How to add Postal code to a certificate request

2002-04-02 Thread Chandu

Hi,
I have a doubt regarding the addition of postal code or PIN code or ZIP code
to the certificate request.

How to add Postal code to a certificate request.  I tried to search for an
NID for the postal code but could'nt found.

What is the way to add the postal code to a certificate request??

Regards
Suram

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: create cert non interactively

2002-04-02 Thread Aleix Conchillo

On Tue, 2002-04-02 at 11:50, Sarath Chandra M wrote:
 Hi,
 Is there way to create certificates using openssl in a noninteractive
 mode ? All the required
 values (common name, email, organization, ou etc) will be captured using
 a unix shell script
 and passed to openssl commands.
 Is it possible. Any help will be highly appreciated.
  

i do it this way. there is probably a better one:

openssl req -new -key prikey.pem -out req.csr  info_file

where info_file is a generated file (in this case with your shell
script) and looks like this:

--
ES
Your state
Your city
Your organization
Your organizational unit
Your name
--

if you don't want to fill any of the fields just leave a blank line.

hope this helps.


best regards,

-- 
Aleix Conchillo Flaqué
http://www.scytl.com

 ---
  PGP Key: http://www.scytl.com/pgp-keys/AleixConchillo.asc
 ---

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: How to add Postal code to a certificate request

2002-04-02 Thread Joern Sierwald

At 15:25 02.04.2002 +0530, you wrote:
Hi,
I have a doubt regarding the addition of postal code or PIN code or ZIP code
to the certificate request.

How to add Postal code to a certificate request.  I tried to search for an
NID for the postal code but could'nt found.

What is the way to add the postal code to a certificate request??

Regards
Suram

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

Put it in an OID 2.5.4.17, postal code.

The postal code should also go into line 5 of the postal address, OID 2.5.4.16.

Line 1 object's RDN
Line 2 Street address or PO box
Line 3 no default value
Line 4 Physical Delivery Office Name, State or privince name
Line 5 Postal Code
Line 6 Country Name (from the DN)

See Recommendation F.401

Use google to search for 2.5.4.17 postal code

Jörn

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



OpenSSL + Java

2002-04-02 Thread Zamangoer, Ferruh

Hi all,

I'am writing a application in java , which allows the user to make a search
in LDAP-Server. My Problem is that I want to use a secure network connection
to communicate between the application and LDAP Server. I have install the
openssl , but I have not found an easy manual which describes what I have to
edit in the openssl.conf.
Can anybody help me?? 

thanks in advance for any help  

Ferruh
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: create cert non interactively

2002-04-02 Thread Chris Cleeland

On 2 Apr 2002, Aleix Conchillo wrote:

 On Tue, 2002-04-02 at 11:50, Sarath Chandra M wrote:
  Hi,
  Is there way to create certificates using openssl in a noninteractive
  mode ? All the required
  values (common name, email, organization, ou etc) will be captured using
  a unix shell script
  and passed to openssl commands.
  Is it possible. Any help will be highly appreciated.
 

 i do it this way. there is probably a better one:

 openssl req -new -key prikey.pem -out req.csr  info_file

 where info_file is a generated file (in this case with your shell
 script) and looks like this:

 --
 ES
 Your state
 Your city
 Your organization
 Your organizational unit
 Your name
 --

 if you don't want to fill any of the fields just leave a blank line.

You can also just modify the .conf file to not prompt, e.g., I have something
like this in a customized version of openssl.conf

[req]
...
prompt = no
...

[req_distinguished_name]
countryName = US
stateOrProvinceName = Missouri
localityName= STL
organizationName= FOO
organizationalUnitName  = BAR
commonName  = $ENV::cert_owner
emailAddress= $ENV::MAILADDR


This way I'm not prompted.  commonName and emailAddress take their values
from the environment variables cert_owner and MAILADDR, respectively.

If your CA private key has a passphrase, you can also use the -passin option
to provide the passphrase via a multitude of ways.

-cj

PS  BTW, I cobbled together this knowledge from docs/openssl.txt and the
various manpages (req, x509, etc.)

