Hello,
I have installed Openssl 0.9.8 in a Linux box. Then I've created my own CA (CA.sh -newca). Then, I create a certificate for a Windows machine, with CA.sh -newreq, then CA.sh -sign to sign it. Then I convert them into PKCS12 format to export to a Windows 2000 Professional machine. This p12 contains the personal key and the server certificate: /usr/local/ssl/misc# openssl pkcs12 -export -in newcert.pem -inkey newkey.pem -certfile demoCA/cacert.pem -out /tmp/client.p12

(some howtos explain that the key is in newreq.pem, but I've checked they are actually, at least for this version, in newkey.pem; actually if I try the former command with newreq.pem it complains about the missing private key).

Once under Windows, I import the file p12 under Root Certificate Authorities; Windows 2000 considers valid such CA certificate for all purposes.

Then, I import the p12 again as it contains the client key, under Personal certificates. But when I double click in it, it says that the certificate is invalid or the CA does not have authority to issue certificates. Hence I cannot use IPSEC with this certificate, as IPSEC complains of not having any valid certificate.

I've installed previously the High Encription package in Windows 2000 Professional box, so I don't understand the problem. The service pack is SP4, which, I think, it's the last available version.

Any help?

Thanks,
JL
begin:vcard
fn;quoted-printable:Jos=C3=A9 Luis G=C3=B3mez
n;quoted-printable;quoted-printable:G=C3=B3mez;Jos=C3=A9 Luis
email;internet:[EMAIL PROTECTED]
x-mozilla-html:TRUE
version:2.1
end:vcard

Reply via email to