Hello Gurus, for last two years I was using SSL certificate for my web server, generated by TinyCA. As it has expired two days ago, I tried to renew it, but this is the error message I get:
===== /usr/bin/openssl ca -batch -passin env:SSLPASS -notext -config /home/grzes/.TinyCA/ca.my.com/openssl.cnf -name server_ca -in "/home/grzes/.TinyCA/ca.my.com/req/xxxxxx.pem" -days 365 -preserveDN -md md5 Using configuration from /home/grzes/.TinyCA/ca.my.com/openssl.cnf Error Loading extension section server_cert 11829:error:0E06D06C:configuration file routines:NCONF_get_string:no value:conf_lib.c:329:group=server_ca name=email_in_dn 11829:error:2207507C:X509 V3 routines:v2i_GENERAL_NAME_ex:missing value:v3_alt.c:432: 11829:error:22098080:X509 V3 routines:X509V3_EXT_nconf:error in extension:v3_conf.c:93:name=subjectAltName, value=dummy ===== Year ago the renewal procedure worked without problems, and I did not change the configuration of neither openssl nor TinyCA (at least in my awareness), so the only thing I suspect is that something has changed in behaviour of openssl (or, less probable, in TinyCA) during updates that was done in last year. Any idea? Currently I'm using openssl-0.9.8d and tinyca-2.0.7.5 on Gentoo. Here's /home/grzes/.TinyCA/ca.my.com/openssl.cnf: ===== [ ca ] default_ca = server_ca [ policy_client ] countryName = optional stateOrProvinceName = optional organizationName = optional organizationalUnitName = optional commonName = supplied emailAddress = optional [ policy_server ] countryName = optional stateOrProvinceName = optional organizationName = optional organizationalUnitName = optional commonName = supplied emailAddress = optional [ policy_ca ] [ req ] default_bits = 2048 default_keyfile = privkey.pem distinguished_name = req_distinguished_name attributes = req_attributes x509_extensions = v3_ca string_mask = nombstr req_extensions = v3_req [ req_distinguished_name ] countryName = Country Name (2 letter code) countryName_default = AU countryName_min = 2 countryName_max = 2 stateOrProvinceName = State or Province Name (full name) stateOrProvinceName_default = Some-State localityName = Locality Name (eg, city) 0.organizationName = Organization Name (eg, company) 0.organizationName_default = Internet Widgits Pty Ltd organizationalUnitName = Organizational Unit Name (eg, section) commonName = Common Name (eg, YOUR name) commonName_max = 64 emailAddress = Email Address emailAddress_max = 40 [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment [ req_attributes ] challengePassword = A challenge password challengePassword_min = 4 challengePassword_max = 20 unstructuredName = An optional company name [ v3_ca ] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer:always basicConstraints = critical,CA:true nsCertType = sslCA, emailCA issuerAltName = issuer:copy nsComment = "TinyCA Generated Certificate" subjectAltName = email:copy keyUsage = critical, keyCertSign [ crl_ext ] authorityKeyIdentifier = keyid:always,issuer:always [ server_ca ] dir = /home/grzes/.TinyCA/ca.my.com certs = $dir/certs crl_dir = $dir/crl database = $dir/index.txt new_certs_dir = $dir/newcerts certificate = $dir/cacert.pem serial = $dir/serial crl = $dir/crl.pem private_key = $dir/cacert.key RANDFILE = $dir/.rand x509_extensions = server_cert default_days = 365 default_crl_days = 30 default_md = md5 preserve = no policy = policy_server unique_subject = yes [ client_ca ] dir = /home/grzes/.TinyCA/ca.my.com certs = $dir/certs crl_dir = $dir/crl database = $dir/index.txt new_certs_dir = $dir/newcerts certificate = $dir/cacert.pem serial = $dir/serial crl = $dir/crl.pem private_key = $dir/cacert.key RANDFILE = $dir/.rand x509_extensions = client_cert default_days = 365 default_crl_days = 30 default_md = md5 preserve = no policy = policy_client unique_subject = yes [ ca_ca ] dir = /home/grzes/.TinyCA/ca.my.com certs = $dir/certs crl_dir = $dir/crl database = $dir/index.txt new_certs_dir = $dir/newcerts certificate = $dir/cacert.pem serial = $dir/serial crl = $dir/crl.pem private_key = $dir/cacert.key RANDFILE = $dir/.rand x509_extensions = server_cert default_days = 365 default_crl_days = 30 default_md = md5 preserve = no policy = policy_server unique_subject = yes [ client_cert ] basicConstraints = CA:FALSE nsCertType = client, email, objsign nsComment = "TinyCA Generated Certificate" subjectKeyIdentifier = hash authorityKeyIdentifier = keyid,issuer:always issuerAltName = issuer:copy subjectAltName = email:copy keyUsage = critical, digitalSignature, keyEncipherment [ server_cert ] basicConstraints = CA:FALSE nsCertType = server nsComment = "TinyCA Generated Certificate" subjectKeyIdentifier = hash authorityKeyIdentifier = keyid,issuer:always issuerAltName = issuer:copy subjectAltName = $ENV::SUBJECTALTNAMEIP ===== Thanks in advance, Grzes ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]