RE: Converting PEM file to PKCS12 or PFX for the MacOS (Not Mac OSx)...

2002-10-28 Thread Jose Correia (J)



Hi 
Wally.
 
Pleasure, did it work?
 
Well 
although I understand your plight towards other people (since I've been and 
sometimes am on the same boat), I also understand  why some times people don't respond.
 
Either 
could be:
 
1. too 
busy or away
2. Too 
busy but still time to answer one or two, but since the subject said MacOs and 
they have a different OS, they ignored it.
3. 
Don't know
4. You 
weren't specific enough (which wasn't the case)
5. 
They felt that your question was something you could figure out yourself by 
either reading the docs a bit more or searching the web... usually people want 
to see that you have made some effort of at least attempting to solve the 
problem.
 
take 
care
Jose
 

  -Original Message-From: Auteria Wally Winzer Jr. 
  [mailto:[EMAIL PROTECTED]]Sent: 28 October 2002 
  10:31To: [EMAIL PROTECTED]Cc: Auteria Wally 
  Winzer Jr.Subject: Re: Converting PEM file to PKCS12 or PFX for the 
  MacOS (Not Mac OSx)...
  thanks jose for your response.  you're the only one 
  that took the time to do so.  everyone else just sent me read 
  receipts.
   
  wally
  
- Original Message ----- 
    From: 
Jose 
Correia (J) 
To: [EMAIL PROTECTED] 
Sent: Sunday, October 27, 2002 
23:42
Subject: RE: Converting PEM file to 
PKCS12 or PFX for the MacOS (Not Mac OSx)...

Hi 
there
 
I 
would think the command used by openssl is the same, irrespective of OS 
used?? Something like this would work for a 
PEM certificate:
 

openssl pkcs12 -export -in someCert.crt -inkey someCert.key 
-out someCert.p12
Regards
Jose
 

  -Original Message-From: Auteria Wally Winzer Jr. 
  [mailto:[EMAIL PROTECTED]]Sent: 25 October 2002 
  16:27To: [EMAIL PROTECTED]Cc: Auteria Wally 
  Winzer Jr.Subject: Converting PEM file to PKCS12 or PFX for the 
  MacOS (Not Mac OSx)...
  has anyone converted pem files into pkcs12, pfx, or der 
  format explicitly for the MacOS versions 8.5 and above?
  i have 3 macs that needs CA's loaded.  if anyone 
  has done this by all means give me the lowdown.
  i really appreciate everyone's efforts in solving this 
  major issue, one being the CEO!
   
  thanks!
   
  wally winzer 
jr.


RE: Converting PEM file to PKCS12 or PFX for the MacOS (Not Mac OSx)...

2002-10-27 Thread Jose Correia (J)



Hi 
there
 
I 
would think the command used by openssl is the same, irrespective of OS used?? 
Something like this would work for a PEM certificate:
 

openssl pkcs12 -export -in someCert.crt -inkey someCert.key -out 
someCert.p12
Regards
Jose
 

  -Original Message-From: Auteria Wally Winzer Jr. 
  [mailto:[EMAIL PROTECTED]]Sent: 25 October 2002 
  16:27To: [EMAIL PROTECTED]Cc: Auteria Wally 
  Winzer Jr.Subject: Converting PEM file to PKCS12 or PFX for the 
  MacOS (Not Mac OSx)...
  has anyone converted pem files into pkcs12, pfx, or der 
  format explicitly for the MacOS versions 8.5 and above?
  i have 3 macs that needs CA's loaded.  if anyone has 
  done this by all means give me the lowdown.
  i really appreciate everyone's efforts in solving this major 
  issue, one being the CEO!
   
  thanks!
   
  wally winzer jr.


RE: CSR / CA Issued Certificate

2002-10-15 Thread Jose Correia (J)
ram
Files\\Javasoft\\jre\\1.3.1\\lib\\security\\jssecacerts");
System.setProperty("javax.net.ssl.keyStore", "C:\\Program
Files\\Javasoft\\jre\\1.3.1\\lib\\security\\jsseclientcerts");

I used Innovate's HTTPClient after this, in which I set the SSL Socket
factory after I initialized the SSLContext.

2.  If the client certificate and the CA certificate are meant for
browser use, then the client certificate has to be first generated
using openssl (just like we did our server certificate), signed and
then converted to pkcs12 format. So something like this would work:
·   Generate a certificate request.
 perl CA.pl -newreq

 Fill in the client certificate details (all of them),
something like:
 Country Name (2 letter code) [AU]:ZA
 State or Province Name (full name) [Some-State]:WP
 Locality Name (eg, city) []:Cape Town
 Organization Name (eg, company) [Internet Widgits Pty
Ltd]:telkom
 Organizational Unit Name (eg, section) []:users
 Common Name (eg, YOUR name) []:Jose
 Email Address []:[EMAIL PROTECTED]

Sign the request:
 perl CA.pl -sign

·   Extract the key into a separate file:
  openssl rsa < newreq.pem > newkey.pem 
·   Rename the three files for convenience:
   mv newcert.pem client2.crt
   mv newreq.pem client2.req
   mv newkey.pem client2.key

·   Now convert it to PKCS12 format:
   openssl pkcs12 -export -in client2.crt -inkey server.key -out
client2.p12

·   Convert the CA certificate into PKCS12 format as well:
  openssl pkcs12 -export -in demoCA/cacert.pem -inkey  
  /demoCA/private/ca.key -out cacert.p12 

·   Now import these on to the client's browser (first import the
CA one).

