Yes it's only for testing so it doesn't matter.
But how do I do this?
2017-11-30 19:54 GMT+01:00 Viktor Dukhovni :
>
>
> > On Nov 30, 2017, at 2:46 AM, Pascal Withopf
> wrote:
> >
> > Here is serverCA.pem as a file and as text
>
> These are, I expec
/UWf8bNWMQ0wsMJCIxlHzb+dHaM/2B06oRbwfwvj/rdcA4hueJF
HY1fvva2E7YEpaGAKoT1LKQhadyJBf5a7UIhEzUV/OUsIfYCDzmF4DmwI5biBZpy
S887uY+40OP1b1NXktdPF3ejjYKZC7U=
-END CERTIFICATE-
2017-11-29 18:38 GMT+01:00 Viktor Dukhovni :
>
>
> > On Nov 29, 2017, at 10:57 AM, Pascal Withopf
> wrote:
&g
:33:39PM +0100, Pascal Withopf wrote:
>
> > Which means I have the following certificate chain:
> > root.pem -> serverCA.pem -> server.pem
> >
> > But when I try to make a connection I see following error at the client
> > side:
> > Error with certificat
4 at 1 depth lookup:invalid CA certificate
OK
When I sign my server certificate directly with the root CA and leave the
server CA out everything works fine.
Did I do something wrong creating the certificates? Or where could the
problem be?
Best Regards
Pascal Withopf
--
openssl-users mailing