I will try an ASN.1 decoder tomorrow. Thanks for the suggestion!

One thing I did try today was to have both servers generate their certificates 
using the same private key. Theoretically I would expect the two certs to then 
be exactly the same to the bit... I am not providing any domain or ip specific 
fields just so that I can do this comparison and made sure all other variable 
fields would be static. The only variable left should be my signing algorithm 
vs the one used my openssl's code. What I think I found was that the two certs 
were identical except for 4 bytes. There was a 0x05 and 0x00 following two 
fields in the open ssl generated cert. Each occurrence of these 2 bytes was 
following the signature algorithm identifier (in two places I think). These 4 
bytes were not in the non-open ssl cert. could this be my problem? Is there a 
significance to the 0x05 and 0x00? They seemed to be part of the enclosing 
structure that contained the signature alg id but not part of the id itself. At 
least according to wireshark. Are they necessary padding that I'm missing in my 
custom cert generation?

Like I said earlier, I'll try to attach the certs tomorrow. I really appreciate 
everybody's help!

CHAD

> On Jul 7, 2014, at 5:09 PM, "Ben Wilson" <b...@digicert.com> wrote:
> 
> You could try examining both PEM-encoded certificates using an ASN.1
> decoder, such as the one here - http://lapo.it/asn1js 
> 
> -----Original Message-----
> From: owner-openssl-us...@openssl.org
> [mailto:owner-openssl-us...@openssl.org] On Behalf Of Barbe, Charles
> Sent: Sunday, July 6, 2014 8:42 PM
> To: openssl-users@openssl.org
> Subject: Certificate problem
> 
> I'm having a problem with generating certificates and I'm wondering if
> anybody has any suggestions on where to look. 
> 
> I have the following certificates and associated private keys:
> 
> A - certificate A generated with one version of my software not using
> openssl B - certificate B generated with a new version of my software that
> does use openssl CA - a local certificate authority whose private key is
> used to sign both A and B
> 
> I can verify both A and B using openssl verify using CA as the cafile
> argument. 
> 
> However, when I install CA on a client and try to connect a web browser to
> my server running the two different versions of software, they complain that
> they cannot find the issuer with A but not with B. 
> 
> I have examined both certificates and cannot find anything different about
> them. As far as I can tell, the only difference is that B used openssl to
> generate the certificate and A used our own custom software. The odd thing
> to me is that openssl verify can verify both just fine. What are the web
> browsers doing different? I've tried chrome, Firefox and opera and all
> behave the same... Accepting B and rejecting A. 
> 
> Does anybody have any suggestions on where to look to figure this out? A
> tool to use?
> 
> I realize that actually attaching the certa might be helpful but I do not
> have them handy as I write this. Please let me know if that might help
> somebody help me figure this out. 
> 
> Thanks!
> 
> Chad. ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to