Re: Unable to load self-signed certificate

2022-07-29 Thread radiatejava
Actually the error is: 533:error:02001002:system library:fopen:No such file or directory:bss_file.c:175:fopen('/opt/ssl-v1.02u/ssl/cert.pem','r') 533:error:2006D080:BIO routines:BIO_new_file:no such file:bss_file.c:182: 533:error:0B084002:x509 certificate routines:X509_load_cert_crl_file:system li

Unable to load self-signed certificate

2022-07-27 Thread radiatejava
Hello experts I used to load a self-signed cert using a program like below: X509_STORE_set_verify_cb_func(lCertCtx, UserCert_cb_check_cert); lLookup = X509_STORE_add_lookup(lCertCtx, X509_LOOKUP_file()); error = X509_LOOKUP_load_file(lLookup, NULL, X509_FILETYPE_DEFAULT); It was all working great

Re: facing issue in sha512 self - signed certificate

2021-04-22 Thread Mark Hack
You will need to be a lot more specific - this works fine openssl s_client -connect localhost:443 | openssl x509 -noout -text Can't use SSL_get_servername depth=0 C = US, ST = TX, L = Somewhere, O = MarkHack, OU = Test, CN = fakeserver.com verify error:num=18:self signed certificate verify r

Re: facing issue in sha512 self - signed certificate

2021-04-22 Thread Vadivel P
Hi All, Looking for the same support of SHA512. Do we have sha512 support in any open source ? Please let me know. Regards, Vadivel On Mon, Apr 19, 2021, 13:15 preethi teekaraman wrote: > Hi Openssl, > > I'm creating sha512 self signed certificate for establishing connection &g

facing issue in sha512 self - signed certificate

2021-04-19 Thread preethi teekaraman
Hi Openssl, I'm creating sha512 self signed certificate for establishing connection between client and server(nginx server). creating separate key, cert for server and root cert for client. below is the link i followed for cert creation: https://gist.github.com/f

Re: How to establish a connection with self signed certificate

2021-03-28 Thread Dmitry Belyavsky
sion to create self > signed certificate with sha256 algorithm. > > I tried loading the certs in device and in server side. The client sends > "hello packet" to server and server refused to connect with an error " > alert internal error ". The handshake failing between

How to establish a connection with self signed certificate

2021-03-28 Thread preethi teekaraman
Hi I'm using latest version 1.1.1i 8 Dec 2020 openssl version to create self signed certificate with sha256 algorithm. I tried loading the certs in device and in server side. The client sends "hello packet" to server and server refused to connect with an error " alert i

Re: [openssl-users] [Newsletter] Re: self-signed certificate won't work in my app but works with s_client

2016-07-04 Thread Salz, Rich
ow the CA? You still have to add the CA to your local trust store. Otherwise, you'd blindly accept *every* self-signed certificate, right? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] [Newsletter] Re: self-signed certificate won't work in my app but works with s_client

2016-07-04 Thread Carl Heyendal
sl-users-boun...@openssl.org] On Behalf Of Matthew Donald Sent: July-01-16 12:09 AM To: openssl-users@openssl.org Subject: [Newsletter] Re: [openssl-users] self-signed certificate won't work in my app but works with s_client "error 18:self signed certificate" is the expected result if you a

Re: [openssl-users] self-signed certificate won't work in my app but works with s_client

2016-06-30 Thread Matthew Donald
"error 18:self signed certificate" is the expected result if you are validating a self-signed cert. In certificate verification, the code needs to check for X509_V_OK, X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT and X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY. X509_V_OK is a n

[openssl-users] self-signed certificate won't work in my app but works with s_client

2016-06-30 Thread Carl Heyendal
I am working with the example apps in the "Networking Security with OpenSSL" book and up until now have been able to get client/server examples 1,2,3 to work. But now I'm trying to connect to an in-house tool but I'm getting the error "error 18:self signed certificate&

RE: Error 18: self signed certificate

2013-11-20 Thread Mark Currie
gt; To: openssl-users@openssl.org > Subject: RE: Error 18: self signed certificate > > > From: owner-openssl-users On Behalf Of Mark Currie > > Sent: Monday, November 18, 2013 03:24 > > > I also managed to get self-signed certs to work like this but does > > anyone

