Somech,
The server side is using one .pem file like this:

<private key>
<the certificate>
<intermediate 1>
<intermediate 2>

The <intermediate 2> was signed by one root CA available at client
side and the two intermediate was supplied by the same root authority.
I think that I didn't forgot that.





On Tue, May 21, 2013 at 7:29 PM, Somesh Chakrabarti
<itsmesom...@gmail.com> wrote:
> Jorge,
>
> On the server, you can copy all the public certs i.e. the intermediates and
> the root into one PEM file. That will send everything down to the client.
>
> Best,
> Somesh
>
>
> On Tuesday, May 21, 2013, Jorge Ventura wrote:
>>
>> I have an application (server) that is working using SSLv23 with a
>> regular certificate. Now I have to use one chain of two intermediate
>> certificates but for any reason, openssl library is not sending the
>> chain and the only way to work correctly is when I inform to the
>> client side about the intermediate.
>>
>> If I am understanding correctly, as long as the client trust in the
>> last certificate, it will trust on all intermediate.
>>
>> Below is a result using the command "openssl s_client ...".
>>
>> The client has only the Equifax root certificate; all other GeoTrust
>> are intermediate. The file cacerts.pem in the command below has the
>> two intermediate informed to force the command to succeed but in the
>> real case, I don't have such information at client side.
>>
>> Because the client trust the connection when I inform the
>> intermediate, I suppose the server is not sending the intermediate,
>> only the first certificate in the chain and in this case the command
>> fail.
>>
>>
>> $ openssl s_client -connect 10.10.10.10:443 -verify 5 -state -CAfile
>> cacerts.pem
>> verify depth is 5
>> SSL_connect:before/connect initialization
>> SSL_connect:SSLv2/v3 write client hello A
>> SSL_connect:SSLv3 read server hello A
>> depth=3 /C=US/O=Equifax/OU=Equifax Secure Certificate Authority
>> verify return:1
>> depth=2 /C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
>> verify return:1
>> depth=1 /C=US/O=GeoTrust, Inc./CN=GeoTrust SSL CA
>> verify return:1
>> depth=0
>> /serialNumber=Tf20oDIbWDBfuhDWLEg4DfACRMOBnxA4/C=US/ST=Minnesota/L=Prior
>> Lake/O=ACME, INC/CN=www.acme.com
>> verify return:1
>> SSL_connect:SSLv3 read server certificate A
>> SSL_connect:SSLv3 read server done A
>> SSL_connect:SSLv3 write client key exchange A
>> SSL_connect:SSLv3 write change cipher spec A
>> SSL_connect:SSLv3 write finished A
>> SSL_connect:SSLv3 flush data
>> SSL_connect:SSLv3 read finished A
>> CONNECTED(00000003)
>> ---
>> Certificate chain
>>  0
>> s:/serialNumber=Tf20oDIbWDBfuhDWLEg4DfACRMOBnxA4/C=US/ST=Minnesota/L=Prior
>> Lake/O=ACME, INC/CN=www.acme.com
>>    i:/C=US/O=GeoTrust, Inc./CN=GeoTrust SSL CA
>> ---
>> Server certificate
>> -----BEGIN CERTIFICATE-----
>>     (the server certificate)
>> -----END CERTIFICATE-----
>>
>> subject=/serialNumber=Tf20oDIbWDBfuhDWLEg4DfACRMOBnxA4/C=US/ST=Minnesota/L=Prior
>> Lake/O=ACME, INC/CN=www.acme.com
>> issuer=/C=US/O=GeoTrust, Inc./CN=GeoTrust SSL CA
>> ---
>> No client certificate CA names sent
>> ---
>> SSL handshake has read 1539 bytes and written 447 bytes
>> ---
>> New, TLSv1/SSLv3, Cipher is AES256-SHA
>> Server public key is 2048 bit
>> Secure Renegotiation IS supported
>> Compression: NONE
>> Expansion: NONE
>> SSL-Session:
>>     Protocol  : TLSv1
>>     Cipher    : AES256-SHA
>>     Session-ID:
>> 5FB55650BEEAE091441A5CEF4047A0243EE9D57AE8F0485CC1F951E2E97CAE06
>>     Session-ID-ctx:
>>     Master-Key:
>>
>> 06B036B9D47B297D2086CB6370108BB60102CD0FD7649F92351E15324D96E8614C566BF9040296177E2BDCA0A189472C
>>     Key-Arg   : None
>>     Start Time: 1369178367
>>     Timeout   : 300 (sec)
>>     Verify return code: 0 (ok)
>> ---
>> read:errno=0
>> SSL3 alert write:warning:close notify
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to