-- 
  Chris Cleeland, cleeland_c @ ociweb.com, http://www.milodesigns.com/~chris
 Principal Software Engineer, Object Computing, Inc., +1 314 579 0066
  Support Me Supporting Cancer Survivors in Ride for the Roses 2002
Donate at http://www.milodesigns.com/donate

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: create cert non interactively

2002-04-02 Thread Aleix Conchillo

On Tue, 2002-04-02 at 17:34, Chris Cleeland wrote:
 
 You can also just modify the .conf file to not prompt, e.g., I have something
 like this in a customized version of openssl.conf
 
[snip]

this way is just better :-)

-- 
Aleix Conchillo Flaqué
http://www.scytl.com

 ---
  PGP Key: http://www.scytl.com/pgp-keys/AleixConchillo.asc
 ---

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



FW: create cert non interactively

2002-04-02 Thread Sarath Chandra M

Dear friends, thanx a lot for the help.
I am doing this way.
A shell script to accept values for each attribute and put these in a
info.inf file.
Then do this :
openssl req -new -key prikey.pem -out req.csr  info.inf

thanx again.
sarath



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of Aleix Conchillo
Sent: Tuesday, April 02, 2002 2:05 PM
To: [EMAIL PROTECTED]
Subject: Re: create cert non interactively


On Tue, 2002-04-02 at 11:50, Sarath Chandra M wrote:
 Hi,
 Is there way to create certificates using openssl in a noninteractive 
 mode ? All the required values (common name, email, organization, ou 
 etc) will be captured using a unix shell script
 and passed to openssl commands.
 Is it possible. Any help will be highly appreciated.
  

i do it this way. there is probably a better one:

openssl req -new -key prikey.pem -out req.csr  info_file

where info_file is a generated file (in this case with your shell
script) and looks like this:

--
ES
Your state
Your city
Your organization
Your organizational unit
Your name
--

if you don't want to fill any of the fields just leave a blank line.

hope this helps.


best regards,

-- 
Aleix Conchillo Flaqué
http://www.scytl.com

 ---
  PGP Key: http://www.scytl.com/pgp-keys/AleixConchillo.asc
 ---

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: create cert non interactively

2002-04-02 Thread dreamwvr

On Tue, Apr 02, 2002 at 01:50:51PM +0400, Sarath Chandra M wrote:
 Hi,
 Is there way to create certificates using openssl in a noninteractive
 mode ? All the required
 values (common name, email, organization, ou etc) will be captured using
 a unix shell script
 and passed to openssl commands.
 Is it possible. Any help will be highly appreciated.
   Yes this is standard fare.. You take input   filter 
redirect to another program.. wait for success and 
   then return.. Hope that helps.

Best Regards,
[EMAIL PROTECTED] 

-- 
/*  Security is a work in progress - dreamwvr */
# 
# Note: To begin Journey type man afterboot,man help,man hier[.]  
# 
// Who's Afraid of Schrodinger's Cat? /var/(.)?mail/me \?  ;-]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SSL crashing due to ssl-s3 NULL pointer

2002-04-02 Thread Lutz Jaenicke

On Mon, Apr 01, 2002 at 01:30:31PM -0500, Brad Barfield wrote:
 OpenSSL version: 0.9.6c
 OS: Linux 2.4.7-10
 EGCS-2.91.66
 
 I am seeing a crash in my SSL client application where the ssl-s3
 member is NULL. from my limited understanding of the code, this
 should never happen at the point that I'm seeing it.  Below is the gdb
 output from two different crashes:
 
 ===
 crash #1:
 ===
 (gdb) where
 #0  0x08062e09 in ssl3_get_message (s=0x836d650, st1=4384, stn=4385,
 mt=2,
 max=300, ok=0xb358) at s3_both.c:344
 #1  0x0805aa53 in ssl3_get_server_hello (s=0x836d650) at s3_clnt.c:549
 #2  0x08059efb in ssl3_connect (s=0x836d650) at s3_clnt.c:200
 #3  0x08067bfb in SSL_connect (s=0x836d650) at ssl_lib.c:720
 #4  0x0804fd56 in ssl_write (i=46) at ssl.c:758
 #5  0x0804d126 in main_loop () at main.c:624
 #6  0x0804e647 in main (argc=11, argv=0xb9a4) at main.c:1273
 #7  0x40068507 in __libc_start_main (main=0x804dc08 main, argc=11,
 ubp_av=0xb9a4, init=0x804b3cc _init, fini=0x80e3700 _fini,
 rtld_fini=0x4000dc14 _dl_fini, stack_end=0xb99c)
 at ../sysdeps/generic/libc-start.c:129
 