RE: Error 18: self signed certificate

2013-11-18 Thread Dave Thompson
Behalf Of Manoj > > Sent: 18 November 2013 10:09 > > To: openssl-users@openssl.org > > Subject: Re: Error 18: self signed certificate > > > > Thanks Guys for the help, I got it working by loading the location using > API > > SSL_CTX_load_verify_locations(). The

RE: Error 18: self signed certificate

2013-11-18 Thread Mark Currie
Of Manoj > Sent: 18 November 2013 10:09 > To: openssl-users@openssl.org > Subject: Re: Error 18: self signed certificate > > Thanks Guys for the help, I got it working by loading the location using API > SSL_CTX_load_verify_locations(). The location where I have the certificate >

Re: Error 18: self signed certificate

2013-11-18 Thread Manoj
) without having it in the trust-store? or Let me put in other words , Server application verifiying clients with each client having its own self signed certificate, Does the server require any prior information about certificates (i.e. having them as part of cert trust store)? Or Is there any way

Re: Error 18: self signed certificate

2013-11-17 Thread Elluru, Krishna
need to add the ceritificate to trusted list. if (ctx->check_issued(ctx, x, x)) { /* we have a self signed certificate */ if (sk_X509_num(ctx->chain) == 1) { /* We have a single self signed certi

RE: Error 18: self signed certificate

2013-11-16 Thread Dave Thompson
gned certifcates at all, the openssl ca > command would be a simple option to generate a few certificates signed > by the self-signed one. You would put the self-signed certificate into > the trusted certificates folder on the client and the server and use two > other certificates in the

Re: Error 18: self signed certificate

2013-11-15 Thread Walter H.
wrote: Hi, I am trying to create a client/server application on windows 7, where I have used self signed certificate at server side as well as at client side. I used SSL_CTX_use_certificate_file and then SSL_CTX_use_PrivateKey_file API to load the certificate and key. When there is a SSL_connect

Re: Error 18: self signed certificate

2013-11-15 Thread Martin Hecht
e. You would put the self-signed certificate into the trusted certificates folder on the client and the server and use two other certificates in the API on the client and the server respectively. best regards, Martin _

Error 18: self signed certificate

2013-11-15 Thread Manoj
Hi, I am trying to create a client/server application on windows 7, where I have used self signed certificate at server side as well as at client side. I used SSL_CTX_use_certificate_file and then SSL_CTX_use_PrivateKey_file API to load the certificate and key.When there is a SSL_connect() call

Re: Verifying self-signed certificate

2013-11-15 Thread Martin Hecht
Hi Manoj, if you want to generate just one selfsigned certificate, this would be the easiest: # generate key and self signed cert with one command openssl req -x509 -nodes -days 3650 \ -subj '/C=DE/ST=some-state/L=somewhere/CN=example.com' \ -newkey rsa:1024 -keyout key.pem -out cert.pem # ver

Re: Verifying self-signed certificate

2013-11-15 Thread Manoj
Hi, Can you post the complete command to generate the self signed certificate , the case where the verification worked for you? Thanks -- View this message in context: http://openssl.6102.n7.nabble.com/Verifying-self-signed-certificate-tp18922p47362.html Sent from the OpenSSL - User mailing

verifying signature of self-signed certificate

2013-11-08 Thread Dimitrios Apostolou
Hello list, given that I know in advance the remote end's RSA public key, and that the remote end is responding to my TLS handshake with a self-signed certificate signed by his private RSA key, then what is the proper way of verifying that nobody has tampered with the connection? What

Re: Self-Signed Certificate Verification failure

2013-05-16 Thread isshed
Thanks Dave for the response. On Wed, May 15, 2013 at 11:29 PM, Dave Thompson wrote: > >From: owner-openssl-us...@openssl.org On Behalf Of isshed > >Sent: Wednesday, 15 May, 2013 08:25 > > >I have a self-signed certificate installed on a server with > >the followin

RE: Self-Signed Certificate Verification failure

2013-05-15 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of isshed >Sent: Wednesday, 15 May, 2013 08:25 >I have a self-signed certificate installed on a server with >the following extensions fields. >Key Usage:Digital Signature, Key Encipherment (a0) >Basic Constraints :

Self-Signed Certificate Verification failure

2013-05-15 Thread isshed
Hi all, I have a self-signed certificate installed on a server with the following extensions fields. = Key Usage:Digital Signature, Key Encipherment (a0

RE: Automating self signed certificate creation

2012-11-02 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Mauricio Tavares > Sent: Friday, 02 November, 2012 16:53 > On Fri, Nov 2, 2012 at 4:23 PM, Ken Goldman > wrote: > > I create a self signed certificate using > > > >> openssl req -new -x509 -key ... -out ...

