Getting crazy with error 20 at 0 depth lookup:unable to get local issuer certificate error (I tried everything...)

2010-08-25 Thread Tomás Tormo
Greetings I'm are trying to configure apache with client authentication using some commercial certificates, but we are getting troubles with it. In Apache logs we can see the following error *Certificate Verification: Error (20): unable to get local issuer certificate* I tried to verify the

Re: Getting crazy with error 20 at 0 depth lookup:unable to get local issuer certificate error (I tried everything...)

2010-08-25 Thread Dr. Stephen Henson
On Wed, Aug 25, 2010, Toms Tormo wrote: Honestly, I have no idea what I'm doing wrong.. I've checked all the requirements OpenSSL needs and the certificates fulfill them all... Could you please help me? I'm getting desperate... Firstly thank you for the extensive debug information, all too

Re: SSL/TLS with server names picked from DNS

2010-08-25 Thread sandeep kiran p
You are right. A trusted list of server names at the client (hard coded in a config file) would be sufficient. The only downside of it would be for the domain admin to touch up this file each time he/she modifies the LDAP SRV list in DNS. Also note that we have absolutely no control on what goes

FIPS self-test failure possibilities

2010-08-25 Thread Pandit Panburana
Hello, I would like to know whether any one have seen FIPS self-test failures on the platforms you work on assuming that the code has been properly ported i.e. failures found during porting do not count. Thank you, - Pandit

Is there a function to invoke ad-hoc to report an error without having to load/unload strings?

2010-08-25 Thread Jeff Saremi
I'm looking for something like: ERR_report_oneoff_error(const char *func, const char *reason, int line, const char *file) that I could use without having to define structures like the following or calling Err_load_strings and Err_unload_strings: static ERR_STRING_DATA BIO_str_functs[]= {

OpenSSL FIPS security policy query

2010-08-25 Thread Vivek Madani
Hi, I have couple of queries pertaining to what it means by violating OpenSSL FIPS Security Policy. We recently moved to FIPS enabled OpenSSL successfully. My concern is whether certificates generated by earlier versions of our product, which used non-FIPS enabled OpenSSL, can be used in FIPS