And that's about it. Btw I used jdk 1.3.1 with JSSE 1.0.3

Cheers
Jose



-Original Message-
From: Fisk, Kevin [mailto:[EMAIL PROTECTED]]
Sent: 15 October 2002 17:55
To: [EMAIL PROTECTED]
Cc: Moffet, Scott
Subject: RE: CSR / CA Issued Certificate


Please ... how did you do it?

-Original Message-
From: Jose Correia (J) [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 15, 2002 12:26 AM
To: [EMAIL PROTECTED]
Subject: RE: CSR / CA Issued Certificate


Hi Kevin

I have successfully used client certificate signed by my own CA using
JSSE... let me know if you are interested in knowing how...

Cheers
Jose

-Original Message-
From: Fisk, Kevin [mailto:[EMAIL PROTECTED]]
Sent: 15 October 2002 02:01
To: [EMAIL PROTECTED]
Subject: CSR / CA Issued Certificate


I've been using OpenSSL a great deal, though this is going to come out
sounding a lot like a newbie question.

I need to generate a CSR so I can order a Verisign certificate.  Our
server currently uses a self signed cert and key pair for the server.
If I order a Verisign certificate, it is the digital cert only.  Is
the server's key the key I generate for the CSR?

The self-signed cert would be fine, however, JSSE refuses to connect
with the server because it is not a trusted certificate.  Am I on the
right track?

Kevin

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: new release of mod_authz_ldap

2002-10-10 Thread Jose Correia (J)

The module is still not available at:

http://authzldap.othello.ch/download.html


Regards
Jose Correia

-Original Message-
From: Andreas Mueller [mailto:[EMAIL PROTECTED]]
Sent: 10 October 2002 10:59
To: [EMAIL PROTECTED]
Subject: new release of mod_authz_ldap


Since  the  OpenSSL  users list has been used for questions about
mod_authz_ldap  (a  X.509  certificate  verification  module  for
mod_ssl)  in the past, and in particular availabilty for apache 2
was a recuring theme, I dare to abuse the list to  announce  that
the  promised  release  0.22, featuring apache 2 support was just
released. Please see http://authzldap.othello.ch for details.

Mit herzlichem Gruss

Andreas Mueller

--
Dr. Andreas Mueller, Beratung und Entwicklung
CH-8852 Altendorf Switzerland
Tel: +41 55 4621483   Fax: +41 55 4621485
[EMAIL PROTECTED]



__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Apache 2.0.39 + ssl + ldap with client certificate authentication

2002-10-03 Thread Jose Correia (J)

Hi Vadim

The patch allows for both certificate and basic authentication. 

Check http://authzldap.othello.ch/howto.html for two examples on how
to use it. Do be aware that at the moment it's only mean for Apache
1.3.x. I did see a posting by the author himself on this list
yesterday, saying he was adding support for Apache 2 fairly soon.

W.r.t : "What kind of LDAP lookup works best with
X509_NAME_oneline()-style names?"
do check the howto's. The certificate authentication can be done
against the certificate subject or serial number.

W.r.t: "Should the LDAP tree be somewhat special?"
It does have to implement a few objects as shown in the howto but its
fairly simple.

I used Openldap as my ldap server and it worked nicely.

Cheers
Jose


-Original Message-
From: Vadim Fedukovich [mailto:[EMAIL PROTECTED]]
Sent: 02 October 2002 17:41
To: [EMAIL PROTECTED]
Subject: Re: Apache 2.0.39 + ssl + ldap with client certificate
authentication


Hi Jose,

would you please outline how exactly one could use this patch?
What kind of LDAP lookup works best with X509_NAME_oneline()-style
names?
Should the LDAP tree be somewhat special?

