On Tuesday 26 Apr 2011 13:29:00 James Chase wrote:
> Someone suggested it would be helpful to post the chain file and the site's
> public certificate to the list. If it is helpful, here is the site cert
> (and below that their supplied chain file)
> 
> -----BEGIN CERTIFICATE-----
<snip>
> -----END CERTIFICATE-----

Piping that site cert through "openssl x509 -noout -issuer" gives...

issuer= /C=US/O=Network Solutions L.L.C./CN=Network Solutions EV Server CA

> And the chain file
> 
> -----BEGIN CERTIFICATE-----
<snip>
> -----END CERTIFICATE-----
> -----BEGIN CERTIFICATE-----
<snip>
> -----END CERTIFICATE-----
> -----BEGIN CERTIFICATE-----
<snip>
> -----END CERTIFICATE-----

Piping that last CA cert through "openssl x509 -noout -subject" gives...

subject= /C=US/O=Network Solutions L.L.C./CN=Network Solutions EV SSL CA

You've got the wrong chain file.  I understand that NetSol switched to a new 
EV Issuing CA a few months ago.  Are you definitely using the chain file that 
they supplied with your latest site cert?

> On Tue, Apr 26, 2011 at 8:19 AM, James Chase <chase1...@gmail.com> wrote:
> > Well my results are quite different, and I guess point to my p12 not
> > being correctly created. Strangely, the p12 I am running this test on
> > works in production and doesn't produce a warning (I re-created last
> > years certificate as a new p12 using the same process I am trying with
> > this years).
> > 
> > I also tried running this on my test apache site, where I am just using
> > the plain old certificate, key and network solutions supplied chain file
> > -- and the openssl s_client command returns better output but I still
> > get a warning!
> > 
> > [me@myserver ~]$ openssl s_client -connect www.example.com:443
> > CONNECTED(00000003)
> > depth=0 /serialNumber=03-11-
> > 
> > 1975/1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1.311.60.2.1.2=Massachusetts/1
> > .3.6.1.4.1.311.60.2.1.1=A City/2.5.4.15=V1.0, Clause
> > 
> > 5.(b)/C=US/postalCode=05767/ST=MA/L=A City/streetAddress=One Park St/O=A
> > Company International Ltd
> > verify error:num=20:unable to get local issuer certificate
> > verify return:1
> > depth=0 /serialNumber=03-11-
> > 
> > 1975/1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1.311.60.2.1.2=Massachusetts/1
> > .3.6.1.4.1.311.60.2.1.1=A City/2.5.4.15=V1.0, Clause
> > 
> > 5.(b)/C=US/postalCode=05767/ST=MA/L=A City/streetAddress=One Park St/O=A
> > Company International Ltd
> > verify error:num=27:certificate not trusted
> > verify return:1
> > depth=0 /serialNumber=03-11-
> > 
> > 1975/1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1.311.60.2.1.2=Massachusetts/1
> > .3.6.1.4.1.311.60.2.1.1=A City/2.5.4.15=V1.0, Clause
> > 
> > 5.(b)/C=US/postalCode=05767/ST=MA/L=A City/streetAddress=One Park St/O=A
> > Company International Ltd
> > verify error:num=21:unable to verify the first certificate
> > verify return:1
> > ---
> > Certificate chain
> > 
> >  0 s:/serialNumber=03-11-
> > 
> > 1975/1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1.311.60.2.1.2=Massachusetts/1
> > .3.6.1.4.1.311.60.2.1.1=A City/2.5.4.15=V1.0, Clause
> > 
> > 5.(b)/C=US/postalCode=05767/ST=MA/L=A City/streetAddress=One Park St/O=A
> > Company International Ltd/OU=Book
> > 
> > Sales/OU=Secure Link EV SSL/CN=www.example.com
> > 
> >    i:/C=US/O=Network Solutions L.L.C./CN=Network Solutions EV SSL CA
> > 
> > ---
> > 
> > On Mon, Apr 25, 2011 at 6:16 PM, Rob Stradling 
<rob.stradl...@comodo.com>wrote:
> >> On Monday 25 Apr 2011 20:07:03 James Chase wrote:
> >> > I simplified the issue a bit in order to try and understand what is
> >> 
> >> going
> >> 
> >> > on here and found that the SSL certificate that Network Solutions is
> >> > providing, along with the intermediate chain file cannot be verified
> >> > by newer installs of Firefox.
> >> 
