On Wed, Feb 23, 2011 at 12:56 AM, Mircea Carasel <[email protected]> wrote: > >> Thank you in advance for your help. Attached you will find the generated >> certificates and the sniffed traffic on the configured TLS port. Maybe there >> is a simple but effective mistake. > > Lars, > > Thank you for the certificates archive > > We are using "openssl verify" command to check if a certificate is OK or not > before importing it > I found two certificates there > servercert.pem is not valid > but cacert.pem looks like valid but still has a problem > Here are my results: > > [mirceac@decebal lars]$ openssl verify servercert.pem > servercert.pem: C = DE, ST = NDS, O = Teamprojekt, CN = > sipx.teamprojekt.local, emailAddress = [email protected] > error 20 at 0 depth lookup:unable to get local issuer certificate > > [mirceac@decebal lars]$ openssl verify cacert.pem > cacert.pem: C = DE, ST = NDS, L = Wolfenbuettel, O = Teamprojekt, CN = > sipx.teamprojekt.local, emailAddress = [email protected] > error 18 at 0 depth lookup:self signed certificate > OK
Looks like your cert need to be signed by a CA... George _______________________________________________ sipx-dev mailing list [email protected] List Archive: http://list.sipfoundry.org/archive/sipx-dev/