 (gdb) p s-s3
 $1 = (struct ssl3_state_st *) 0x0

I had a look into the SSL code and I could not find a reason why
s-s3 should become NULL. It is initialized in SSL_new() and destroyed
in SSL_free(). The only additional idea I have would be that there
may be an overflow somewhere that is overwriting part of SSL *s, so
that s-s3 becomes invalid.
If this problem would be reproduced easily, I would recommend running
with efence enabled, but this is out of options for a long running process,
as it manages to consume large amounts of system resources.
You may consider quering s-3 for being non-NULL before calling
SSL_connect(). If it is NULL, the bug appeared.

 ===
 crash #2:
 ===
 (gdb) where
 #0  0x08062e09 in ssl3_get_finished (s=0x836d650, a=4384, b=4385)
 at s3_both.c:220
 #1  0x0805aa53 in ssl3_connect (s=0x836d650) at s3_clnt.c:418
 #2  0x08059efb in ssl3_connect (s=0x836d650) at s3_clnt.c:114
 #3  0x08067bfb in SSL_pending (s=0x836d650) at ssl_lib.c:596
 #4  0x0804fd56 in ssl_read (i=46) at ssl.c:738
 #5  0x0804d126 in main_loop () at main.c:628
 #6  0x0804e647 in main (argc=11, argv=0xb9a4) at main.c:1278
 
 (gdb) p s-s3
 $1 = (struct ssl3_state_st *) 0x0

Here it is even more critical, as it means that s-s3 must have changed
between operations.

   handshake_func = 0x80599f0 do_ssl_write+608, server = 0, new_session
^ ??

From the backtrace it also seems, that you are either using implicit
negotiation (by calling SSL_pending()), or that a renegotiation is
taking place. Maybe this can give additional hints for tracking the
problem back.

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RSA_NO_PADDING

2002-04-02 Thread Ryan Jarvis

IS it possible to use RSA_NO_PADDING when calling RSA_public_encrypt?

I get a -1 returned from the RSA_public_encrypt() function?

Thanks
Ryan
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: create cert non interactively

2002-04-02 Thread Michael Bell

Sarath Chandra M wrote:

 Hi,

 Is there way to create certificates using openssl in a noninteractive 
 mode ? All the required

 values (common name, email, organization, ou etc) will be captured 
 using a unix shell script

 and passed to openssl commands.

 Is it possible. Any help will be highly appreciated.

openssl ca has an option -batch for exact this reason.

Best Regards,

Michael
-- 
---
Michael Bell   Email (private): [EMAIL PROTECTED]
Rechenzentrum - Datacenter Email:  [EMAIL PROTECTED]
Humboldt-University of Berlin  Tel.: +49 (0)30-2093 2482
Unter den Linden 6 Fax:  +49 (0)30-2093 2959
10099 Berlin
Germany   http://www.openca.org


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Help with Digital Signatures

2002-04-02 Thread Tom Reader

Hello,

I have some general questions concerning digital signatures.

Firstly, sorry if my questions are vague - I'm giving all the information I 
have myself - the reason that I'm having a problem may be partly because 
the request I have is itself too vague!

I'm trying to communicate with a 3rd-party piece of software, which 
sends/receives its documents digitally signed.  According to the developers 
of that software, it signs data using PKCS#7 and SHA-1.

In short, I am trying to both sign a data file using that combination of 
protocols, and in reverse, verify the signature of the incoming data.

We already use Open-SSL for the HTTPS connection, and I already have a 
public/private key pair, and access to the remote party's public key.

 From what I can see, Open-SSL supports both PKCS#7 and SHA-1.  Using SHA-1 
alone, I have been able to sign data, and verify my own signed data.

My questions are (again, sorry if they're a bit hazy):

- Is it possible to sign data using PKCS#7 - I thought PKCS#7 was more a 
general syntax than an algorithm.
- What steps do I go through to sign a file using PKCS#7 and SHA-1 (SHA-1 
on its own I am already clear on - it's PKCS#7 that is causing confusion!).
- Is there a good resource (like a tutorial) where I can find out how to do 
this using Open-SSL?
- My file could be any data on the UNIX filesystem - in other words, it is 
not in PKCS#7 syntax.  How do I encapsulate the file using PKCS#7, then 
digitally sign it?

