Erwann and Steve,

Thanks for all the comments.  Here're a new set of certs where I think
that I've taken care of the points raised by both of you.  I'd
appreciate your review.


This is the self-signed root CA cert.  It is now V3, and has the AKI and
SKI.  It still has "Digital Signature", as I wasn't sure about what to
do with that on the root CA cert:

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            c4:37:73:5a:6c:1e:82:64:58:50:5d:ff:8e:85:9e:33
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: [EMAIL PROTECTED], C=US, O=JimDept, OU=JimCo,
CN=ATEST7-ROOT-CA
        Validity
            Not Before: Mar  6 07:26:33 2005 GMT
            Not After : Mar  7 07:26:29 2013 GMT
        Subject: [EMAIL PROTECTED], C=US, O=JimDept, OU=JimCo,
CN=ATEST7-ROOT-CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):
                    00:a8:49:49:58:68:34:39:a7:47:6e:fa:ee:b1:7d:
.
<snip>
.
                    e8:8c:d9:fb:bf:11:53:91:25
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:TRUE
            X509v3 Key Usage: critical
                Digital Signature, Certificate Sign, CRL Sign
            X509v3 Authority Key Identifier: 
               
keyid:11:39:D5:7D:DA:50:4A:8B:69:50:6C:66:19:B1:50:E5:B1:65:99:7C

            X509v3 Subject Key Identifier: 
               
11:39:D5:7D:DA:50:4A:8B:69:50:6C:66:19:B1:50:E5:B1:65:99:7C
    Signature Algorithm: sha1WithRSAEncryption
        6e:28:ca:ca:15:fb:72:b7:02:05:2e:6c:48:b4:1d:a4:63:d6:
.
<snip>
.
        f2:5c


This is the subordinated CA cert, signed by the ROOT CA.  It is now V3
also, and has the AKI and SKI.  It does not have "Digital Signature":

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            14:88:38:8f:bc:9d:f6:51:6d:e6:40:b7:e8:e7:b6:f2
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: [EMAIL PROTECTED], C=US, O=JimDept, OU=JimCo,
CN=ATEST7-ROOT-CA
        Validity
            Not Before: Mar  6 07:30:41 2005 GMT
            Not After : Mar  4 07:27:05 2013 GMT
        Subject: [EMAIL PROTECTED], C=US, O=JimDept, OU=JimCo,
CN=ATEST7-SUBROOT-CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):
                    00:dc:ca:a8:d1:c8:41:91:82:91:fe:d8:c2:8d:2d:
.
<snip>
.
                    8c:b1:b2:de:b8:6c:7a:74:67
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE, pathlen:0
            X509v3 Key Usage: critical
                Certificate Sign, CRL Sign
            X509v3 Authority Key Identifier: 
               
keyid:11:39:D5:7D:DA:50:4A:8B:69:50:6C:66:19:B1:50:E5:B1:65:99:7C

            X509v3 Subject Key Identifier: 
               
65:BA:37:9D:CC:84:A8:2E:66:03:86:B9:0B:53:92:13:7F:95:3F:B8
    Signature Algorithm: sha1WithRSAEncryption
        16:67:f5:93:67:6b:c5:b3:84:5d:fc:1a:05:d4:1e:04:99:80:
.
<snip>
.
        86:0c:53:14:76:f5:b3:2b:e2:6a:78:f6:36:6e:55:21:b2:86:
        6d:20


Finally, just for completeness, this is a client cert that I created
from the subroot CA cert:

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            0a:ba:76:83:46:f0:87:10:18:b0:36:b6:98:5e:24:15
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: [EMAIL PROTECTED], C=US, O=JimDept, OU=JimCo,
CN=ATEST7-SUBROOT-CA
        Validity
            Not Before: Mar  6 07:54:13 2005 GMT
            Not After : Mar  1 07:27:49 2013 GMT
        Subject: [EMAIL PROTECTED], C=US, O=JimDept, OU=JimCo,
CN=USER30-ATEST7
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):
                    00:aa:b0:98:d9:66:4a:fa:7c:73:28:f3:fc:43:cd:
.
<snip>
.
                    53:84:c8:4c:60:f1:48:48:97:15:8e:85:89:5c:ad:
                    9a:aa:76:e7:a2:6b:2e:51:43
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Key Usage: critical
                Digital Signature
            Netscape Cert Type: 
                SSL Client
            X509v3 Authority Key Identifier: 
               
keyid:65:BA:37:9D:CC:84:A8:2E:66:03:86:B9:0B:53:92:13:7F:95:3F:B8

            X509v3 Subject Key Identifier: 
               
CE:C5:90:0C:70:67:2C:51:67:7D:62:9A:AE:15:56:7D:8D:89:8E:86
    Signature Algorithm: sha1WithRSAEncryption
        d6:9d:10:1e:ec:4c:e1:59:18:16:9b:75:7f:a9:48:12:d1:9e:
.
<snip>
.
        60:4b:9d:8e:ce:46:f6:fb:6c:0d:da:75:e3:63:87:0c:59:f4:
        73:f1

I think that except for possibly the "Digital Signature", these look ok?

The ROOT CA AKI matches the SKI, the SUB ROOT CA AKI matches the ROOT CA
SKI, and the client cert AKI matches the SUB ROOT CA SKI, which I think
is correct also?

I'm not so much concerned about the validity dates for now, because this
is just for a test configuration, but I pushed out the "Not After"
dates.  I probably should have brought the client cert date back, but I
was working on this late last night/early this morning :).

Thanks again, and looking forward to your comments/suggestions...

Jim
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to