Hello people, I have a problem when a make a PKCS#10 CSR with openssl
and try to use it in openca.
This is what I am doing.

I have a configuration file (my.cnf):

        n...@nico-laptop:~/openssl/new$ more my.cnf
        [ req ]
        default_bits            = 1024
        default_md              = sha1
        default_keyfile         = privkey.pem
        distinguished_name      = req_distinguished_name
        prompt                  = no
        req_extensions          = v3_req
        utf8 = yes     # automatically added
        string_mask = utf8only     # automatically added

        [ req_distinguished_name ]
        commonName              = www.test.com
        localityName            = My_Locality
        organizationalUnitName  = My_Unit
        organizationName        = My_Organization
        countryName             = AR

        [ v3_req ]
        basicConstraints        = CA:FALSE
        keyUsage                = nonRepudiation, digitalSignature, 
keyEncipherment

        subjectAltName          = @alt_names

        [ alt_names ]
        email.0                 = r...@test.com
        DNS.1                   = www.test.com
        DNS.2                   = www.test.net
        DNS.3                   = www.test.org

        n...@nico-laptop:~/openssl/new$

With this file I create the CSR with the following command:
+ openssl req -new -nodes -keyout ./priv.key -out ./req.csr -config ./my.cnf
+ openssl req -out req.pem -in req.csr -config my.cnf

This is the output:
        n...@nico-laptop:~/openssl/new$ openssl req -new -nodes -keyout
./priv.key -out ./req.csr -config ./my.cnf
        Generating a 1024 bit RSA private key
        ..................++++++
        .............++++++
        unable to write 'random state'
        writing new private key to './priv.key'
        -----
        n...@nico-laptop:~/openssl/new$
        n...@nico-laptop:~/openssl/new$ openssl req -out req.pem -in req.csr
-config my.cnf
        n...@nico-laptop:~/openssl/new$


Then I inspect the content of the request and I can see it's all ok:
        n...@nico-laptop:~/openssl/new$ openssl req -text  -in req.pem
        Certificate Request:
            Data:
            Version: 0 (0x0)
            Subject: CN=www.test.com, L=My_Locality, OU=My_Unit,
O=My_Organization, C=AR
            Subject Public Key Info:
                Public Key Algorithm: rsaEncryption
                RSA Public Key: (1024 bit)
                    Modulus (1024 bit):
                        00:bb:54:1d:4e:c2:1b:62:88:19:81:76:4e:53:5a:
                        3b:20:fe:d0:37:1e:ec:cb:15:4f:8e:1c:58:57:31:
                        be:4d:38:6f:99:79:81:a3:56:8b:f6:c3:2b:21:59:
                        c4:4e:be:c8:91:9b:5e:32:4b:43:a7:82:17:7a:2a:
                        3c:dc:3b:5c:72:af:22:d7:60:ad:dd:50:00:c5:8c:
                        7d:53:fa:fd:af:6c:12:71:2b:4c:0a:f7:5a:d0:65:
                        a5:7d:45:f1:01:b7:28:ca:c7:39:20:c1:aa:20:6f:
                        de:dc:6d:18:dd:e1:93:d2:d6:05:32:89:ad:55:41:
                        22:87:82:dc:97:ae:a9:00:9f
                    Exponent: 65537 (0x10001)
            Attributes:
            Requested Extensions:
                X509v3 Basic Constraints:
                    CA:FALSE
                X509v3 Key Usage:
                    Digital Signature, Non Repudiation, Key Encipherment
                X509v3 Subject Alternative Name:
                    email:r...@test.com, DNS:www.test.com,
DNS:www.test.net, DNS:www.test.org
        Signature Algorithm: sha1WithRSAEncryption
            a7:7d:72:21:cb:3f:d4:4a:1e:ab:20:4e:83:21:d8:0e:fa:87:
            5f:03:71:f4:38:4a:2b:60:76:3b:2a:8e:59:5a:a6:2f:70:28:
            6c:71:e1:90:4d:a9:19:9b:76:a5:b0:6b:bf:78:8e:43:81:08:
            d4:73:79:c5:72:d0:79:82:b0:56:93:60:58:c6:3b:64:7d:f4:
            9c:7c:30:c1:19:6c:56:e1:1c:0c:f2:93:f4:da:e0:8f:12:73:
            02:9e:b7:0f:1f:08:3e:a7:ee:6a:7b:d1:56:c6:1d:8c:4c:b5:
            1c:61:be:09:5c:cf:f0:89:aa:9e:b3:0b:01:3b:7b:03:45:74:
            4e:a9
        -----BEGIN CERTIFICATE REQUEST-----
        MIICEzCCAXwCAQAwZjEVMBMGA1UEAwwMd3d3LnRlc3QuY29tMRQwEgYDVQQHDAtN
        eV9Mb2NhbGl0eTEQMA4GA1UECwwHTXlfVW5pdDEYMBYGA1UECgwPTXlfT3JnYW5p
        emF0aW9uMQswCQYDVQQGEwJBUjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA
        u1QdTsIbYogZgXZOU1o7IP7QNx7syxVPjhxYVzG+TThvmXmBo1aL9sMrIVnETr7I
        kZteMktDp4IXeio83Dtccq8i12Ct3VAAxYx9U/r9r2wScStMCvda0GWlfUXxAbco
        ysc5IMGqIG/e3G0Y3eGT0tYFMomtVUEih4Lcl66pAJ8CAwEAAaBtMGsGCSqGSIb3
        DQEJDjFeMFwwCQYDVR0TBAIwADALBgNVHQ8EBAMCBeAwQgYDVR0RBDswOYENcm9v
        dEB0ZXN0LmNvbYIMd3d3LnRlc3QuY29tggx3d3cudGVzdC5uZXSCDHd3dy50ZXN0
        Lm9yZzANBgkqhkiG9w0BAQUFAAOBgQCnfXIhyz/USh6rIE6DIdgO+odfA3H0OEor
        YHY7Ko5ZWqYvcChsceGQTakZm3alsGu/eI5DgQjUc3nFctB5grBWk2BYxjtkffSc
        fDDBGWxW4RwM8pP02uCPEnMCnrcPHwg+p+5qe9FWxh2MTLUcYb4JXM/wiaqeswsB
        O3sDRXROqQ==
        -----END CERTIFICATE REQUEST-----
        n...@nico-laptop:~/openssl/new$