thank you and sorry for off-topic,
Vadim

On Wed, Oct 02, 2002 at 08:50:36AM +0200, Jose Correia (J) wrote:
> Hi Sarah
>  
> Take a look at http://authzldap.othello.ch/index.html
>  
> I've used it successfully.
>  
> Cheers
> Jose
>  
> 
> -Original Message-
> From: Sarath Chandra M [mailto:[EMAIL PROTECTED]]
> Sent: 29 September 2002 11:17
> To: [EMAIL PROTECTED]
> Subject: Apache 2.0.39 + ssl + ldap with client certificate
> authentication
> 
> 
>  
> Dear group,
> Has anybody tried doing ldap client certificate authentication for
an
> apache
> 2.0.39 ssl server ?
> 
> Our environment is :
> RedHat linux 7.1 kernel 2.4.x
> apache 2.0.39 (inc. mod_ssl)
> openssl-engine-0.9.6g
> openldap (on a different redhat linux server)
> 
> The apache website has a verisign server certificate, a self-signed
CA
> certificate and all clients have
> certificates in the ldap server signed by this CA.
> 
> When clients present their certificate to browse the Apache secure
> site,
> Apache should check the
> existence of their certificate in the LDAP server and also the
> validity of
> the contents of the certificate presented.
> 
> Kindly provide some direction to any solution or resources related
to
> this
> issue.
> 
> Any help would be highly appreciated.
> 
> TIA
> Sarath
> 
> 
> 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Validity period of certificates

2002-10-02 Thread Jose Correia (J)

You mean how to create a certificate using openssl?


-Original Message-
From: Radboud Platvoet [mailto:[EMAIL PROTECTED]]
Sent: 02 October 2002 13:52
To: [EMAIL PROTECTED]
Subject: RE: Validity period of certificates


In order for me to use these macros, I first need to load an X509
structure
with my certificate (located in a .pem file). Does anybody know how to
do
this?

Thanks,
Radboud

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Vijo Cherian
Sent: Friday, September 27, 2002 10:27 PM
To: [EMAIL PROTECTED]
Subject: Re: Validity period of certificates


X509_get_notBefore()
X509_get_notAfter()
are your friends.

make sure you dont use that key/cert in any production systems.

vijo.


On Fri, Sep 27, 2002 at 03:39:07PM +0200, Radboud Platvoet wrote:
> Thanks guys,
>
> That works great. However, I would really like to do it with a call
from
my
> C code and not in the shell.
>
> -Radboud
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Michiels
Olivier
> Sent: Friday, September 27, 2002 3:04 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Validity period of certificates
>
>
> Hi,
> take the BEGIN CERTIFICATE to the END CERTIFICATE part, put it in a
file,
> then do : openssl x509 -in yourfile -text.
> You will see the start and the end date at the beginning of the
response.
>
> Hope this help,
>
> Michiels Olivier
>
> Radboud Platvoet wrote:
>
> >Hi everyone,
> >
> >I would like to know if there is a way to find out for what period
a
> >certificate is valid (ie: the start and end date).
> >
> >This is the certificate from which I like to determine the validity
period:
> >
> >-BEGIN RSA PRIVATE KEY-
> >MIICXQIBAAKBgQDHbmDreHdsfXmdgiveojbx2hVrJPvzxzQ0Ug6g0KxOYUVSSLbs
> >xBCW5PGQEn6a++AI6SMt13MTidpUJZmiPiOB2/D7Lg1YMJNQgJ8VfpzWESvgtQCV
> >6txwVWz0gGSnmJ8EkLhaY0t57PhrEqM2RpZKgiBl08bueXCazblhWpyvOQIDAQAB
> >AoGAB33wCiiGY/76uJ4RQ9XYNpG4yEOla20KWwTSI9xy/KbO0d6FcLOU4/ZJ1N28
> >/9mCexM3DRvQ6OT+3LZk5SFsd/1dOEi+P5rhIOAe/0VReiS5oIlhqr6lhOF4/WHp
> >OZwglVDuB1U+zqX3fb6exkBlfcg8nv/iaI7GrxRl+ib9bWECQQD3crtg8DkLXT1o
> >zwqgNyobPQgv0TJaCHAIub/XVjN2jkTU6HJPrPh6RUBTPAx/pW5CSuxGqcRDRgan
> >RP6Zqu8NAkEAzlLSauaZhGGQXROxaac8Q7v423e/CTXKwCHAhkOIlKHBcq2Qzvo6
> >PrHzAKYVsOx5fwMZATe86Kz8OeSgoCFV3QJATILFPWwJt2HVIxshhfiIpHNynJZq
> >ozwIqCoHD2Yv83B6B/r3nXs2OVhAU3w1wSI9vXG9LPxBGywD0qSatJkN4QJBAMoR
> >MUVDLU0KpHGUDOhVwl7wJO0EnRNvHHAJXl3gnE49EZG3zR/4z7yBWWXkQ1AweVlc
> >dkvMA/a5HJmygWHy4/0CQQCybDrUXfLGmfCL3R95fc3/XfHF+VodnfZoWY09hjQO
> >wYPK/0sAatyAW4I9ks0XCoWbPBJEOueX5TAixPhh0pkn
> >-END RSA PRIVATE KEY-
> >-BEGIN CERTIFICATE-
> >MIICkzCCAfygAwIBAgIBADANBgkqhkiG9w0BAQQFADCBgzELMAkGA1UEBhMCTkwx
> >FTATBgNVBAgTDFp1aWQgSG9sbGFuZDESMBAGA1UEBxMJUm90dGVyZGFtMRMwEQYD
> >VQQKEwpEaWdpdm94IEJWMSEwHwYDVQQLExhSZXNlYXJjaCBhbmQgRGV2ZWxvcG1l
> >bnQxETAPBgNVBAMTCFMyU2VydmVyMB4XDTAyMDkyNzA3MzM1NFoXDTAzMDkyNzA3
> >MzM1NFowgYMxCzAJBgNVBAYTAk5MMRUwEwYDVQQIEwxadWlkIEhvbGxhbmQxEjAQ
> >BgNVBAcTCVJvdHRlcmRhbTETMBEGA1UEChMKRGlnaXZveCBCVjEhMB8GA1UECxMY
> >UmVzZWFyY2ggYW5kIERldmVsb3BtZW50MREwDwYDVQQDEwhTMlNlcnZlcjCBnzAN
> >BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAx25g63h3bH15nYIr3qI28doVayT788c0
> >NFIOoNCsTmFFUki27MQQluTxkBJ+mvvgCOkjLddzE4naVCWZoj4jgdvw+y4NWDCT
> >UICfFX6c1hEr4LUAlerccFVs9IBkp5ifBJC4WmNLeez4axKjNkaWSoIgZdPG7nlw
> >ms25YVqcrzkCAwEAAaMVMBMwEQYJYIZIAYb4QgEBBAQDAgZAMA0GCSqGSIb3DQEB
> >BAUAA4GBAA4al9nd/lph0P+RKoOfDPZXLFf1kfU7dHJIrXR5F9HvhVuVNyFLNyTO
> >JXq8M/mcPM9eGNEfOwdGjHZCM91pduauvTZ6rqUOHIDV5oQdqVsCEMdZa5t2aTS+
> >g+ffMr6+aAm+ax3eU3/5tk1T2RkVOsIFEYCymiaMcXsVCFUvi/Pn
> >-END CERTIFICATE-
> >
> >Any help is greatly appreciated!
> >
> >Thanks,
> >Radboud
> >
>
>_
_
> >OpenSSL Project
http://www.openssl.org
> >User Support Mailing List
[EMAIL PROTECTED]
> >Automated List Manager
[EMAIL PROTECTED]
> >
> >
>
>
>
__
> OpenSSL Project
http://www.openssl.org
> User Support Mailing List
[EMAIL PROTECTED]
> Automated List Manager
[EMAIL PROTECTED]
>
>
__
> OpenSSL Project
http://www.openssl.org
> User Support Mailing List
[EMAIL PROTECTED]
> Automated List Manager
[EMAIL PROTECTED]

