Try converting into pkcs12 and then import
openssl pkcs12 -export -in file -inkey key -certfile cert -out outfile.p12

----- Original Message -----
From: "Steve Barnes" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, October 17, 2001 2:41 PM
Subject: RE: using own CA certs with various clients


>
> I have the same problem... (sort of)..
>
> I have been trying a similar thing, and failing... I'm trying to be my own
> CA and generate a server cert so I can enable SSL on a IIS4 webserver.
>
> I made myself a CA by running the command...
>
> #openssl req -new -x509 -newkey rsa:1024 -md5 -keyout
./certs/CAkey.pem -out
> ./certs/CAcert.pem -days 365
>
> Then I made a Certificate request in IIS Key Manager and signed it using
the
> command...
>
> #openssl ca -policy policy_match -days 365 -md md5 -out
> ./certs/iis-ssl-cert.pem -keyfile ./certs/CAkey.pem -cert
./certs/CAcert.pem
> -outdir ./certs -infiles ./certs/iis-ssl-req.txt
>
> ... where iis-ssl-req.txt is the file from IIS Key Manager.
>
> I can then import the cert into IIS Key Manager and enable Secure Channel
> for my web server, but when I connect to https://secure-server, it gives
me
> an error saying the cert is ok apart from the fact that it was " issued by
a
> company you have chosen not to trust ". When I try importing the cert into
> IE, it imports it ok, but then it doesn't appear in the " Trusted Root
> Certificate Authorities ". So everytime I go to the site, it gives me the
> same error.... over & over....
>
> If I rename the file from 'iis-ssl-cert.pem' to 'iis-ssl-cert.cer',
Windows
> Exploder recognises it as a Security Certificate, when i double click, I
get
> " Windows does not have enough information to verify this certificate "
>
>
> Any way.... I'm lost... I've gotten this far and it's really bugging me
> now...
>
> Can anyone help...?????????
>
>
>
>
> -----Original Message-----
> From: Sean O'Riordain [mailto:[EMAIL PROTECTED]]
> Sent: 17 October 2001 09:53
> To: [EMAIL PROTECTED]
> Subject: Re: using own CA certs with various clients
>
>
> under windows 2000 (and nt4 afaik) with outlook 2000 and IE5 (don't know
> if works for "less" than this) you can install the certificate in each
> client by hand quite easily... if the file name has ending ".cer" then
> windows appears to recognize it and calls it "Security Certificate"...
> double click on this and hit "Install Certificate..." / Next / Next /
> Finish / OK / OK ... thats it...
>
> getting the cert to the client is another matter :-)
>
> Sean
>
> Haikel wrote:
> >
> > Hello,
> >
> > I think you have to install the CA certificates in your client
> > browser. I know two techniques you can use:
> >
> >   1. your client can download your CA certificate from you web site (
> >      you need to use the mime type application/x-x509-ca-cert in your
> >      httpd.conf file)
> >   2. or you can generate, for each one of your end users, a PKCS#12
> >      file containing his private key his certificate and your
> >      CA certificate
> >
> > I' hope that my answer, be helpful
> > bye
> >
> > Zachary Denison a écrit :
> >
> > > Hi,
> > >
> > > I am using openssl to secure a number of services in
> > > my organization: http, imap, smtp, ldap etc...
> > >
> > > For our internal servers we have been able to generate
> > > CA certs with openssl and sign our own certificates
> > > and all the services work great, EXCEPT the client
> > > software always complains that the certificate chain
> > > doesn't end with a trusted CA.  I am speaking
> > > specifically about MS-outlook and netscape.  outlook
> > > complains every single session where netscape at least
> > > gives you the option to accept the certificate
> > > forever.
> > > Anyway I am sure other clients would complain too.
> > >
> > > My question is how can I prevent these messages, how
> > > can I get the client software to trust our own CA
> > > cert.  On the web I searched and someone said to make
> > > a pkcs12 client cert.. anyway I tried that in a number
> > > of ways and it didnt work... And I really dont care
> > > about verifying the client... I to just make the
> > > client trust the homegrown ca.
> > >
> > > Any help would be much appreciated.
> > > Thanks
> > > Zachary.
> > >
> > > __________________________________________________
> > > Do You Yahoo!?
> > > Make a great connection at Yahoo! Personals.
> > > http://personals.yahoo.com
> > >
> > > _____________________________________________________________________
> > >
> > > OpenSSL Project
> > > http://www.openssl.org
> > > User Support Mailing List
> > > [EMAIL PROTECTED]
> > > Automated List Manager
> > > [EMAIL PROTECTED]
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
>
>
> The information contained in this e-mail transmission is confidential
> and may be privileged. It is intended only for the addressee(s) stated
> above.  If you are not an addressee, any use, dissemination, distribution,
> publication, or copying of the information contained in this e-mail is
> strictly prohibited. If you have received this e-mail in error, please
> immediately notify our IT Department by telephone at 353-1-6769333
> or e-mail [EMAIL PROTECTED] and delete the e-mail from your
> system.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to