Re: Automating self signed certificate creation

2012-11-02 Thread Felipe Gasper
On 2.11.12 3:23 PM, Ken Goldman wrote: I create a self signed certificate using > openssl req -new -x509 -key ... -out ... -days ... It then prompts for the country, state, locality, etc. Is there a way to enter that data on the command line or in a configuration file to avoid the prom

Re: Automating self signed certificate creation

2012-11-02 Thread Mauricio Tavares
On Fri, Nov 2, 2012 at 4:23 PM, Ken Goldman wrote: > I create a self signed certificate using > >> openssl req -new -x509 -key ... -out ... -days ... > > It then prompts for the country, state, locality, etc. > > Is there a way to enter that data on the command line or i

Automating self signed certificate creation

2012-11-02 Thread Ken Goldman
I create a self signed certificate using > openssl req -new -x509 -key ... -out ... -days ... It then prompts for the country, state, locality, etc. Is there a way to enter that data on the command line or in a configuration file to avoid the prompts? I tried -config and a configurat

RE: exception when using Self Signed Certificate

2012-10-04 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of Mithun Kumar >Sent: Thursday, 04 October, 2012 14:31 >I have a self signed certificate created and i have loaded that >into a trust store of the client. I have also configured the Server >with that self signed certificate. S

Re: Self-signed certificate

2012-09-26 Thread Curt Sampson
On 2012-09-24 20:55 + (Mon), Nou Dadoun wrote: > Quick question: is there a simple openssl api call which will tell me > if an x509 certificate is self-signed? ... N Will simply comparing the issuer and the subject DNs in the cert do what you need? Or do you need to check validity, the Author

Self-signed certificate

2012-09-24 Thread Nou Dadoun
Quick question: is there a simple openssl api call which will tell me if an x509 certificate is self-signed? ... N --- Nou Dadoun ndad...@teradici.com 604-628-1215 __ OpenSSL Project http://www.

RE: CA for IIS-issued self-signed certificate?

2012-08-14 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Charles Mills > Sent: Tuesday, 14 August, 2012 08:09 > > if your self-signed cert has a KeyUsage extension that does > > not include certSign, > > OpenSSL skips it for chain-building, resulting in verify 20. > > Looks like the latter to me. P

RE: CA for IIS-issued self-signed certificate?

2012-08-14 Thread Charles Mills
ha1WithRSAEncryption -END CERTIFICATE- Charles -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Dave Thompson Sent: Monday, August 13, 2012 7:09 PM To: openssl-users@openssl.org Subject: RE: CA for IIS-issued s

RE: CA for IIS-issued self-signed certificate?

2012-08-13 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Charles Mills > Sent: Saturday, 11 August, 2012 08:57 > I wondered if perhaps there were path or filename > specification problems > (need to escape backslashes? a problem with embedded spaces?) but I > eliminated all of those variables -- put

RE: CA for IIS-issued self-signed certificate?

2012-08-11 Thread Charles Mills
..@mcn.org] Sent: Friday, August 10, 2012 8:54 PM To: 'openssl-users@openssl.org' Subject: RE: CA for IIS-issued self-signed certificate? > If you ... subsequently call set_default_verify_paths, the later call overrides and > (only) the default file and/or directory are used. Than

RE: CA for IIS-issued self-signed certificate?

2012-08-10 Thread Charles Mills
> If you ... subsequently call set_default_verify_paths, the later call overrides and > (only) the default file and/or directory are used. Thanks. I wondered about that. I commented it out though and still get exactly the same result. I also added a certificate verify callback. I come through the

RE: CA for IIS-issued self-signed certificate?