--
vijo
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project h

RE: Validity period of certificates

2002-09-27 Thread Jose Correia (J)

Try

openssl x509 -in thiscert -noout -dates

do a man x509 for more info.

Cheers
Jose


-Original Message-
From: Radboud Platvoet [mailto:[EMAIL PROTECTED]]
Sent: 27 September 2002 14:43
To: [EMAIL PROTECTED]
Subject: Validity period of certificates


Hi everyone,

I would like to know if there is a way to find out for what period a
certificate is valid (ie: the start and end date).

This is the certificate from which I like to determine the validity
period:

-BEGIN RSA PRIVATE KEY-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-END RSA PRIVATE KEY-
-BEGIN CERTIFICATE-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-END CERTIFICATE-

Any help is greatly appreciated!

Thanks,
Radboud

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Multiple server certificates

2002-09-26 Thread Jose Correia (J)

To my knwoledge no, as Apache only allows you to specify one server
certificate and key.


-Original Message-
From: Xperex Tim [mailto:[EMAIL PROTECTED]]
Sent: 27 September 2002 03:20
To: openssl
Subject: Multiple server certificates


With client authentication, the server sends a list of acceptable CA's
to the client in the
Certificate Request, so a client may have multiple identities and
choose an appropriate one.  Is
there something similar for the usual server authentication?  I.e. can
a server have multiple
certificates and either present them all or present the one that the
client can accept?  I haven't
found any such capability so far.

Thanks,

Tim


__
Do you Yahoo!?
New DSL Internet Access from SBC & Yahoo!
http://sbc.yahoo.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: how to generate a DSA certificate?

2002-09-22 Thread Jose Correia (J)

Hi Touria

Take a look at:

http://resin.csoft.net/~resin/cgi-bin/man.cgi?section=8&topic=ssl

where it says: GENERATING DSA SERVER CERTIFICATES

Alternatively if you do a search using google or some other search
engine using keywords like: "generating DSA certificates with openssl"

you would find others too.

