On 04.10.23 22:44, mike tancsa wrote:
this fails with just the old-ca.crt

% openssl verify -show_chain -CAfile old-ca.crt -untrusted int.crt sentex-remote-only.crt
CN = sentex-remote-only
error 20 at 0 depth lookup: unable to get local issuer certificate
error sentex-remote-only.crt: verification failed

But works with the new ca or ca bundle of old and new

% openssl verify -show_chain -CAfile newca.crt  -untrusted int.crt sentex-remote-only.crt
sentex-remote-only.crt: OK
Chain:
depth=0: CN = sentex-remote-only (untrusted)
depth=1: CN = Sentex-remote-only CA


It should show the cross-signed certificate at depth 1 linking the new server certificate to the old CA at depth 2.

Would the old-ca.crt happen to limit the verification depth it may be used for (i.e., forbid itself to sign intermediaries), like this CA cert (Let's Encrypt's R3) does?

# openssl x509 -in chain.pem -noout -text | grep -B 1 CA:
            X509v3 Basic Constraints: critical
                CA:TRUE, pathlen:0

Kind regards,
--
Jochen Bern
Systemingenieur

Binect GmbH

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to