On Wed, Feb 23, 2011 at 12:56 AM, Mircea Carasel <[email protected]> wrote:
>
>> Thank you in advance for your help. Attached you will find the generated
>> certificates and the sniffed traffic on the configured TLS port. Maybe there
>> is a simple but effective mistake.
>
> Lars,
>
> Thank you for the certificates archive
>
> We are using "openssl verify" command to check if a certificate is OK or not
> before importing it
> I found two certificates there
> servercert.pem is not valid
> but cacert.pem looks like valid but still has a problem
> Here are my results:
>
> [mirceac@decebal lars]$ openssl verify servercert.pem
> servercert.pem: C = DE, ST = NDS, O = Teamprojekt, CN =
> sipx.teamprojekt.local, emailAddress = [email protected]
> error 20 at 0 depth lookup:unable to get local issuer certificate
>
> [mirceac@decebal lars]$ openssl verify cacert.pem
> cacert.pem: C = DE, ST = NDS, L = Wolfenbuettel, O = Teamprojekt, CN =
> sipx.teamprojekt.local, emailAddress = [email protected]
> error 18 at 0 depth lookup:self signed certificate
> OK

Looks like your cert need to be signed by a CA...

George
_______________________________________________
sipx-dev mailing list
[email protected]
List Archive: http://list.sipfoundry.org/archive/sipx-dev/

Reply via email to