Regards
Jose 



-Original Message-
From: Touria Zaddaoui [mailto:[EMAIL PROTECTED]]
Sent: 21 September 2002 13:36
To: [EMAIL PROTECTED]
Subject: how to generate a DSA certificate?




hello everybody,
this is the problem i have with generating a dsa certificate:
after generating a CA private keys & certificate, i do the following
command to generate a DSA certificate signed by the already generated
CA
credentials:
1- openssl dsaparam -out dsap.pem 512

2-openssl req -new -nodes -out req1.pem -keyout priv.pem -config
open_test.cnf -newkey dsa:dsap.pem
//open_test.cnf is the configuration file that contains client
information

3-openssl x509 -req -CA cacert.pem -CAkey cakey.pem -in req1.pem -out
cert.pem -CAcreateserial -passin pass:default -days 12 -trustout

but when i display certificate contents i get that the certificate was
signed using md5withRSA and not DSA as expected.
i hope someone can help me solve it out
thanks
 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: apache with client certificates

2002-09-19 Thread Jose Correia (J)

Thanks Paul, I'm busy looking at PureTLS as a solution.


-Original Message-
From: Paul L. Allen [mailto:[EMAIL PROTECTED]]
Sent: 18 September 2002 19:53
To: [EMAIL PROTECTED]
Subject: Re: apache with client certificates


"Jose Correia (J)" wrote:
> 
> [...]
> On my Java side I'm using JSSE 1.0.3 together with Innovation's
> HTTPClient like:

That's probably your problem.  I tried to get a Java/JSSE client
to do client-side authentication with a C/OpenSSL server recently
and couldn't get it to work.  I posted a query here and on our
local Java newsgroup and got zero responses from anybody who had
client-side authentication working with a JSSE client talking to
any sort of OpenSSL-based server.  Eric Rescorla suggested that 
I look at the PureTLS package that he wrote under contract for 
Claymore Systems.  I did, and it works.  

A Google search will point you to PureTLS.  It doesn't compile under
JDK 1.4, but you can build it under 1.3 and then use it with other
code built with 1.4.  That's what we did, and we're now busy solving
the customer's problem rather than trying to make our code work.

> [...]
> --- "Jose Correia (J)" <[EMAIL PROTECTED]> wrote:
> > Hi all
> >
> > Is anyone aware of Apache version 1.3.20 having problems with
client
> > authentication??
> > [...]

Apache is not likely the problem, unless there's a configuration
error.  You can verify this by watching a connection attempt with
ssldump.  If you see Apache requesting a client cert, but the client
doesn't send one, the problem is likely with the client.

Good luck!

Paul Allen
-- 
Boeing Phantom Works   \ Paul L. Allen, (425) 865-3297
Math & Computing Technology  \ [EMAIL PROTECTED]
POB 3707 M/S 7L-40, Seattle, WA 98124-2207 \ Prototype Systems Group
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: apache with client certificates

2002-09-18 Thread Jose Correia (J)

Actually how does Apache know about the client certificate that the
client has got?? Does it compare who signed the client certificate
with the CA it has in SSLCACertificateFile?

Thanks anyone.
Regards
Jose


-Original Message-
From: Jose Correia (J) 
Sent: 18 September 2002 14:52
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: apache with client certificates


Hi all

I'm actually now getting in ssl_engine.log:

[18/Sep/2002 14:41:57 32739] [error] OpenSSL: error:140890C7:SSL
routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
[Hint: No CAs known to server for verification?]

Any ideas? I don't understand how it can say "No CAs known to server
for verification" (although only a hint) if I am specifying:

SSLCACertificateFile /jose/CA2/demoCA/cacert.pem

in my httpd.conf...

Thanks
Jose



-Original Message-
From: Jose Correia (J) 
Sent: 18 September 2002 08:30
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: apache with client certificates


Hi there

I set the depth to 1 and I do have my cache set to:

SSLSessionCache dbm:/usr/local/apache/logs/ssl_scache
SSLSessionCacheTimeout  300
SSLMutex  file:/usr/local/apache/logs/ssl_mutex

Still not working...

Argghhh, this is so frustrating... any other ideas?

Did you put your CA into the local .keystore or in C:\Program
Files\JavaSoft\JRE\1.3.1\lib\security\cacerts??

On my Java side I'm using JSSE 1.0.3 together with Innovation's
HTTPClient like:

java.security.Security.addProvider(new
com.sun.net.ssl.internal.ssl.Provider());

SSLContext sc = SSLContext.getInstance("SSL");
TrustManagerFactory tmf =
TrustManagerFactory.getInstance("SunX509");

KeyManagerFactory kmf = KeyManagerFactory.getInstance( "SunX509" );

KeyStore ks = KeyStore.getInstance( "JKS") ;
char[] passphrase = "whatever".toCharArray();
ks.load(new FileInputStream("C:\\Documents and
Settings\\correij\\.keystore"), passphrase);

tmf.init(ks);
kmf.init(ks, passphrase);

sc.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);

HTTPConnection con = new HTTPConnection("https", urlString, -1);
con.setDefaultSSLSocketFactory(sc.getSocketFactory());
HTTPResponse response = con.Get("/test/servlet/ldapb2bservlet");
InputStream content = (InputStream)response.getInputStream();



Any other ideas, thanks...
-Original Message-
From: Xperex Tim [mailto:[EMAIL PROTECTED]]
Sent: 18 September 2002 01:07
To: [EMAIL PROTECTED]
Subject: Re: apache with client certificates


I am using Apache 1.3.26 with OpenSSL 0.9.6c and client authentication
works for me.  I have
SSLVerifyDepth set to 1 and specified an SSLSessionCache but otherwise
my setup is roughly the
same as yours.