Any information (whether it be general guidance, or step-by-step commands!) 
would be really appreciated.

Thanks in advance.

Tom Reader
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Can an OPenSSL cert, be used to run an https server on a Windows IIS 5 on Win2K platform?

2002-04-02 Thread cch



Yes, all you have to do is generate a certificate 
request using IIS management console, createyour own CA using OpenSSL, 
sign the key in the request using the CA's key, generating a certificate, 
install the certificate into IIS through management console, build up some test 
pages and configure it to be SSL enabled, then you should have an up-and-running 
IIS with SSL enabled. Not many things to do, though :)

Loren

  - Original Message - 
  From: 
  Martyn [EMAIL PROTECTED] 
  To: [EMAIL PROTECTED] 
  Sent: Tuesday, April 02, 2002 4:09 
AM
  Subject: Can an OPenSSL cert, be used to 
  run an https server on a Windows IIS 5 on Win2K platform?
  
  I would like to do some testing with HTTPS on the 
  above platform. Can the Openssl system be used with IIS 5 on win 
  2K?
  
  
  Thanks
  Martyn


create cert non interactively

2002-04-02 Thread Sarath Chandra M
Title: Message



Hi,
Is there way to create certificates using 
openssl in a noninteractive mode ? All the required
values (common name, email, organization, ou 
etc) will be captured using a unix shell script
and passed to openssl commands.
Is it possible. Any help will be highly 
appreciated.

regards
sarath





Limiting key size

2002-04-02 Thread Baber Amin

Did I miss the reply on this one.  Can anybody shed some light on this?

—-- original mail follows
—

Hi folks, how can one limit and enforce the the key size that can be
generated and used by openSSL and related utilities.  The enforcement
has to happen on multiple levels, 

1.  At generation.
2.  Loading keys into the context.

I am presuming that the ciphers can be limited to a lower or higher
strength by using the cipher call in openSSL.

Thanks
Baber 
:)
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SSL crashing due to ssl-s3 NULL pointer

2002-04-02 Thread Brad Barfield

Lutz,

thanks for the input.  I did exactly as you suggested made a simple
macro
to check s-s3 for the NULL condition and log the event, and try to recover the

session gracefully.  It is possible that this is happening during a
renegotiation.  I
also considered that *s could be getting stepped on by a rogue ptr somewhere,
but I think it is awfully strange that *s appears to be perfectly valid except
for the
s3 member.  Thanks for the ideas.

--
brad


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SSL_CTX_use_PrivateKey_file()

2002-04-02 Thread Ales Privetivy

Try

/* set callback for passphrases on private key files */
SSL_CTX_set_default_passwd_cb( context, pem_passwd_cb);

before calling SSL_CTX_use_PrivateKey_file(), where pem_passwd_cb could
be for non-crypted private key files 

/* callback for private key files passphrase */
static int pem_passwd_cb(char *buf, int size, int rwflag, void
*password)
{
return 0;
}

Ales Privetivy

 Hi,
 
 can somebody help me out.
 
 when i use the  SSL_CTX_use_PrivateKey_file() function in my client and server 
program,
  both the server and client progarm asks  on the command prompt to 
 Enter PEM pass phrase:
 
 I dont want the user to enter the pass phrase , how to avoid this situation. Is 
there anyway ? 
 
 biswaksen
 
 
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Fw: Check certificate

2002-04-02 Thread Oscar





  
  

  Hello. I have gottwo problems. 
  I want to check the signature of a certificate in PEM format but 
  using function library. 
  I want to create a C function that check date and signature and i 
  don´t know how to do it.
   Some idea?
   Thanks,
   
  Oscar


Re: Unknown CA

2002-04-02 Thread Lutz Jaenicke

On Mon, Apr 01, 2002 at 08:21:28AM +0530, amit limaye wrote:
 CONNECTED(0003)
 SSL_connect:SSLv3 write client key exchange A
 SSL_connect:SSLv3 write certificate verify A
 SSL_connect:SSLv3 write change cipher spec A
 SSL_connect:SSLv3 write finished A
 SSL_connect:SSLv3 flush data
 SSL3 alert read:fatal:unknown CA
 SSL_connect:failed in SSLv3 read finished A
 15001:error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert unknown ca:s3_pkt.
 c:985:SSL alert number 48
 15001:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:22
 6:

Here you are informed, that the server is unhappy with the certificate
supplied. The server send an alert.

 while on the server i get this 
 
 SSL_accept:before/accept initialization
 SSL_accept:SSLv3 read client hello A
 SSL_accept:SSLv3 write server hello A
 SSL_accept:SSLv3 write certificate A
 SSL_accept:SSLv3 write certificate request A
 SSL_accept:SSLv3 flush data

Here the server should point out what is going wrong. This logfile
is incomplete.

