Hi all,

The problem has been solved adding -CAfile to the s_client did the trick.

Thanks alot everyone for the help.
-Vishal

On Wed, Aug 26, 2009 at 10:59 AM, vishal saraswat <
vishalsaraswat...@gmail.com> wrote:

> Hi all,
>
> I am still getting the same error:
> 7(Certificate Signature Failure)
>
> @Sandeep : I am using following commands for server and client
> respectively.
>
> openssl s_server -accept 9000 -cert ~/certs/server.pem
> openssl s_client -connect localhost:9000
>
> @Goetz - Well, I hope I am doing it. But maybe I dont get your point quite
> clearly. This is what I do(names changed)
>
> $> openssl ca -config openssl.my.cnf -policy policy_anything -out 
> certs/server.crt -infiles server.csr
>
> I hope this is enough. But I dont provide any such argument of certificates 
> at the client end. Do I need to? However initially when I
>
> encountered this error I created a several certificate for client. Using the 
> same procedure the way I created the server certificate.
>
> @Dave : I think you have a same point as Goetz. I think we all are on the 
> same pitch but something somewhere is definitely wrong.
>
> I am sorry that I took so much of time to reply. I was writing a small code 
> to test the same client/server communication. But no good.
>
> Thank you everyone,
> -Vishal
>
>
>
> On Thu, Aug 20, 2009 at 7:56 PM, Dave Thompson <
> dave.thomp...@princetonpayments.com> wrote:
>
>> >       From: owner-openssl-us...@openssl.org On Behalf Of vishal
>> saraswat
>> >       Sent: Tuesday, 18 August, 2009 07:44
>>
>> >       I am sorry, I forgot to tell you that the final PEM I create
>> > is composed of key and certificate both.
>> >       cat server_key.pem server server_cert.pem > server.pem
>> >       I read on some blogs that some server require both to be in one
>> file
>>
>> > that why to be on safer side I started following this practice. I hope
>> its
>> fine.
>>
>> It's OK. OpenSSL commandline does not require this, but does allow it.
>>
>> >       Now I suppose that one a client is successfully connected
>> > it should return me code as 0 and an OK message. Right?
>> > But I get return value as 7(Certificate Signature Failure),
>> > 21(Unable to verify the first certificate.)
>>
>> Signature failure? Not just "unable to get issuer"?
>>
>> To verify, any client does need to have available the CA cert
>> that signed the cert the server uses. In the general case with
>> the client on a different machine than the server this must be
>> a copy, and thus you need to make sure the right file (version)
>> gets copied, but for loopback testing you can use the same file(s).
>>
>> s_client supports two ways: a single file containing either one CAcert
>> or several concatenated, specified with -CAfile; or a directory specified
>> by -CApath that contains a file for each CA cert with its filename or
>> a symlink to it using the hash of the cert's name, allowing lookup.
>>
>> In your earlier email s_client specified neither of these and should
>> have gotten 20 unable to get local issuer cert (and 21 unable to verify).
>> I think the only way you should get signature failure is if
>> you give s_client a CAcert which is for the correct CA name
>> but has a different public key. Perhaps, if you've tried this
>> (sort of) test several times, the file from an earlier iteration.
>>
>> >       p.s. - Can I connect multiple s_client to a single s_server ?
>>
>> In sequence, but not concurrently. For that you need  a real server. <G>
>>
>>
>>
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>>
>
>

Reply via email to