--- "Jose Correia (J)" <[EMAIL PROTECTED]> wrote:
> Hi all
> 
> Is anyone aware of Apache version 1.3.20 having problems with client
> authentication??
> 
> I've created my own CA created using openssl (vs 0.9.6a). I then
> created and signed my server certificate with the CA using openssl.
> (apache is on a RH Linux 6.2 machine)
> 
> I then created a client public key using Java's keytool (from my
> Win2000 client machine). I then took this key and signed it with my
CA
> using openssl which I duly converted into DER format. I then
imported
> my CA's certificate in my JSSE keystore plus the now created client
> certificate which replaces the previous public key.
> 
> In my Apache I mention these:
> SSLCertificateFile /jose/CA2/server.crt
> SSLCertificateKeyFile /jose/CA2/server.key
> SSLCACertificateFile /jose/CA2/demoCA/cacert.pem
> SSLVerifyClient require
> SSLVerifyDepth  10
> 
> When I connect, I'm getting the following on ssl_engine.log
> 
> "[17/Sep/2002 15:20:22 28388] [error] SSL handshake failed (server
> 155.239.48.43:443, client 165.148.59.202) (OpenSSL library error
> follows)
> [17/Sep/2002 15:20:22 28388] [error] OpenSSL: error:14094416:SSL
> routines:SSL3_READ_BYTES:sslv3 alert certificate unknown"
> 
> and from my Java client I'm getting:
> 
> "main, SEND SSL v3.1 ALERT:  fatal, description =
certificate_unknown
> main, WRITE:  SSL v3.1 Alert, length = 2
> javax.net.ssl.SSLPeerUnverifiedException: peer not authenticated"
> 
> Hence my confusion since I know my client certificate was signed by
> the CA mentioned in apache httpd.conf... :-(
> 
> Anyone got a clue? I've searched extensevily...
> 
> Thanks a lot
> Jose Correia
>
__
> OpenSSL Project
http://www.openssl.org
> User Support Mailing List
[EMAIL PROTECTED]
> Automated List Manager
[EMAIL PROTECTED]


__
Do you Yahoo!?
Yahoo! 

RE: apache with client certificates

2002-09-18 Thread Jose Correia (J)

Hi all

I'm actually now getting in ssl_engine.log:

[18/Sep/2002 14:41:57 32739] [error] OpenSSL: error:140890C7:SSL
routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
[Hint: No CAs known to server for verification?]

Any ideas? I don't understand how it can say "No CAs known to server
for verification" (although only a hint) if I am specifying:

SSLCACertificateFile /jose/CA2/demoCA/cacert.pem

in my httpd.conf...

Thanks
Jose



-Original Message-
From: Jose Correia (J) 
Sent: 18 September 2002 08:30
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: apache with client certificates


Hi there

I set the depth to 1 and I do have my cache set to:

SSLSessionCache dbm:/usr/local/apache/logs/ssl_scache
SSLSessionCacheTimeout  300
SSLMutex  file:/usr/local/apache/logs/ssl_mutex

Still not working...

Argghhh, this is so frustrating... any other ideas?

Did you put your CA into the local .keystore or in C:\Program
Files\JavaSoft\JRE\1.3.1\lib\security\cacerts??

On my Java side I'm using JSSE 1.0.3 together with Innovation's
HTTPClient like:

java.security.Security.addProvider(new
com.sun.net.ssl.internal.ssl.Provider());

SSLContext sc = SSLContext.getInstance("SSL");
TrustManagerFactory tmf =
TrustManagerFactory.getInstance("SunX509");

KeyManagerFactory kmf = KeyManagerFactory.getInstance( "SunX509" );

KeyStore ks = KeyStore.getInstance( "JKS") ;
char[] passphrase = "whatever".toCharArray();
ks.load(new FileInputStream("C:\\Documents and
Settings\\correij\\.keystore"), passphrase);

tmf.init(ks);
kmf.init(ks, passphrase);

sc.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);

HTTPConnection con = new HTTPConnection("https", urlString, -1);
con.setDefaultSSLSocketFactory(sc.getSocketFactory());
HTTPResponse response = con.Get("/test/servlet/ldapb2bservlet");
InputStream content = (InputStream)response.getInputStream();



Any other ideas, thanks...
-Original Message-
From: Xperex Tim [mailto:[EMAIL PROTECTED]]
Sent: 18 September 2002 01:07
To: [EMAIL PROTECTED]
Subject: Re: apache with client certificates


I am using Apache 1.3.26 with OpenSSL 0.9.6c and client authentication
works for me.  I have
SSLVerifyDepth set to 1 and specified an SSLSessionCache but otherwise
my setup is roughly the
same as yours.

