Does it look for client cert chain by default in the home dir?
Looks like it's due to mutual authentication setup?

On Mon, Jun 4, 2012 at 4:24 AM, Eisenacher, Patrick <
patrick.eisenac...@bdr.de> wrote:

> > From: al so
> >
> > openssl s_client -showcerts -connect <TP.COM>:443
> > CONNECTED(00000003)
> > depth=1 /O=VeriSign Trust Network/OU=VeriSign, Inc./OU=VeriSign
> International Server CA - Class
> > 3/OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
> > verify error:num=20:unable to get local issuer certificate
> > verify return:0
> > 16747:error:14094412:SSL routines:SSL3_READ_BYTES:sslv3 alert bad
> certificate:s3_pkt.c:1093:SSL alert number 42
> > 16747:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
> failure:s23_lib.c:188:
>
> The error tells you that the server doesn't like your client cert chain.
>  As such, it sends a bad certificate alert. You should check the server's
> log for any details.
>
>
> HTH,
> Patrick Eisenacher
>

Reply via email to