On Thu, Feb 10, 2011 at 4:50 PM, Lars Schiller <[email protected]>wrote:
> Am 10.02.2011 15:31, schrieb Mircea Carasel: > > > Well, that is exactly what I am doing. Maybe I made mistakes before as I am > not used to TLS. I made server certificates with my own CA using openssl. > Here are the commands I used in shortened form: > > openssl req -new -x509 -newkey rsa:1024 -keyout cakey.pem -out cacert.pem > -days 3650 > openssl genrsa -out serverkey.pem -aes128 1024 -days 3650 > openssl rsa -in serverkey.pem -out serverkey.pem > openssl req -new -key serverkey.pem -out req.pem -nodes > openssl ca -in req.pem -notext -out servercert.pem > > So all certificates have .pem extension. Using the import function under > System/Certificates/Certificate Authority I get a message that the > certificate is not valid. > Can you please generate a certificate that should work and it is not validated and send it to me. I would like to have a look... maybe there is a bug Mircea > > > Regards, > > Lars > > > _______________________________________________ > sipx-dev mailing list > [email protected] > List Archive: http://list.sipfoundry.org/archive/sipx-dev/ >
_______________________________________________ sipx-dev mailing list [email protected] List Archive: http://list.sipfoundry.org/archive/sipx-dev/
