Yes, AKID has to identify the issuer of the issuer, and the issuer's serial 
number assigned by its issuer, if you plan to use the issuer/serial approach.

That tripped me up about a year ago, but when you think about it it makes 
sense: You need to identify the cert who's corresponding private key signed 
this one. You can do that by identifying the ISSUER of THAT cert, and THAT 
cert's serial number.


-----Original Message-----
From: owner-openssl-us...@openssl.org on behalf of Tomás Tormo
Sent: Thu 8/26/2010 12:08 AM
To: openssl-users@openssl.org
Subject: Re: Getting crazy with "error 20 at 0 depth lookup:unable to get local 
issuer certificate error" (I tried everything...)
 
>
> Firstly thank you for the extensive debug information
No!! Thank you very much for your quick answer/reply!!

> Specifically the authority key identifier of the EE certificate is incorrectly
> set, though it is set correctly for other certificates in the chain.

I've been checking the Authority key Identifier of all certificates and 
I think I know what you mean. I can see that all certificates (but root 
and EE) have:

- Subject Key Identifier of its parent
- *subject of the issuer of it's issuer (in case of racer.pem, the 
subject of Global.pem)*
- serial number of its parent

meanwhile the EE certificate has:

- Subject Key Identifier of its parent
- *subject of its parent*
- serial number of its parent

Is it the problem? Because It's a bit confusing for me... as far as I 
understand from the link you gave me (and the RFC 5280, which says 
practically the same),  the EE of a certificate chain must identify its 
parent by means of the AKID.

Following the openssl FAQ example, C certificate must identify the 
authority certificate B with the AKID. This can be done either by 
including *the subject key identifier of B* or *its issuer name and 
serial number* (of B?).

In my case, the EE certificate has the right subject key Identifier 
(racer's subject key identifier), right serial number (racer's serial 
number), but wrong issuer name (should be ACCamerfirma's subject instead 
of racer's serial number). Am I right? If one of the conditions is right 
(subject Key Identifier), shouldn't it validate anyway?


Thank you very much.


On 25/08/10 14:59, Dr. Stephen Henson wrote:
> On Wed, Aug 25, 2010, Toms Tormo wrote:
>    
>> Honestly, I have no idea what I'm doing wrong.. I've checked all the
>> requirements OpenSSL needs and the certificates fulfill them all...
>>
>> Could you please help me? I'm getting desperate...
>>
>>      
> Firstly thank you for the extensive debug information, all too often essential
> details are left out making it impossible to diagnose the problem.
>
> In your case checking the first CA against the rest succeeds while the EE
> certificate fails. That indicates a problem with the EE certificate.
>
> What you are hitting is mentioned here:
>
> http://www.openssl.org/support/faq.html#USER15
>
> Specifically the authority key identifier of the EE certificate is incorrectly
> set, though it is set correctly for other certificates in the chain.
>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>
>
>    


-- 
Un saludo,

Tomás Tormo Franco
Area de sistemas

INDENOVA S.L.
C/ Dels Traginers 14, 2º B
Polígono Vara de Quart
46014 Valencia
Tel. (34) 96 381 99 47
Fax. (34) 96 381 99 48

tto...@indenova.com
http://www.indenova.com

Descárguese gratuitamente el software eSigna Viewer para visualizar documentos 
firmados electrónicamente: http://www.indenova.com/eSignaViewer.php


Reply via email to