> >> Hi James.  That seems unlikely.  Try browsing to NetSol's own EV site
> >> (https://www.networksolutions.com) in FF4.  I see the EV green bar and
> >> no browser warnings.
> >> 
> >> Could you post the top part of the output from "openssl s_client
> >> -connect yourdomain:yourport" ?
> >> 
> >> Then we can compare it with...
> >> 
> >> $ openssl s_client -connect www.networksolutions.com:443
> >> CONNECTED(00000003)
> >> depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN
> >> = AddTrust External CA Root
> >> verify error:num=19:self signed certificate in certificate chain
> >> verify return:0
> >> ---
> >> Certificate chain
> >> 
> >>  0
> >> 
> >> s:/serialNumber=3713002/1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1.311.60.2
> >> .1.2=Delaware/businessCategory=Private
> >> Organization/C=US/ST=VA/L=Herndon/O=Network Solutions,
> >> LLC/OU=Technology Services/OU=Secure Link EV
> >> SSL/CN=www.networksolutions.com
> >> 
> >>   i:/C=US/O=Network Solutions L.L.C./CN=Network Solutions EV Server CA
> >>  
> >>  1 s:/C=US/O=Network Solutions L.L.C./CN=Network Solutions EV Server CA
> >>  
> >>   i:/C=US/O=Network Solutions L.L.C./CN=Network Solutions Certificate
> >> 
> >> Authority
> >> 
> >>  2 s:/C=US/O=Network Solutions L.L.C./CN=Network Solutions Certificate
> >> 
> >> Authority
> >> 
> >>   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust
> >> 
> >> External
> >> CA Root
> >> 
> >>  3 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust
> >> 
> >> External
> >> CA Root
> >> 
> >>   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust
> >> 
> >> External
> >> CA Root
> >> ---
> >> 
> >> > It doesn't have anything to do with the p12
> >> > file I am creating (I loaded up the network solutions files in apache
> >> 
> >> and
> >> 
> >> > tested).
> >> > 
> >> > Who would be at fault here? Am I still doing something wrong, or is
> >> > this Mozilla's fault for not including a needed root ca file? It
> >> > seems the missing link is the "AddTrustExternalCARoot" certificate.
> >> > 
> >> > I tried adding the AddTrustExternalCARoot cert to the top of my
> >> 
> >> certificate
> >> 
> >> > chain, but this causes apache to break, and then not start complaining
> >> 
> >> of
> >> 
> >> > "[error] Failed to configure CA certificate chain!". I used a chain
> >> > file that I have used in previous years, and that did allow apache to
> >> > start
> >> 
> >> but
> >> 
> >> > I still cannot verify with Firefox. Then I tried using last years (and
> >> > soon expiring) certificate for my site and that works FINE. So ...
> >> 
> >> Network
> >> 
> >> > Solutions screwed something up when issuing my certificate (this is
> >> > the second one I have had re-issued) or am I doing something wrong. I
> >> > have
> >> 
> >> no
> >> 
> >> > idea what that could be at this point -- I have never had so much
> >> 
> >> trouble
> >> 
> >> > with an SSL certificate and am not an expert by any means.
> >> > 
> >> > Anyone have any thoughts? I called NS earlier in this process and they
> >> 
> >> said
> >> 
> >> > "not our problem" but perhaps I will try again.
> >> > 
> >> > On Mon, Apr 25, 2011 at 11:01 AM, James Chase <chase1...@gmail.com>
> >> 
> >> wrote:
> >> > > I did run the verification, and didn't have an issue there. Still am
> >> 
> >> not
> >> 
> >> > > able to figure out how to correctly create this as the only way the
> >> 
> >> p12
> >> 
> >> > > compiles is by dropping the "-chain" command but that creates ssl
> >> > > verifications warnings in Firefox web browsers.
> >> > > 
> >> > > openssl req -verify -in www.example.com.csr -key www.example.com.key
> >> > > verify OK
> >> > > -----BEGIN CERTIFICATE REQUEST-----
> >> > > CERTIFICATE DATA HERE
> >> > > -----END CERTIFICATE REQUEST-----
> >> > > 
> >> > > On Sat, Apr 23, 2011 at 4:41 PM, James Chase <chase1...@gmail.com>
