That did it, works now.  I should have noticed that.  Thanks a lot!

-Anthony


"Dr. Stephen Henson" wrote:

> On Wed, Nov 26, 2003, Anthony Neal wrote:
>
> > Hello,
> >
> > Recently our requirements have changed from using an in-house
> > experimental CA to using a single self-signed certificate.  I have used
> > the command:
> >
> > openssl req -config config.cnf -x509 -newkey rsa -out servercert.pem
> > -outform PEM -keyout serverkey.pem -nodes
> >
> > to generate said certificate.  My config file contains:
> >
> > [ req ]
> > default_bits        = 1024
> > default_md          = md5
> > x509_extensions     = root_ca_extensions
> >
> > [ root_ca_extensions ]
> > basicConstraints = CA:true
> > subjectKeyIdentifier = hash
> > authorityKeyIdentifier = keyid:always,issuer:always
> > keyUsage = nonRepudiation, digitalSignature, keyEncipherment
> >
> >
> > When I attempt to test this using openssl s_server and s_client, I note
> > the following:
> >
> > % openssl s_client -showcerts -CAfile servercert.pem
> > CONNECTED(00000003)
> > depth=0 /C=US/ST=Alabama/L=Huntsville/O=Mutable Realms Incorporated/...
> > verify error:num=20:unable to get local issuer certificate
> > verify return:1
> > depth=0 /C=US/ST=Alabama/L=Huntsville/O=Mutable Realms Incorporated/...
> > verify error:num=21:unable to verify the first certificate
> > verify return:1
> >
> >
> > Of course, s_client connects and is fine, but that is because it is
> > ignoring this error - my application is not.
> >
> > Can someone please point out what I'm doing wrong here?  Shouldn't
> > providing the server's self-signed certificate in the CAfile suffice for
> > establishing trust?
> >
>
> If you want to use the keyUsage extension then try including keyCertSign as
> well.
>
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> OpenSSL project core developer and freelance consultant.
> Funding needed! Details on homepage.
> Homepage: http://www.drh-consultancy.demon.co.uk
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to