I've been at this for too many hours and too many web pages and I'm so close... 
I think I could use a little help over the final obstacle.

I'm trying to be my own CA and what I want to accomplish is to be able to sign 
web server certificates that are automatically accepted by our LAN users if 
they have the CA certificate installed.

My CA certificate verifies fine...
root@ubuntu:/etc/ssl# openssl verify cacert.pem
cacert.pem: OK

My host web server certificate (generated with the key removed) verifies fine...
root@ubuntu:/etc/ssl# openssl verify ubuntu/http.pem
ubuntu/http.pem: OK

I signed all the certificates that I generated with the CA key file that was 
used for the CA certificate.

and If I load either the DER or the PEM version of my self-signed CA into 
Firefox or Apple's Keychain access, I would expect that it should just be 
accepted (but it's not). Of course users can choose to 'accept' but I'm looking 
to get past that.

If someone can help me get over the hurdle, I would appreciate it.

The code I use to generate the web cert is...

openssl req -new -nodes \
    -out $CERTPATH/http.csr \
    -keyout $CERTPATH/http.key \
    -days 3650 \
    -config $CONFIG

openssl ca \
    -config $CONFIG \
    -policy policy_anything \
    -out $CERTPATH/http.pem \
    -infiles $CERTPATH/http.csr

TIA

-- 
Craig White ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  craig.wh...@ttiltd.com
1.800.869.6908 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ www.ttiassessments.com 

Need help communicating between generations at work to achieve your desired 
success? Let us help!

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to