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SSL_get_verify_result(ssl)

2002-04-02 Thread Lutz Jaenicke

On Fri, Mar 29, 2002 at 08:14:19PM +0530, biswaksen wrote:
 I have written a client/server code using openssl. 
 
 when i am verifying the server certificate on the client side and  also the client 
certificate on the server side the  verification fails.
 
 On the client side ,
 SSL_get_verify_result(ssl) returns code 18.
 which is :
  18 X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT: self signed
certificate

 
 i have the server certificate on the client side and i am  using this function in my 
client code. 
 
 if (SSL_CTX_load_verify_locations(ctx,CERTF,HOME) = 0 ) {
ERR_print_errors_fp(stderr);
exit(3);
  }
 
 where CERTF is server certificate and HOME is the certificate path.
 
 i have used verify  command to check the server certificate which the server is 
sending to the client and the certificate the client is having on its side. this 
command gives OK.
 
 then i dont know where is the problem. Please tell me why it fails.

It should work in the way described. Please make sure that you have building
against a recent version of the OpenSSL library, as the option to supply
self signed certificates in the CAfile has only been added recently.
Please also check out, whether the certificate is correctly loaded from
CERTF. HOME is not needed when the certificate in question is already
contained in CERTF. Put only the cert in question into CERTF and set
the CApath argument to NULL for testing.

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: RSA_NO_PADDING

2002-04-02 Thread Gregory Stark

Ryan,

-1 doesn't tell us much, does it? Try printing out the error stack with
ERR_print_errs_fp(stdout)
(http://www.openssl.org/docs/crypto/ERR_print_errors.html#). Are you careful
to ensure that the integer pointed to by *from is  your modulus?


Thanks,
==
Greg Stark
[EMAIL PROTECTED]
==


- Original Message -
From: Ryan Jarvis [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, April 02, 2002 10:35 AM
Subject: RSA_NO_PADDING


 IS it possible to use RSA_NO_PADDING when calling RSA_public_encrypt?

 I get a -1 returned from the RSA_public_encrypt() function?

 Thanks
 Ryan
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



AES - Rijndael

2002-04-02 Thread Christian Gabriel Charette

Hello anybody!
Im start testing OpenSSL and Id like to know if it supports AES (Rijndael) encryption 
and how to implement it.
Beside, id like to hear your opinions about stress test and other benchmarks like this.
Thanks in advance, and sorry for my english!

Christian.


!DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 Transitional//EN
HTMLHEAD
META http-equiv=Content-Type content=text/html; charset=iso-8859-1
META content=MSHTML 6.00.2712.300 name=GENERATOR/HEAD
BODY style=MARGIN-TOP: 2px; FONT: 8pt Tahoma; MARGIN-LEFT: 2px
DIVFONT size=1Hello anybody!/FONT/DIV
DIVFONT size=1Im start testing OpenSSL and Id like to know if it supports 
AES (Rijndael) encryption and how to implement it./FONT/DIV
DIVFONT size=1Beside, id like to hear your opinions about stress test and 
other benchmarks like this./FONT/DIV
DIVFONT size=1Thanks in advance, and sorry for my english!/FONT/DIV
DIVFONT size=1/FONTnbsp;/DIV
DIVFONT size=1Christian./FONT/DIV/BODY/HTML



certificate creation example

2002-04-02 Thread Howard Chan



Hello OpenSSL experts,

I've been experimenting, or more like playing 
around, with Openssl on Linux. This is what I'm trying to do with OpenSSL 
:

  create a self-signed root CA 
  certificate
  create a private key and then a certificate 
  request
  use the root CA cert to sign the certificate 
  request, thereby making a user certificate
  finally, I want to verify the cert(ie. verify 
  -CApath ___ newcert.pem)
I'm no expert at this, but this is what I did (so 
far):

  I used 'openssl req -x509 -newkey rsa:1024 -keyout 
  key.pem -out req.pem' for Step 1 above.
  I used 'openssl req -new -key privkey.pem -out 
  cert.csr' for Step 2 above.
For Step 3 above, I triedusing the 'ca' 
command but always returned an error (which is attached), saying that it could 
not find files in the ./demoCA directory. So I created a /demoCA directory 
on my machine containing the CA cert and it's private key and the serial and 
index files. But still, when I ran the 'ca' command the same error 
occurs.