The problem arise when I try to use the request I made before in openca.
I am using OpenCA Server Version 1.0.2.
I use the interface "My certificates" -> "Request a Certificate" ->
"Server Certificate Request (PKCS#10 PEM formatted Request Upload Form)"
to upload my CSR.

When I use the RA Operator interface and open the request I can't see
information about "Subject Alternative Name" field.
The information openca gather from the CSR is:
        Request Version         0 (0x0)
        Serial Number   37152
        Common Name     www.test.com
        E-Mail  n/a
        Subject Alternative Name        n/a
        Role    Web Server
        Lifetime (days)         n/a
        Not before (YYMMDDhhmmss)       n/a
        Not after (YYMMDDhhmmss)        n/a
        Lifetime check  Lifetime would be ok.
        LOA     Low
        Distinguished Name
serialNumber=206,C=AR,O=My_Organization,OU=My_Unit,L=My_Locality,CN=www.test.com
        Submitted on    Tue Jul 14 23:20:30 2009 UTC
        Approved on     n/a
        Used Identification PIN         25c1cd954c5f9d83bd7b46ecb71c2db0145bc3a8
        Modulus (key size)      1024
        Public Key Algorithm    rsaEncryption
        Public Key      

        Modulus (1024 bit):
            00:e3:ab:e5:6f:05:76:94:38:59:b1:76:37:d7:d0:
            bc:54:1b:ac:68:b2:89:3f:89:00:ee:12:90:eb:f2:
            50:a4:ba:fe:b4:a7:d5:23:d8:ef:c4:ae:22:d4:53:
            e1:75:70:42:e1:d5:22:99:f2:0a:3f:31:ca:8c:13:
            05:c7:f3:a9:c1:16:18:60:b2:5c:a8:f7:0b:28:fa:
            39:75:30:fe:ba:4b:72:c3:dc:3b:4d:6a:c3:b1:16:
            ab:31:3e:f6:05:f4:b7:eb:5b:4a:6b:a5:f5:36:e2:
            fa:ea:46:33:30:27:39:c6:a1:e9:32:87:4e:06:6b:
            92:af:1b:d2:f3:44:d9:34:e9
        Exponent: 65537 (0x10001)

        Signature Algorithm     sha1WithRSAEncryption

What's wrong with this? or How I can do a PKCS#10 with subjectAltName
for openca?

Thanks for reading, any help is very welcome
Nicolas

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Enter the BlackBerry Developer Challenge  
This is your chance to win up to $100,000 in prizes! For a limited time, 
vendors submitting new applications to BlackBerry App World(TM) will have
the opportunity to enter the BlackBerry Developer Challenge. See full prize  
details at: http://p.sf.net/sfu/Challenge
_______________________________________________
Openca-Users mailing list
Openca-Users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to