--- "Jose Correia (J)" <[EMAIL PROTECTED]> wrote:
> Hi all
> 
> Is anyone aware of Apache version 1.3.20 having problems with client
> authentication??
> 
> I've created my own CA created using openssl (vs 0.9.6a). I then
> created and signed my server certificate with the CA using openssl.
> (apache is on a RH Linux 6.2 machine)
> 
> I then created a client public key using Java's keytool (from my
> Win2000 client machine). I then took this key and signed it with my
CA
> using openssl which I duly converted into DER format. I then
imported
> my CA's certificate in my JSSE keystore plus the now created client
> certificate which replaces the previous public key.
> 
> In my Apache I mention these:
> SSLCertificateFile /jose/CA2/server.crt
> SSLCertificateKeyFile /jose/CA2/server.key
> SSLCACertificateFile /jose/CA2/demoCA/cacert.pem
> SSLVerifyClient require
> SSLVerifyDepth  10
> 
> When I connect, I'm getting the following on ssl_engine.log
> 
> "[17/Sep/2002 15:20:22 28388] [error] SSL handshake failed (server
> 155.239.48.43:443, client 165.148.59.202) (OpenSSL library error
> follows)
> [17/Sep/2002 15:20:22 28388] [error] OpenSSL: error:14094416:SSL
> routines:SSL3_READ_BYTES:sslv3 alert certificate unknown"
> 
> and from my Java client I'm getting:
> 
> "main, SEND SSL v3.1 ALERT:  fatal, description =
certificate_unknown
> main, WRITE:  SSL v3.1 Alert, length = 2
> javax.net.ssl.SSLPeerUnverifiedException: peer not authenticated"
> 
> Hence my confusion since I know my client certificate was signed by
> the CA mentioned in apache httpd.conf... :-(
> 
> Anyone got a clue? I've searched extensevily...
> 
> Thanks a lot
> Jose Correia
>
__
> OpenSSL Project
http://www.openssl.org
> User Support Mailing List
[EMAIL PROTECTED]
> Automated List Manager
[EMAIL PROTECTED]


__
Do you Yahoo!?
Yahoo! News - Today's headlines
http://news.yahoo.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project  

RE: apache with client certificates

2002-09-17 Thread Jose Correia (J)

Hi there

I set the depth to 1 and I do have my cache set to:

SSLSessionCache dbm:/usr/local/apache/logs/ssl_scache
SSLSessionCacheTimeout  300
SSLMutex  file:/usr/local/apache/logs/ssl_mutex

Still not working...

Argghhh, this is so frustrating... any other ideas?

Did you put your CA into the local .keystore or in C:\Program
Files\JavaSoft\JRE\1.3.1\lib\security\cacerts??

On my Java side I'm using JSSE 1.0.3 together with Innovation's
HTTPClient like:

java.security.Security.addProvider(new
com.sun.net.ssl.internal.ssl.Provider());

SSLContext sc = SSLContext.getInstance("SSL");
TrustManagerFactory tmf =
TrustManagerFactory.getInstance("SunX509");

KeyManagerFactory kmf = KeyManagerFactory.getInstance( "SunX509" );

KeyStore ks = KeyStore.getInstance( "JKS") ;
char[] passphrase = "whatever".toCharArray();
ks.load(new FileInputStream("C:\\Documents and
Settings\\correij\\.keystore"), passphrase);

tmf.init(ks);
kmf.init(ks, passphrase);

sc.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);

HTTPConnection con = new HTTPConnection("https", urlString, -1);
con.setDefaultSSLSocketFactory(sc.getSocketFactory());
HTTPResponse response = con.Get("/test/servlet/ldapb2bservlet");
InputStream content = (InputStream)response.getInputStream();



Any other ideas, thanks...
-Original Message-
From: Xperex Tim [mailto:[EMAIL PROTECTED]]
Sent: 18 September 2002 01:07
To: [EMAIL PROTECTED]
Subject: Re: apache with client certificates


I am using Apache 1.3.26 with OpenSSL 0.9.6c and client authentication
works for me.  I have
SSLVerifyDepth set to 1 and specified an SSLSessionCache but otherwise
my setup is roughly the
same as yours.

