new version of mod_authz_ldap

2002-10-08 Thread Sarath Chandra M

Is that new version of mod_authz_ldap ready ? I'm not in an hurry. Just
curious to try.
regards
sarath


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of Andreas Mueller
Sent: Wednesday, October 02, 2002 8:18 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: Apache 2.0.39 + ssl + ldap with client certificate
authentication


On Wed, 2 Oct 2002, Sarath Chandra M wrote:
> Dear Jose,
> I had looked at the site u mentioned. But my problem is in applying 
> the patch (http://authzldap.othello.ch/modssl-patch.html) to mod_ssl 
> as said in the installation page of the same site. If you could tell 
> me how to apply this patch, then I can go ahead and try.

I'm right now working on a new release of the module that is sup- posed
to support apache2, hopefully I'll get that out of the door today or
tomorrow.

Mit herzlichem Gruss

Andreas Mueller

--
Dr. Andreas Mueller, Beratung und Entwicklung
CH-8852 Altendorf Switzerland
Tel: +41 55 4621483   Fax: +41 55 4621485
[EMAIL PROTECTED]



__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Apache 2.0.39 + ssl + ldap with client certificate authentication

2002-09-29 Thread Sarath Chandra M
Title: Message



 
Dear group,Has anybody tried doing ldap client certificate 
authentication for an apache2.0.39 ssl server ?Our environment is 
:RedHat linux 7.1 kernel 2.4.xapache 2.0.39 (inc. 
mod_ssl)openssl-engine-0.9.6gopenldap (on a different redhat linux 
server)The apache website has a verisign server certificate, a 
self-signed CAcertificate and all clients havecertificates in the ldap 
server signed by this CA.When clients present their certificate to 
browse the Apache secure site,Apache should check theexistence of their 
certificate in the LDAP server and also the validity ofthe contents of the 
certificate presented.Kindly provide some direction to any solution or 
resources related to thisissue.Any help would be highly 
appreciated.TIASarath


how to reissue certificate

2002-04-04 Thread Sarath Chandra M

Hi,
I am using openssl in linux. I hav a default configuration.
I created a selfsigned CA certificate and some user certificates.
There is some problem with one of the certificates as I am unable
to import it in internet explorer. Now I would like to reissue
certificates to this user. But the entry will be in index.txt.
How can I create another certificate for this user ? If I create a CRL
and revoke this user certificate, will I be able to issue a new one for
the same user without any problem ? Kindly guide me for this issue.

regards
Sarath Chandra M

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



FW: create cert non interactively

2002-04-02 Thread Sarath Chandra M

Dear friends, thanx a lot for the help.
I am doing this way.
A shell script to accept values for each attribute and put these in a
info.inf file.
Then do this :
openssl req -new -key prikey.pem -out req.csr < info.inf

thanx again.
sarath



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of Aleix Conchillo
Sent: Tuesday, April 02, 2002 2:05 PM
To: [EMAIL PROTECTED]
Subject: Re: create cert non interactively


On Tue, 2002-04-02 at 11:50, Sarath Chandra M wrote:
> Hi,
> Is there way to create certificates using openssl in a noninteractive 
> mode ? All the required values (common name, email, organization, ou 
> etc) will be captured using a unix shell script
> and passed to openssl commands.
> Is it possible. Any help will be highly appreciated.
>  

i do it this way. there is probably a better one:

openssl req -new -key prikey.pem -out req.csr < info_file

where info_file is a generated file (in this case with your shell
script) and looks like this:

--
ES
Your state
Your city
Your organization
Your organizational unit
Your name
--

if you don't want to fill any of the fields just leave a blank line.

hope this helps.


best regards,

-- 
Aleix Conchillo Flaqué
http://www.scytl.com

 ---
  PGP Key: http://www.scytl.com/pgp-keys/AleixConchillo.asc
 ---

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



create cert non interactively

2002-04-02 Thread Sarath Chandra M
Title: Message



Hi,
Is there way to create certificates using 
openssl in a noninteractive mode ? All the required
values (common name, email, organization, ou 
etc) will be captured using a unix shell script
and passed to openssl commands.
Is it possible. Any help will be highly 
appreciated.
 
regards
sarath
 
 
 


FW: reg. CA expiry/renewal and effect on Client certs

2002-03-23 Thread Sarath Chandra M



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of Sarath Chandra M
Sent: Thursday, March 21, 2002 6:38 PM
To: [EMAIL PROTECTED]
Subject: reg. CA expiry/renewal and effect on Client certs


Hi,
We hav a CA certificate and Client certificates generated using
openssl. All configurations are default ones. My doubt is if/when the CA
expires and I renew/extend its life, will the Client certificates get
affected in anyway. In our case, the Client certificates are stored in
hardware tokens and sent to users. What has to be done to ensure smooth
operations in this case. Any help will be highly appreciated.

regards
Sarath Chandra M

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



reg. CA expiry/renewal and effect on Client certs

2002-03-18 Thread Sarath Chandra M

Hi,
We hav a CA certificate and Client certificates generated using
openssl. All configurations are default ones. My doubt is if/when the CA
expires and I renew/extend its life, will the Client certificates get
affected in anyway. In our case, the Client certificates are stored in
hardware tokens and sent to users. What has to be done to ensure smooth
operations in this case. Any help will be highly appreciated.

regards
Sarath Chandra M

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



where is the private key ?