2012-08-10 Thread Dave Thompson
erver product (Kiwi Server) that is running on a VM on > my system. > > Kiwi *only* accepts IIS-issued certificates. I issued a > certificate using > IIS 7.5 Manager "Issue Self-Signed Certificate." Windows 7 says "This > certificate is OK." > >

CA for IIS-issued self-signed certificate?

2012-08-10 Thread CharlesTSR
ssued certificates. I issued a certificate using IIS 7.5 Manager "Issue Self-Signed Certificate." Windows 7 says "This certificate is OK." My client follows the general scheme of the client in Chapter 5 of the O'Reilly OpenSSL book. I know am getting the certificate back cor

RE: [openssl-users] Weird not-so-self-signed certificate

2012-08-06 Thread Dave Thompson
ed certificate is certainly such a DANE one. > Specifically, as I responded Friday to a post from Harald Latzko "RE: TLS server/client with self-signed certificate" : OpenSSL won't verify a self-signed cert *or* a "real" CA cert if it has KeyUsage that excludes certSign

Re: [openssl-users] Weird not-so-self-signed certificate

2012-08-06 Thread Erwann Abalea
sing, I'd expect a lookup fail at depth 1. When I create a self-signed certificate: $ openssl req -new -x509 -nodes -out foobar.crt And check it then: $ openssl verify -CApath /dev/null -CAfile foobar.crt foobar.crt foobar.crt: OK I'm puzzled and before jumping to conclusions wanted to a

Weird not-so-self-signed certificate

2012-08-06 Thread Johannes Bauer
okup fail at depth 1. When I create a self-signed certificate: $ openssl req -new -x509 -nodes -out foobar.crt And check it then: $ openssl verify -CApath /dev/null -CAfile foobar.crt foobar.crt foobar.crt: OK I'm puzzled and before jumping to conclusions wanted to ask you first what you thi

RE: TLS server/client with self-signed certificate

2012-08-03 Thread Dave Thompson
d the cert in the truststore. > > As above, check it is in the directory with the correct hash. > See above: it's the case actually. > > > > Errors in cert attributes (like BC) give other error codes. > Are there any more errors? I can't see any. Another point to

Re: TLS server/client with self-signed certificate

2012-08-03 Thread Harald Latzko
inking trust via subject hash is used) for self-signed >> certificate in general? >> This rule is no longer entirely true. > > The new rule is to stop when reaching a cert in your local trusted > or banned list, self-signed or otherwise, and to not check if the > self-signature

Re: TLS server/client with self-signed certificate

2012-08-03 Thread Jakob Bohm
this mechanism works normally. >> certificate verify error 20: unable to get local issuer certificate: >> My opinion is that the self-signed certificate has the X509v3 basic constraint >> CA flag set to "false": > >> A connect via "openssl s_client&q

Re: TLS server/client with self-signed certificate

2012-08-03 Thread Harald Latzko
ainst the commandline tool version. I also added an unneeded link named the old hashing method (parameter "-subject_hash_old" for openssl commandline tool). Since I've got a bunch of working connection via various CAs, I assume this mechanism works normally. >> certificate

RE: TLS server/client with self-signed certificate

2012-08-02 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of Harald Latzko >Sent: Thursday, 02 August, 2012 03:03 > self-signed certificate as attached to this mail (can be retrieved >from the TLS server 87.236.105.37:6619). My TLS client uses the >following options: >SSL_CTX_load_ve

TLS server/client with self-signed certificate

2012-08-02 Thread Harald Latzko
Hell,I've got a question regarding self-signed X509v3 certificates used in a TLS1.0 server/client environment. A communication partner uses a self-signed certificate as attached to this mail (can be retrieved from the TLS server 87.236.105.37:6619). My TLS client uses the following op

RE: OpenSSL and apache2 wildcard self-signed certificate for nested subdomain

2011-12-15 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of rey sebastien > Sent: Wednesday, 14 December, 2011 07:33 > I have some problem with nested subdomain and wildcard openssl > certificate.. > When i create the self signed certificate, i enter CN = >

Re: OpenSSL and apache2 wildcard self-signed certificate for nested subdomain

2011-12-14 Thread Peter Sylvester
create the self signed certificate, i enter CN = *.parisgeo.cnrs.fr, but it's seems it's impossible to connect on this site for example partage.parisgeo.cnrs.fr with this configuration ! Arg. your connexion works fine up to the point of certificate verification. openssl s_client doe

