On Wed, Nov 24, 2004, Florin Angelescu wrote:

> On Wednesday 24 November 2004 11:44, Dr. Stephen Henson wrote:
> > On Wed, Nov 24, 2004, Florin Angelescu wrote:
> > > On Tuesday 23 November 2004 16:57, Dr. Stephen Henson wrote:
> > > > On Tue, Nov 23, 2004, Florin Angelescu wrote:
> > > > > Hello
> > > > > I am trying to set up an ssl acces to ldap
> > > > > following http://www.openldap.org/faq/data/cache/185.html
> > > > >
> > > > > i created my ca
> > > > > and signed the certificates for the server and  client
> > > > > but i still get a 'self signed error'
> > > > > i checked and i saw that it was because of cacert.pem which is
> > > > > selfsigned
> > > > >
> > > > > question : how to solve this ???
> > > > > (do i have to sign the CA certificate by another CA ? and how ? )
> > > > > thank you very much
> > > >
> > > > Firstly I'd suggest you use CA.pl instead of CA.sh which is older.
> > > >
> > > > What is giving you the error? If its a client then you'd need to
> > > > include a command line switch or configuration option telling it to
> > > > include 'cacert.pem' in its trusted list of CAs.
> > > >
> > > > Steve.
> > > > --
> > >
> > > Thank you for answering.
> > > The error is given by ldapsearch ( and ldap.conf & sldap.conf are well
> > > configured).
> > > The error is also reported by openssl.
> > > "self signed certificate in certification chain"
> > > (the CA certificate)
> >
> > The problem is not that you have a self signed CA it is that the software
> > doesn't trust it. The configuration or command line options should provide
> > a means of specifying a file or directory containing trusted CAs. You
> > should change them to include 'cacert.pem'.
> >
> > Steve.
> i used CA.pl -newcert
> i thought it does everything for me ....
> here is what i got
> 
> ldap misc # openssl verify demoCA/cacert.pem
> demoCA/cacert.pem: 
> /C=BE/ST=BEGLIUM/L=BRUSSELS/O=CAAMI_CA1/OU=CCI/CN=CAAMI_CA1/[EMAIL PROTECTED]
> error 18 at 0 depth lookup:self signed certificate
> OK
> 

If you do:

openssl verify -CAfile demoCA/cacert.pem demoCA/cacert.pem

or

openssl verify -CAfile demoCA/cacert.pem newcert.pem

(or whatever the server certificate is called) it should the be OK.

If OpenSSL just trusted any certificate created by CA.pl then anyone could
create a certificate that your system would trust and that would be a rather
large security hole. So you have to tell the OpenSSL applications which CAs
they should trust. That's what the -CAfile command line option above is doing.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to