2001-12-07 Thread Sarath Chandra M
Title: Message



Hi,
I am 
generating client certificates using this method at the openssl 
server:
 
openssl genrsa -des3 -out user.key 
1024
openssl req -new -config openssl.cnf -key user.key -out 
user.csr
openssl ca -config openssl.cnf -cert 
CA.pem -in user.csr -keyfile CA.key -out 
user.crt
 
After this, I 
am exporting the user.crt to the browser for that user. Its working fine. 
Now, I would like
to know where the 
private key of the user is ? 
I am using the 
user.crt to put it in the user entry in the ldap server. Does this user.crt 
contain
client's private 
key also ?
 
If I need the 
user.crt in pkcs12 format, I use
openssl pkcs12 
-export -in user.crt -inkey user.key -out 
user.pfx
 
Anything wrong 
with this export ? Does it contain the private key 
?
 
I am doing all 
these without proper knowledge of openssl. Half knowledge is dangerous. But I 
can't
help it now. So 
kindly bear with me if there's anything stupid in the method 
above.
 
thanx and 
regards
sarath
 


how to generate key pair at client browser (IE)

2001-12-06 Thread Sarath Chandra M
Title: Message



Hi,
I have 
a requirement like this. Users/clients will access a web site, fill in a form, 
generate a keypair and send it to 
server. the csr is done at the server. client cert is 
created in the server and sent back thru email. Is this a 
proper
approach ? If so, I would like to get some help in 
constructing the setup. I have openssl ready and working. 
Only
thing 
is web (site) interface for the html form. Also, how to generate the keypair at 
the client (browser) ? I cant
find 
that certenr3.dll. Is there any other java/javascript program to do it without 
depending on microsoft dlls ?
Any help will be highly appreciated.  First I would like to try generating key pair with just a 
html page in Win2K.
 
regards
Sarath
 


RE: dont want private key of the client in the ldap

2001-11-21 Thread Sarath Chandra M
Title: RE: dont want private key of the client in the ldap





Steve,
Could you please let me know the exact openssl commands for generating the CA cert
and Client certs, both without compromising the private keys. 


As u told, CAs private key is sent to everyone in the following method. But I couldnt find
how to stop this.


And also, I want to generate the client certificates using just the CSR and also dont want
to store anything else in the ldap entries except the certificate alone. I would like
to know the openssl command steps for this also.


All I did was follow some openssl cookbook found somewhere in the net. Couldnt find
any specialist procedure (inc. step by step commands) for generating CA and client certs.


Waiting for guidance.
Sarath



 
> Hi everybody,
> I trying to do client authentication using self signed CA and client certificates. I want to store the client
> certificate in the ldap entries. The CA certificate is in the web server. I followed the below mentioned steps
> to create the CA and client certificates :
>  
> CA Certificate
> # generate the key for the certificate and store it in .key file
> openssl genrsa -des3 -out $CA_DIR/CA.key 1024
>  
> # sign the request for the CA cert and store it in .csr file
> openssl req -new -x509 -days 365 -config $SSLDIR/openssl.cnf -key $CA_DIR/CA.key -out $CA_DIR/CA.crt
> # convert the cert into pkcs12 format so that it can imported into IE
> openssl pkcs12 -export -in $CA_DIR/CA.crt -inkey $CA_DIR/CA.key -out $CA_DIR/CA.pfx
> 


DO NOT DO THIS!! This gives away your CAs private key to everyone using
it and renders it useless.


Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Gemplus: http://www.gemplus.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.