OpenSSL and apache2 wildcard self-signed certificate for nested subdomain

2011-12-14 Thread rey sebastien
Hello users :) I have some problem with nested subdomain and wildcard openssl certificate.. perhaps this is because the subdomain type is : site1.parisgeo.cnrs.fr, or site2.parisgeo.cnrs.fr, or other subdomain like .parisgeo.cnrs.fr When i create the self signed certificate, i enter CN

RE: Help neede Generating a V3 self-signed certificate from a CSR

2011-11-14 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Benoit Rouleau > Sent: Friday, 11 November, 2011 12:19 > I have a problem. I am attempting to generate a self-signed > (for internal use) certificate with multiple SAN and all I can get > is a V1 certificate with no SAN at al

Help neede Generating a V3 self-signed certificate from a CSR

2011-11-11 Thread Benoit Rouleau
OpenSSL genrsa -out test.key 2048 # Generate the certificate signature request OpenSSL req -new -key test.key -config test.cfg -out test.csr # Generate the self signed certificate OpenSSL x509 -req -days 3650 -signkey test.key -in test.csr -out test.crt Included are all the file created (Key

Re: OpenSSL FIPS module self signed certificate creation failed

2011-08-28 Thread rockrider33
t; binary (usr/local/ssl/fips1-0/bin) >> Note: my machine already installed with openssl 0.9.8h. I didnt uninstall >> it. >> >> what i tried is, >> 1.executed /usr/local/ssl/fips1-0/bin/openssl this binary and created >> self >> signed certificate "key

Re: OpenSSL FIPS module self signed certificate creation failed

2011-08-26 Thread Dr. Stephen Henson
sion 4.3.4 > > I hope installation was successful and it created FIPS module and openssl > binary (usr/local/ssl/fips1-0/bin) > Note: my machine already installed with openssl 0.9.8h. I didnt uninstall > it. > > what i tried is, > 1.executed /usr/local/ssl/fips1-0/bin/ope

OpenSSL FIPS module self signed certificate creation failed

2011-08-25 Thread rockrider33
(usr/local/ssl/fips1-0/bin) Note: my machine already installed with openssl 0.9.8h. I didnt uninstall it. what i tried is, 1.executed /usr/local/ssl/fips1-0/bin/openssl this binary and created self signed certificate "key" -successful 2.Using same command, trying to create certificate

Re: Verifying self-signed certificate

2010-11-30 Thread iruvopenssl
is: >> Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd >> > >Well that's one problem, if your certificates have the same issuer >and subject >names then you'll end up with what looks like a self-signed >certificate. Try >giving the server certifica

Re: Verifying self-signed certificate

2010-11-30 Thread aerowolf
On Mon, Nov 29, 2010 at 3:36 PM, Dr. Stephen Henson wrote: If there were any extensions in the server certificate that wouldn't happen but the command you create the server certificate with doesn't include any and ends up creating the deprecated V1 certificate format. Should this behavior b

Re: Verifying self-signed certificate

2010-11-29 Thread Dr. Stephen Henson
r example, my server.crt's issuer line is: > Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd > and my ca.crt's subject line is: > Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd > Well that's one problem, if your certificates have the same issuer and

Re: Verifying self-signed certificate

2010-11-29 Thread iruvopenssl
On Mon, 29 Nov 2010 20:05:43 +0200 "Dr. Stephen Henson" wrote: >On Mon, Nov 29, 2010, iruvopen...@hushmail.com wrote: > >> Greetings, >> >> I guess this question must have been asked quite a lot over >here, >> but I couldn't find any traces of it >> so I guess I'll repeat it. >> >> I can't se

Re: Verifying self-signed certificate

2010-11-29 Thread Dr. Stephen Henson
On Mon, Nov 29, 2010, iruvopen...@hushmail.com wrote: > Greetings, > > I guess this question must have been asked quite a lot over here, > but I couldn't find any traces of it > so I guess I'll repeat it. > > I can't seem to be able to verify (using 'openssl verify') - > without openssl spitti