> >> 
> >> wrote:
> >> > >> I am using the same system -- I have tried with last years chain
> >> > >> file
> >> 
> >> as
> >> 
> >> > >> well. The only thing that would be different to my knowledge are
> >> > >> possibly the version of openssl and the renewed crt file if it
> >> 
> >> possibly
> >> 
> >> > >> requires new CA's (I did use their most current certificates before
> >> > >> I tried using my old cafile).
> >> > >> 
> >> > >> openssl verify never returns, I'm not sure what the syntax I am
> >> 
> >> shooting
> >> 
> >> > >> for there is.
> >> > >> 
> >> > >> When i try without using the "-chain" command then it compiles the
> >> 
> >> p12
> >> 
> >> > >> and it does seem to load in Chrome and IE ,but in FF3 I get:
> >> > >> 
> >> > >> secure.example.com uses an invalid security certificate.
> >> > >> 
> >> > >> The certificate is not trusted because the issuer certificate is
> >> > >> unknown.
> >> > >> 
> >> > >> (Error code: sec_error_unknown_issuer)
> >> > >> 
> >> > >> And in FF4 I get:
> >> > >> 
> >> > >> store.innertraditions.com uses an invalid security certificate.
> >> > >> 
> >> > >> The certificate is not trusted because no issuer chain was
> >> > >> provided.
> >> > >> 
> >> > >> (Error code: sec_error_unknown_issuer)
> >> > >> 
> >> > >> 
> >> > >> I have always used the -chain and -CAfile options together when
> >> 
> >> creating
> >> 
> >> > >> p12's.
> >> > >> 
> >> > >> On Sat, Apr 23, 2011 at 12:32 PM, Crypto Sal <crypto....@gmail.com
> >> >
> >> >wrote:
> >> > >>>  On 04/21/2011 06:51 PM, James Chase wrote:
> >> > >>> I have done this multiple years in a row with the exact same
> >> > >>> process but now I get the following error when I try to create my
> >> > >>> SSL:
> >> > >>> 
> >> > >>> openssl pkcs12 -export -chain -CAfile cachain.crt -out
> >> > >>> my.domain.com.p12 -inkey my.domain.com.key -in MY.DOMAIN.COM.crt
> >> > >>> Error unable to get local issuer certificate getting chain.
> >> > >>> 
> >> > >>> I concatenated all the intermediate files in the order they
> >> > >>> suggest, and according to the process I have documented that has
> >> > >>> worked the past few years. I also downloaded the pre-built chain
> >> > >>> file where
> >> 
> >> they
> >> 
> >> > >>> already concatenated the needed files together but I get the same
> >> > >>> error. I also tried the same chain file I used last year -- same
> >> > >>> results. Googling is not helping me understand this error. Anyone
> >> 
> >> know
> >> 
> >> > >>> what could be going on here with the EV SSL creation for Network
> >> > >>> Solutions?
> >> > >>> 
> >> > >>> 
> >> > >>> --
> >> > >>> "Beware of all enterprises that require new clothes."
> >> > >>> 
> >> > >>>   --  Henry David Thoreau
> >> > >>> 
> >> > >>> James,
> >> > >>> 
> >> > >>> You don't need to include the -chain' option since you are
> >> > >>> providing the chain with the '-CAfile' option. '-chain' is if you
> >> > >>> want OpenSSL to build the chain for you.
> >> > >>> 
> >> > >>> --Crypto.Sal
> >> > >> 
> >> > >> --
> >> > >> "Beware of all enterprises that require new clothes."
> >> > >> 
> >> > >>   --  Henry David Thoreau
> >> > > 
> >> > > --
> >> > > "Beware of all enterprises that require new clothes."
> >> > > 
> >> > >   --  Henry David Thoreau
> >> 
> >> Rob Stradling
> >> Senior Research & Development Scientist
> >> COMODO - Creating Trust Online
> >> ______________________________________________________________________
> >> OpenSSL Project                                 http://www.openssl.org
> >> User Support Mailing List                    openssl-users@openssl.org
> >> Automated List Manager                           majord...@openssl.org
> > 
> > --
> > "Beware of all enterprises that require new clothes."
> > 
> >   --  Henry David Thoreau

Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to