Sachin Puttur wrote:
Hi,The Self signed Certificate is created in Windows server 2008 as given below.We have created the certificate file hpcpb.cer.Then we will follow below steps in linux machine . 1) openssl x509 -in test.cer -inform d -out hpcbp.pem 2) cp hpcbp.pem /usr/share/ssl/certs/. 3) c_rehash4) I am issuing below command from Linux machine(blrm188) to connect the machine where windows server 2008 is installed .openssl s_client -connect blrm188.hpccluster:443
With the exception of openssl verify, most openssl commands do not seem to check the system certificate store automatically, you have to specify -CApath to it. However, programs that automatically use the openssl certificate store such as wget, mutt, subversion, should be working correctly.
[EMAIL PROTECTED] HPCBP]# openssl s_client -connect blrm188.hpccluster:443 CONNECTED(00000003) depth=0 /CN=BLRM188.HPCCLUSTER *verify error:num=20:unable to get local issuer certificate* verify return:1 depth=0 /CN=BLRM188.HPCCLUSTER *verify error:num=21:unable to verify the first certificate* verify return:1 --- Certificate chain 0 s:/CN=BLRM188.HPCCLUSTER i:/CN=BLRM188.HPCCLUSTER --- Server certificate -----BEGIN CERTIFICATE----- MIIC6DCCAdCgAwIBAgIQRZUNbRWofbRCrVpIqCYWBzANBgkqhkiG9w0BAQUFADAd MRswGQYDVQQDExJCTFJNMTg4LkhQQ0NMVVNURVIwHhcNMDgwNzI2MDAwOTI5WhcN MDkwNzI1MDAwMDAwWjAdMRswGQYDVQQDExJCTFJNMTg4LkhQQ0NMVVNURVIwggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDjBd4KUfEbxW/Nmikcxy81MSXI /1T6/Zc4GG58/LF+fEftc/QfbrESC2XjrexteKMuYR8tu55l1NsxGnjnHiGxNo0p /aj2l8aI/fNPVavIQUdLJ2cnNTGf2tHqia8/2dViqpZMrg0PYjs2FSR1zoVz4Zef CK+s2/Rq2OBQOTDveUSDzJE+WJhZ1eWKAHpCzj9bp8Qk9RxpREUpwDZgXzVYoC6x hKc94z2RzLk8KGnDwK/F+Zxd10tc6Op0JOQRGRjIcnxYeH9eMQ3oOhyDZMRWF8dx bv7YTFKiG0Cg3hYKRKTjoqytDyai/7jUblSN0GRECs2jx97QSpSLbQB8T3zLAgMB AAGjJDAiMAsGA1UdDwQEAwIEMDATBgNVHSUEDDAKBggrBgEFBQcDATANBgkqhkiG 9w0BAQUFAAOCAQEADStRXlFuxgItMuymCBZxJgeywN4ZJ9PoNjKNA0bZ1OEFjH7l qpsORfQ8b6sgq4v/LNrW28aOKW3pV4YIWXC582dZT+Htx8FgOWs9BZ/ldm2BjnZB tEVsNY6h/bAZTe1M8w3/en39fxd08gIvETr7oaVuUEJzbfkudPci0xCg5dqoBBiW JiPZxwSKFnfJens3iFrnahJRbf0LkzRiJAXzu0XYBUTrmThQZHHGKfkMu94jFuJq /l/TCKZD/C8FuCGQDIXZp5Zg0KnVDGs+VZGILXd3TRmScmmnNzls/9WcTMXY2yEx gGRwjroaiXOk+lZU2jgdHFSuU6aIUFLxeoIiig== -----END CERTIFICATE----- subject=/CN=BLRM188.HPCCLUSTER issuer=/CN=BLRM188.HPCCLUSTER --- *No client certificate CA names sent* --- SSL handshake has read 900 bytes and written 468 bytes --- New, TLSv1/SSLv3, Cipher is AES128-SHA Server public key is 2048 bit SSL-Session: Protocol : TLSv1 Cipher : AES128-SHASession-ID: 330D000009CCCB40AA1822EB1CF8140E2A32483C00DCD1806FC91708EE13A090Session-ID-ctx:Master-Key: 0E2E19A17AA16276EF4C61F96B000F0CCD8D78C04208B50D194D3EF38E1D958D042528969F65C1A45CE1A8DC095ACBB5Key-Arg : None Krb5 Principal: None Start Time: 1216988971 Timeout : 300 (sec) * Verify return code: 21 (unable to verify the first certificate) *Please send your comments /suggestions on the error messages highlighted here.Thank you, Sachin P B
-- Loren M. Lang [EMAIL PROTECTED] http://www.north-winds.org/ Public Key: ftp://ftp.north-winds.org/pub/lorenl_pubkey.asc Fingerprint: 10A0 7AE2 DAF5 4780 888A 3FA4 DCEE BB39 7654 DE5B
signature.asc
Description: OpenPGP digital signature