Verifying self-signed certificate

2010-11-29 Thread iruvopenssl
T - a server certificate that was signed with a custom-made CA even though I pass the CA certificate using the -CAfile switch. I've tried -purpose and also using -CApath instead of -CAfile but to no avail. Is this a feature, a bug or am I just doing it wrong? Shouldn't a self-signed c

Verifying self-signed certificate

2010-11-29 Thread iruvopenssl
T - a server certificate that was signed with a custom-made CA even though I pass the CA certificate using the -CAfile switch. I've tried -purpose and also using -CApath instead of -CAfile but to no avail. Is this a feature, a bug or am I just doing it wrong? Shouldn't a self-signed c

creation of self-signed certificate fail

2010-08-03 Thread klerfe [Bodegas]
Hi, this is how i've been creating self signed certificates in the past for TLS in smtpd: openssl req -days 3650 -nodes -new -x509 -keyout /etc/ssl/private/ca.key \ -out /etc/ssl/ca.crt openssl req -days 3650 -nodes -new -keyout /etc/postfix/ssl/private/server.key \ -out /etc/postfix/ssl/p

Problem with self-signed certificate on HP JetDirect Card...

2010-05-01 Thread Andy Barnett
Hi Folks, This is my first "post" and I'm still "wet behind the ears" with this whole certificate thing so please be gentle with me... I'm trying to fix a security compliance issue on some of our networked printers in the office, the problem seems to be due to the CN settings in the default JetDi

verify error:num=18:self signed certificate--how to make a self singed ,dynamicly generate certificate to be trusted

2010-04-13 Thread sara bai
.c:1053:SSL alert number 40 4204:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake failure:s3_pkt.c:530: " and then i use tls1 method the error is like this : " ...TLS 1.0 Handshake [length 0010], Finished... ... verify error:num=18:self signed certificate "

Self-signed certificate chain for website

2009-07-30 Thread Serge Fonville
Hi, I'm kinda new to OpenSSL so please be gentle. I am currently in the process of setting up a certificate chain for an intranet I want something like Thawte has Fonville IT Root CA Fonville IT CA www.sergefonville.nl I have searched far and wide, but could not find a d

RE: Trouble generating a self signed certificate

2009-06-04 Thread Will Bickford
- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of andrew.luke Sent: Thursday, June 04, 2009 8:11 AM To: openssl-users@openssl.org Subject: Trouble generating a self signed certificate I've been trying to generate a self signed certificate to ge

RE: Trouble generating a self signed certificate

2009-06-04 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of andrew.luke > Sent: Thursday, 04 June, 2009 09:11 > I've been trying to generate a self signed certificate to get > SSL working on a very simple internal web server. I'm using > a windows server 2003 box so I

Trouble generating a self signed certificate

2009-06-04 Thread andrew.luke
I've been trying to generate a self signed certificate to get SSL working on a very simple internal web server. I'm using a windows server 2003 box so I got the open SSL windows binaries from http://www.slproweb.com/products/Win32OpenSSL.html. Using a HOWTO I found here http://www.sit

RE: revoking a self-signed certificate

2009-01-28 Thread David Schwartz
Olaf Gellert: > I would not say so. If I found a CRL which contains the > self signed root certificate I would stop to trust it > immediately. Why? What do you think that CRL means? Specifically, do you think it means the public key was compromised? Do you think it means the issuer of the origin

Re: revoking a self-signed certificate

2009-01-28 Thread Olaf Gellert
Hi all, David Schwartz wrote: >> Can you please elaborate on how would the higher-layer security >> infrastructure go about this? > > Simply put, whatever put the certificate in its trusted position is what is > to remove it. If a CA says to trust a certificate, that CA can say not to. > But if t

Re: revoking a self-signed certificate

2009-01-27 Thread Kyle Hamilton
There is currently no automated protocol for doing this. There is currently an effort at PKIX for a "Trust Anchor Management Protocol", though, which would allow for tools to be made cross-platform. Also, self-signed CAs are basically never checked for expiration. (The 'trust anchor' is technical

RE: revoking a self-signed certificate

2009-01-26 Thread David Schwartz
by spreading awareness by an out-of-band means but not eliminated > until ofcourse, the self-signed CA certificate expires. It's not impossible. Just use the same technique that installed the self-signed certificate to uninstall it. If you could get it trusted somehow, why can't you get i

