certificate in the CAfile suffice for
> establishing trust?
> 

If you want to use the keyUsage extension then try including keyCertSign as
well.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to