--- "Jose Correia (J)" <[EMAIL PROTECTED]> wrote:
> Hi all
> 
> Is anyone aware of Apache version 1.3.20 having problems with client
> authentication??
> 
> I've created my own CA created using openssl (vs 0.9.6a). I then
> created and signed my server certificate with the CA using openssl.
> (apache is on a RH Linux 6.2 machine)
> 
> I then created a client public key using Java's keytool (from my
> Win2000 client machine). I then took this key and signed it with my
CA
> using openssl which I duly converted into DER format. I then
imported
> my CA's certificate in my JSSE keystore plus the now created client
> certificate which replaces the previous public key.
> 
> In my Apache I mention these:
> SSLCertificateFile /jose/CA2/server.crt
> SSLCertificateKeyFile /jose/CA2/server.key
> SSLCACertificateFile /jose/CA2/demoCA/cacert.pem
> SSLVerifyClient require
> SSLVerifyDepth  10
> 
> When I connect, I'm getting the following on ssl_engine.log
> 
> "[17/Sep/2002 15:20:22 28388] [error] SSL handshake failed (server
> 155.239.48.43:443, client 165.148.59.202) (OpenSSL library error
> follows)
> [17/Sep/2002 15:20:22 28388] [error] OpenSSL: error:14094416:SSL
> routines:SSL3_READ_BYTES:sslv3 alert certificate unknown"
> 
> and from my Java client I'm getting:
> 
> "main, SEND SSL v3.1 ALERT:  fatal, description =
certificate_unknown
> main, WRITE:  SSL v3.1 Alert, length = 2
> javax.net.ssl.SSLPeerUnverifiedException: peer not authenticated"
> 
> Hence my confusion since I know my client certificate was signed by
> the CA mentioned in apache httpd.conf... :-(
> 
> Anyone got a clue? I've searched extensevily...
> 
> Thanks a lot
> Jose Correia
>
__
> OpenSSL Project
http://www.openssl.org
> User Support Mailing List
[EMAIL PROTECTED]
> Automated List Manager
[EMAIL PROTECTED]


__
Do you Yahoo!?
Yahoo! News - Today's headlines
http://news.yahoo.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



signing request question

2002-09-13 Thread Jose Correia (J)

Hi all

I've created my own CA.

I then proceeded in generating a new request which I duly signed.

My question is how do I make the CA return a chain of certificates
(starting with itself as the root and ending with this certificate)
instead of just returning the certificate itself?

I've searched the man pages and can't seem to find out anything there.

Thanks a lot
Jose Correia

--
---

This e-mail and its attachments may contain information that is
confidential
and that may be subject to legal privilege and copyright.  If you are
not
the intended recipient you may not peruse, use, disclose, distribute,
copy
or retain this message.  If you have received this message in error,
please
notify the sender immediately by e-mail, facsimile or telephone and
return
and thereafter destroy the original message.

Please note that e-mails are subject to viruses, data corruption,
delay,
interception and unauthorised amendment, and that the sender does not
accept
liability for any damages that may be incurred as a result of
communication
by e-mail. 

No employee or intermediary is authorised to conclude a binding
agreement on
behalf of the sender by e-mail without express written confirmation by
a
duly authorised representative of the sender. 

By transmitting this e-mail message over the Internet the sender does
not
intend to allow the contents hereof to become part of the public
domain, and
the confidential nature of the contents shall not be altered or
diminished
from by such transmission.
--
---
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



someone in the UK phone Andy pls

2002-09-12 Thread Jose Correia (J)

and tell him to phone someone at his company to disable his
auto-response thingy. Otherwise we are going to end up with hundreds
of these things...!!

Thanks
Jose


--
---

This e-mail and its attachments may contain information that is
confidential
and that may be subject to legal privilege and copyright.  If you are
not
the intended recipient you may not peruse, use, disclose, distribute,
copy
or retain this message.  If you have received this message in error,
please
notify the sender immediately by e-mail, facsimile or telephone and
return
and thereafter destroy the original message.

Please note that e-mails are subject to viruses, data corruption,
delay,
interception and unauthorised amendment, and that the sender does not
accept
liability for any damages that may be incurred as a result of
communication
by e-mail. 

No employee or intermediary is authorised to conclude a binding
agreement on
behalf of the sender by e-mail without express written confirmation by
a
duly authorised representative of the sender. 

By transmitting this e-mail message over the Internet the sender does
not
intend to allow the contents hereof to become part of the public
domain, and
the confidential nature of the contents shall not be altered or
diminished
from by such transmission.
--
---
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



"make certificate" question

2002-09-11 Thread Jose Correia (J)

i all

I'm trying to generate my fake client certificate for test purposes.

For this I'm using the "make certificate" command under apache (which
is tied to openssl via modssl).

I have a question in the process, when I reach STEP 3 it tells me:

"STEP 3: Generating X.509 certificate signed by Snake Oil CA
[server.crt]
Certificate Version (1 or 3) [3]:
Signature ok
subject=/O=telkom/OU=users/CN=Jose
Getting CA Private Key
Verify: matching certificate & key modulus
read RSA key
Verify: matching certificate signature
../conf/ssl.crt/server.crt: /C=XY/ST=Snake Desert/L=Snake Town/O=Snake
Oil, Ltd/OU=Certificate Authority/CN=Snake Oil
[EMAIL PROTECTED]
error 10 at 1 depth lookup:Certificate has expired
OK"

Does this mean my server.crt wasn't signed by the CA SnakeOil because
it has expired??

Thanks in advance
Jose Correia
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]