Re: revoking a self-signed certificate

2009-01-26 Thread PS
Also, does openssl allow a CA to revoked its own self-signed certificate? What happens when during the openssl verify, it finds that the CRL given by CA contains the CA-certificate in the revoked list? On Mon, Jan 26, 2009 at 9:28 PM, PS wrote: > Can you please elaborate on how would the hig

Re: revoking a self-signed certificate

2009-01-26 Thread PS
Can you please elaborate on how would the higher-layer security infrastructure go about this? To me, it just seems impossible to do this and the issue might only be mitigated by spreading awareness by an out-of-band means but not eliminated until ofcourse, the self-signed CA certificate expires. O

Re: revoking a self-signed certificate

2009-01-26 Thread Kyle Hamilton
A self-signed CA certificate (technically, a "trust anchor") cannot be revoked via CRL. This is assumed to be a function of the higher-layer security infrastructure which led to the trust anchor being trusted in the first place, and is outside the scope of CRL. -Kyle H On Mon, Jan 26, 2009 at 9:

revoking a self-signed certificate

2009-01-26 Thread PS
Hi All, Is it possible to revoke a self-signed CA certificate? If yes, then I dont understand why it should be allowed. It does not make sense. The only reason a root CA would want to revoke its own certificate is if its private-key might have been compromised. So, the CA would want to revoke its

Re: Problem related to self signed certificate peer verification

2008-10-21 Thread Tim Hudson
[EMAIL PROTECTED] wrote: Sir, How do I check to see what version of Open SSL that I have on my system? I am trying to answer the attached vulnerability. If you have the executable for the superapp then use: openssl version -a If you don't then you can strings path-to-library | grep '

Problem related to self signed certificate peer verification

2008-10-21 Thread Ajeet kumar.S
Dear All, I have self signed root certificate. I want to verify the peer certificate. In API static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer). I saw function calling X509_check_issued(issuer, x); where they are matching issuer and subject. But I saw server is sending the T

Re: how trust self signed certificate

2008-09-09 Thread Sergio
matteo mattau escribió: Dears, I'm in trouble with self signed certificate, when I try to verify via ocsp a certificate whose issuer is self signed. The error I receive is always openssl ocsp -issuer /usr/local/ssl/cert/issuerPEM.crt -cert ./certificatePEM.cer -url http://ocsp.foo.com -C

how trust self signed certificate

2008-09-09 Thread matteo mattau
Dears, I'm in trouble with self signed certificate, when I try to verify via ocsp a certificate whose issuer is self signed. The error I receive is always openssl ocsp -issuer /usr/local/ssl/cert/issuerPEM.crt -cert ./certificatePEM.cer -url http://ocsp.foo.com -CApath /usr/loca

Self-signed certificate created by SelfSSL.exe (IIS Resource Kit)

2008-05-06 Thread Иосиф Виссарионович
I used SelfSSL.exe utility to create self-signed certificate and installed it into IIS on my website. My OpenSSL client fails when I try to connect to my website. I've got this error: SSL_connect() failed: error:0001:lib(0):func(0):reason(1) error:1409008

Re: ECC Self-Signed Certificate

2008-03-11 Thread Larry Bugbee
I have noticed this as well. I believe it operates correctly in the 0.9.9 snapshot. Indeed, the change log indicates a fix. Thanks. At the moment I'm unable to get a good build with the 3/10 SNAP. ...a problem linking .dylib. ___

RE: ECC Self-Signed Certificate

2008-02-14 Thread Bill Colvin
I have noticed this as well. I believe it operates correctly in the 0.9.9 snapshot. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Larry Bugbee Sent: February 13, 2008 8:41 PM To: openssl-users@openssl.org Subject: Re: ECC Self-Signed Certificate

Re: ECC Self-Signed Certificate

2008-02-13 Thread Larry Bugbee
re is valid, it will show up like that. Thanks, -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Patrick Patterson Sent: Wednesday, February 13, 2008 10:07 AM To: openssl-users@openssl.org Subject: Re: ECC Self-Signed Certificate On Wednesday 13 Feb