I know there's a CA.pl programwhich I can 
utilize to do the cert creation...but how do I use that? Do I need to 
compile it or anything before I can use that program? I'm not 
sure.

So I don't know what to do for Step 3 (sign a cert 
request with the CA root cert). I'm out of ideas.

Please enlighten me with some ideas, or correct my 
errors if you could.

Thanks alot.

Best regards,

H. Chan

Using configuration from /usr/share/ssl/openssl.cnf
./demoCA/private/cakey.pem: No such file or directory
trying to load CA private key
7740:error:02001002:system library:fopen:No such file or 
directory:bss_file.c:245:fopen('./demoCA/private/cakey.pem','r')
7740:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:247:
error in ca




Re: certificate creation example

2002-04-02 Thread Aleksey Sanin



I hope this will help. All keys are saved w/o passphrase. Probably you 
do not want to do it in production.

Aleksey Sanin.
http://www.aleksey.com/xmlsec

---
A. Create new CA
  CA.pl -newca
  cp ./demoCA/cacert.pem .
  cp ./demoCA/private/cakey.pem .
  openssl x509 -text -in cacert.pem

B. Generate RSA key and second level CA
  openssl genrsa -out ca2key.pem
  openssl req -new -key ca2key.pem -out ca2req.pem
  openssl ca -cert cacert.pem -keyfile cakey.pem \
 -out ca2cert.pem -infiles ca2req.pem
  openssl verify -CAfile cacert.pem ca2cert.pem

C. Sign DSA key with second level CA
  openssl req -new -key dsakey.pem -out dsareq.pem
  openssl ca -cert ca2cert.pem -keyfile ca2key.pem \
 -out dsacert.pem -infiles dsareq.pem
  openssl verify -CAfile cacert.pem -untrusted ca2cert.pem dsacert.pem

D. Sign RSA key with second level CA
  openssl req -new -key rsakey.pem -out rsareq.pem
  openssl ca -cert ca2cert.pem -keyfile ca2key.pem \
 -out rsacert.pem -infiles rsareq.pem
  openssl verify -CAfile cacert.pem -untrusted ca2cert.pem rsacert.pem


Howard Chan wrote:
048101c1dacc$f4e0eed0$086fa8c0@vrjyu">
  
  
  Hello OpenSSL experts,
  
  I've been experimenting, or more like
playing  around, with Openssl on Linux. This is what I'm trying to do with
OpenSSL  :
  
create a self-signed root CAcertificate
create a private key and then a certificate
   request
use the root CA cert to sign the certificate
   request, thereby making a user certificate
finally, I want to verify the cert(ie.
verify-CApath ___ newcert.pem)
  
  I'm no expert at this, but this is what
I did (so  far):
  
I used 'openssl req -x509 -newkey rsa:1024
-keyoutkey.pem -out req.pem' for Step 1 above.
I used 'openssl req -new -key privkey.pem
-outcert.csr' for Step 2 above.
  
  For Step 3 above, I triedusing the 'ca'
 command but always returned an error (which is attached), saying that it
could  not find files in the ./demoCA directory. So I created a /demoCA
directory  on my machine containing the CA cert and it's private key and
the serial and  index files. But still, when I ran the 'ca' command the
same error  occurs.
  
  I know there's a CA.pl programwhich
I can  utilize to do the cert creation...but how do I use that? Do I need
to  compile it or anything before I can use that program? I'm not  sure.
  
  So I don't know what to do for Step 3
(sign a cert  request with the CA root cert). I'm out of ideas.
  
  Please enlighten me with some ideas, or
correct my  errors if you could.
  
  Thanks alot.
  
  Best regards,
  
  H. Chan
  Using configuration from /usr/share/ssl/openssl.cnf./demoCA/private/cakey.pem: No such file or directorytrying to load CA private key7740:error:02001002:system library:fopen:No such file or directory:bss_file.c:245:fopen('./demoCA/private/cakey.pem','r')7740:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:247:error in ca