__
OpenSSL Project http://www.openssl.org
User Support Mailing List    [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]





dont want private key of the client in the ldap

2001-11-11 Thread Sarath Chandra M



Hi 
everybody,
    I trying to do client authentication using self signed 
CA and client certificates. I want to store the client
certificate in the ldap entries. The CA certificate is in the web server. 
I followed the below mentioned steps
to 
create the CA and client certificates :
 
CA 
Certificate
# 
generate the key for the certificate and store it in .key fileopenssl 
genrsa -des3 -out $CA_DIR/CA.key 1024
 
# 
sign the request for the CA cert and store it in .csr 
file
openssl 
req -new -x509 -days 365 -config $SSLDIR/openssl.cnf -key $CA_DIR/CA.key -out 
$CA_DIR/CA.crt
# 
convert the cert into pkcs12 format so that it can imported into IEopenssl 
pkcs12 -export -in $CA_DIR/CA.crt -inkey $CA_DIR/CA.key -out $CA_DIR/CA.pfxClient 
Certificate# 
generate the key for the client certificate and store it in User.key 
fileopenssl genrsa -des3 -out $CLIENT_DIR/User.key 1024# 
sign the request for the client cert and store it in User.csr fileopenssl 
req -new -config $SSLDIR/openssl.cnf -key $CLIENT_DIR/User.key -out 
$CLIENT_DIR/User.csr# 
generate the client cert and store it in UserID.crtopenssl ca -config 
$SSLDIR/openssl.cnf -cert $CA_DIR/CA.pem -in $CLIENT_DIR/User.csr -keyfile 
$CA_DIR/CA.key -out $CLIENT_DIR/User.crtNow I am storing this client 
certificate in the ldap entry of the client/user. What I would like to know is, 
whether
the 
private key of the client is also being stored in the certificate ? Because I 
dont want the private key of the
client 
certificate to be on the ldap. How to do it 
?
 
Any 
help please.
 
regards
Sarath
 
 
 


how to replace expired CA certificate

2001-10-20 Thread Sarath Chandra M



Hi,
    Recently I generated a CA 
certificate using openssl and installed it on a iPlanet 
webserver.
This 
certificate has expired. Now I regenerated a new CA certificate. In the 
webserver, I
removed the old one and installed the new one. 
But ssl is failing.  Is it a problem with 
openssl
new CA 
generation or I missed something in the iPlanet webserver ?
Any 
help please.
regards
Sarath Chandra M 

  
  
IT Dept.
  
UAE Exchange Centre 
  LLC
  
PO Box 170, Abu Dhabi, 
  UAE
  
Phone
 02-6322166, 
  6394342
  
Fax
 02-6221447, 
  6340713
  
GSM
 050-4450417
Confidentiality Notice: This e-mail message, 
including any attachments, is for the sole use of the intended recipient(s) and 
may contain confidential and privileged information. Any unauthorized review, 
use, disclosure or distribution is prohibited. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message.
 


RE: CRL how to

2001-09-25 Thread Sarath Chandra M
Title: RE: CRL how to





Hi,
    How to automatically put an entry in the CRL when a new
Client certificate is generated.


regards
Sarath


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]
Sent: 25 September 2001 13:28
To: [EMAIL PROTECTED]
Subject: RE: CRL how to



Hi Sarath,
In the openssl CA Directory there is a file named "index.txt" which contains
a summary of
the issued certificate. For example:
V   020925082220Z       01  unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=Goofy
V   020925082341Z       02  unknown /C=AU/ST=New Zeland/L=Wellington/O=Internet
Widgits Pty Ltd/OU=uncle duck/CN=Gogo
This entries must be modified in order to make the CRL:
R   020925082220Z   010925090120Z   01  unknown /C=AU/ST=Some-State/O=Internet
Widgits Pty Ltd/CN=Goofy
R   020925082341Z   010925092341Z   02  unknown /C=AU/ST=New Zeland/L=Wellington/O=Internet
Widgits Pty Ltd/OU=uncle duck/CN=Gogo


At this point just enter the following statements at prompt:
$ ca -gencrl -crldays 30 -out temp.pem
$ crl2pkcs -in temp.pem -out pkcs7_crl.pem


At this point you have a PKCS7 file containing a CRL, which can be imported
into
whatever application supporting it.


Best Regards
                        [Gerardo Maiorano]


-- Original Message --


>
>Hi,
>    I have installed openssl and have started generating client
>certificates. I would like to
>know, how I can create and maintain CRLs.
> 
>I would appreciate if anybody provides any help or resource pointers for
>this.
> 
>thanx in advance
>Sarath Chandra M 
> 
>




__
Abbonati a Tiscali!
Con VoceViva puoi anche ascoltare ed inviare email al telefono.
Chiama VoceViva all' 892 800    http://voceviva.tiscali.it





__
OpenSSL Project http://www.openssl.org
User Support Mailing List    [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]





CRL how to

2001-09-25 Thread Sarath Chandra M



Hi,
    I have installed openssl and have 
started generating client certificates. I would like to
know, 
how I can create and maintain CRLs.
 
I 
would appreciate if anybody provides any help or resource pointers for 
this.
 
thanx 
in advanceSarath Chandra 
M