RE: ECC Self-Signed Certificate

2008-02-13 Thread Nabil Ghadiali
[EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni > Sent: Wednesday, February 13, 2008 8:00 AM > To: openssl-users@openssl.org > Subject: Re: ECC Self-Signed Certificate > > On Wed, Feb 13, 2008 at 12:40:18AM -0500, Nabil Ghadiali wrote: > > Can someon

RE: ECC Self-Signed Certificate

2008-02-13 Thread Bill Colvin
Bill From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Nabil Ghadiali Sent: February 13, 2008 12:40 AM To: openssl-users@openssl.org Subject: ECC Self-Signed Certificate Can someone help me with the command to generate a self-signed certifi

Re: ECC Self-Signed Certificate

2008-02-13 Thread Patrick Patterson
] > [mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni > Sent: Wednesday, February 13, 2008 8:00 AM > To: openssl-users@openssl.org > Subject: Re: ECC Self-Signed Certificate > > On Wed, Feb 13, 2008 at 12:40:18AM -0500, Nabil Ghadiali wrote: > > Can someone help me with the

RE: ECC Self-Signed Certificate

2008-02-13 Thread Nabil Ghadiali
ted or may have been altered" Thanks, -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni Sent: Wednesday, February 13, 2008 8:00 AM To: openssl-users@openssl.org Subject: Re: ECC Self-Signed Certificate On Wed, Feb 13, 2008 at 12:

Re: ECC Self-Signed Certificate

2008-02-13 Thread Victor Duchovni
On Wed, Feb 13, 2008 at 12:40:18AM -0500, Nabil Ghadiali wrote: > Can someone help me with the command to generate a self-signed certificate > using openssl? > > > > I have used the following steps and when I get a certificate and open up it > says "the signature

ECC Self-Signed Certificate

2008-02-12 Thread Nabil Ghadiali
Can someone help me with the command to generate a self-signed certificate using openssl? I have used the following steps and when I get a certificate and open up it says "the signature is invalid". Am I missing something? I have created an ECC key pair using the following

certificate chain verification up to self-signed certificate - why?

2007-09-13 Thread Steffen DETTMER
Hi, certificate chain verification is always done until a self-signed CA certificate (root CA certificate), even if intermediate sub-CA certificates are locally known (which equals trusted) - but why? Is there some cryptographic requirement for this? (I understood that a root-CA certificate mus

Problem with Self-Signed certificate and wpa_supplicant

2007-08-14 Thread jinlu8591
on -d") * put the self signed certificate ( cacert.pem) in $OPENSSLDIR/certs * create the hash-based symlink using some script * then I do "openssl verify cacert.pem", and got ok despite the above, I till get TLS: Certificate verification failed, error 18 (self signed certificate

RE: Self Signed Certificate: certificate chain verification failure

2007-07-03 Thread Goetz Babin-Ebell
Hello, --On Juli 03, 2007 13:31:27 +0530 Vishal V <[EMAIL PROTECTED]> wrote: Many thanks for the information. But my query is partially answered. Here it goes A) Doesn't client need server's self-signed certificate to validate the transmitted certificate? - Is Question A is

RE: Self Signed Certificate: certificate chain verification failure

2007-07-03 Thread Vishal V
Many thanks for the information. But my query is partially answered. Here it goes A) Doesn't client need server's self-signed certificate to validate the transmitted certificate? - Is Question A is true then how to obtain this certificate. - Also how to configure this certificate

RE: Self Signed Certificate: certificate chain verification failure

2007-07-02 Thread Lindsay Hausner
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Vishal V Sent: Monday, July 02, 2007 5:17 AM To: openssl-users@openssl.org Subject: Self Signed Certificate: certificate chain verification failure Importance: High Resending my mail with corrected

Self Signed Certificate: certificate chain verification failure

2007-07-02 Thread Vishal V
Resending my mail with corrected information Dear All, My client program fails to establish the secure connection (https) with web server due to certificate chain verification failure. And I think the error is due to a self signed certificate

Self Signed Certificate: certificate chain verification failure

2007-07-02 Thread Vishal V
Dear All, My client problem fails to establish the secure connection (https) with web server due to certificate chain verification failure. And I think the error is due to a self signed certificate

  1   2   >