Hi Ariel,

The simple answer to your questions is no. There is no way to workaround
this. Others have already explained why.

--
Mounir IDRASSI
IDRIX
http://www.idrix.fr

> Well, I'm trying to do SSL Client Authentication for my website. So I
> bought
> a wildcard cert from GoDaddy and it works pretty well to enable SSL on my
> site. But now I'm trying to use it for SSL Client Auth for my clients.
> Then
> I'm trying to sign, issue and validate client certificates using the one I
> bought to GoDaddy with NO results :( So I'm wondering if it's possible and
> if so, how?
>
> Btw, the cert I got from GoDaddy has "CA:false" in its extensions, does it
> mean that I can't use for the purpose I want? Is it possible, in some way,
> to create and sign client certificates using the one I got from GoDaddy?
> How
> can I include or create a chained root certificates in the certificates I
> provide/issue to my clients?
>
> Hope you can understand my issues.
>
> Thanks,
>
> - Ariel
>
> On Fri, Oct 22, 2010 at 6:04 PM, Eduardo Navarro
> <eduardo.nava...@live.com>wrote:
>
>> I think you can make your own CA, if you plan to only test this or want
>> to
>> have people you know and that know you, setup your root as trusted.
>>
>> If your purpose is just for using an SSL cert for a website you own,
>> then
>> you are basically better off just buying one from Verisign, Thawte,
>> whoever.
>>
>> If you plan to start your own SSL issuing service, then this is a
>> different
>> story, you will need to look at WebTrust compliance as a starting point.
>>
>> -Eduardo
>>
>> -----Original Message----- From: Mounir IDRASSI
>> Sent: Friday, October 22, 2010 2:26 PM
>> To: openssl-users@openssl.org
>> Subject: Re: error: unable to get local issuer certificate
>>
>>
>>
>> Hi Ariel,
>>
>> If you want to avoid browsers warning, your only option is to get a
>> valid certificate for your users from a commercial CA. You can get them
>> for free from StartSSL for example (http://www.startssl.com/).
>>
>> If you represent an organization, then you can try to qualify for the
>> intermediate CA programs offered by commercial CAs. This involves being
>> audited and vetted and this comes with some limitations. Of course, the
>> price for such a program can be very high depending on your needs.
>> I hope this clarifies things for you.
>>
>> Cheers,
>> --
>> Mounir IDRASSI
>> IDRIX
>> http://www.idrix.fr
>>
>> On 10/22/2010 7:03 PM, Ariel wrote:
>>
>>> Hi Dave, thanks for your reply but...
>>>
>>> On Thu, Oct 21, 2010 at 7:52 PM, Dave Thompson
>>> <dthomp...@prinpay.com<mailto:
>>> dthomp...@prinpay.com>> wrote:
>>>
>>>    >       From: owner-openssl-us...@openssl.org
>>>    <mailto:owner-openssl-us...@openssl.org> On Behalf Of Ariel
>>>    >       Sent: Thursday, 21 October, 2010 16:34
>>>
>>>    >       On Thu, Oct 21, 2010 at 12:44 AM, sandeep kiran p
>>>    <sandeepkir...@gmail.com <mailto:sandeepkir...@gmail.com>> wrote:
>>>    >               mydomain.com.crt is an End-Entity certificate and
>>>    not a CA
>>>    cert. <snip>
>>>
>>>    >       So basically you mean that I can't use "mydomain.com.crt"
>>>    to sign
>>>    and issue
>>>    > new certificates for my clients? I thought I can using the bundle
>>> or
>>>    intermediate
>>>    > one they provided to me. Sorry for my ignorance but I don't know
>>>    too much
>>>    > how does it work and this is annoying to me :S
>>>    >       I only want to generate and issue new certificates that my
>>>    clients
>>>    can install
>>>    > in their browsers and then provide it to me (SSL Client
>>>    certificate) when
>>>    they come
>>>    > to my site. Is this possible without having to create a
>>>    self-sign CA cert
>>>    that causes
>>>    > browsers to not recognize it as a valid CA? Can I provide a
>>> trusted
>>>    chained root
>>>    > with the certificates I'm trying to issue?
>>>
>>>    > [sandeep?] So you either need to get a CA cert from GoDaddy or
>>>    setup a
>>>    test CA
>>>    > on your own using OpenSSL. GoDaddy, I am sure would not provide
>>>    you with a
>>>    CA
>>>    > certificate as that would then empower you to <snip rest>
>>>
>>>    Do as sandeep said. Create your own private CA with OpenSSL. You
>>> issue
>>>    certs to clients (who request them) and set your server(s) to
>>>    trust your
>>>    private root and thus the certs presented by the clients. Your
>>> server
>>>    presents the cert issued to it under a real CA which the clients
>>>    trust.
>>>
>>> This means I need to create my own self-signed CA cert, right? And this
>>> is
>>> what I'm trying to avoid "Because there is no established trust
>>> hierarchy
>>> leading to a self-signed certificate, it is impossible to verify that a
>>> self-signed certificate is genuine." [1]
>>>
>>> I was reading here [2] because this is what I'm trying to do: SSL
>>> Client
>>> Authentication; but my problem is in how to setup or get a valid ca.crt
>>> that
>>> can use to sign and issue new client certificates and that will also
>>> validate properly.
>>>
>>> Is this possible?
>>>
>>> Thanks for your help,
>>>
>>> - Ariel
>>>
>>>
>>> [1]
>>> http://publib.boulder.ibm.com/infocenter/zos/v1r10/index.jsp?topic=/com.ibm.zos.r10.ikya100/intermed.htm
>>> [2]
>>> http://www.symantec.com/connect/articles/apache-2-ssltls-step-step-part-3
>>>
>>>    The only tricky bit is if your clients need to authenticate
>>> themselves
>>>    to some *other* server(s) besides yours. Then they need to be able
>>> to
>>>    select 'key/cert for Ariel' versus other, perhaps public,
>>> key/cert(s).
>>>    Your server should do SSL_[CTX_]set_client_CA_list to your private
>>>    root;
>>>    this will send a 'hint' to the client which cert to present --
>>>    although
>>>    it's up to the client to actually obey this hint, it's not
>>>    required to.
>>>
>>>    Plus of course you need to ensure that the people/machines you issue
>>>    certs to are in fact the ones you want as clients. Although if you
>>>    make a mistake, you can issue your own CRL(s) which your server
>>>    checks.
>>>    (And if it's convenient to put your CA on the same machine as your
>>>    server,
>>>    this greatly simplifies the CRL distribution procedure. <G?>)
>>>
>>>
>>>    ______________________________________________________________________
>>>    OpenSSL Project http://www.openssl.org
>>>    User Support Mailing List openssl-users@openssl.org
>>>    <mailto:openssl-users@openssl.org>
>>>    Automated List Manager majord...@openssl.org
>>>    <mailto:majord...@openssl.org>
>>>
>>>
>>>
>>> --
>>> Ariel Diaz Bermejo
>>> http://www.linkedin.com/in/adiazbermejo
>>>
>>>
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>>
>
>
>
> --
> Ariel Diaz Bermejo
> http://www.linkedin.com/in/adiazbermejo
>


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to