On Thu, Jan 16, 2003 at 11:38:40AM +0100, p b wrote:
> 
> Thanks to openssl.org, and Lutz, I have made a client server connection
> using DH for key negotiation, and RSA for checking both client and server.
> 
> Of course I would like to check the CRL (I use openssl 0.9.7)
> 
> I have made an AC certificate, 3 client's certificates; the 3rd is now
> invalid in the CRL.  I have a .pem file including both AC certificate and
> CRL.
> 
> I use the SSL_CTX_load_verify_locations function to load the AC cert and
> CRL.
> I use         store = SSL_CTX_get_cert_store(ssl_ctx);
>               X509_STORE_set_flags(store,X509_V_FLAG_CRL_CHECK) 
> in order to check the CRL. (as made in the s_client utility)
> 
> 
> But even if I use a valid cert (number 1) or the invalid cert (number 3) for
> the client, 
> The server message is: "error:14094418:lib(20):funct(148):reason(1048)"
> The client message is: "error:14090086:SSL
> routine:SSL3_GET_SERVER_CERTIFICTATE:certificate verify failed"
> 
> What should I do ? 

Carefully read the messages displayed :-)

The client is complaining about the server certificate: certificate verify
failed. (You need to check the verify_result to learn more about the reason.)

The server says:
serv01 22: openssl errstr 14094418
error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert unknown ca

Therefore: it is the client that is unhappy with the server's certificate
and thus stops the negotiation. This takes place before the client certificate
is even sent...

Best regards,
        Lutz
-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to