Please help me on this.
Thanks in advance.
Best Regards,
S S Rout
--
View this message in context:
http://old.nabble.com/Verify-intermediate-certificate-tp33129488p33479981.html
Sent from the OpenSSL - User mailing list ar
On Mon, Jan 16, 2012, Eisenacher, Patrick wrote:
> > -Original Message-
> > From: Steffen DETTMER
> >
> > * Johannes Bauer wrote on Fri, Jan 13, 2012 at 14:22 +0100:
> > [...]
> > > >>> Or, in other words: Let's assume I have a ultimate root
> > > >>> (self-signed) "Root" and a branched C
> -Original Message-
> From: Steffen DETTMER
>
> * Johannes Bauer wrote on Fri, Jan 13, 2012 at 14:22 +0100:
> [...]
> > >>> Or, in other words: Let's assume I have a ultimate root
> > >>> (self-signed) "Root" and a branched CA "X". I would like to
> > >>> trust "X" and all it's children,
On 2012-01-13 15:38 +0100 (Fri), Johannes Bauer wrote:
> Ah, good, then I explained it well enough :-) Do you have a solution for
> your scenario? Do you manually check certificates? Or is there some
> workaround?
I described my situation in a little more detail in this message:
http://www.ma
* Johannes Bauer wrote on Fri, Jan 13, 2012 at 14:22 +0100:
[...]
> >>> Or, in other words: Let's assume I have a ultimate root
> >>> (self-signed) "Root" and a branched CA "X". I would like to
> >>> trust "X" and all it's children, but not "Root". Is this
> >>> not possible?
[yes, it is not poss
On 13.01.2012 10:15, Curt Sampson wrote:
> On 2012-01-13 09:54 +0100 (Fri), Johannes Bauer wrote:
>
>> Let's say I have some "ultimate" root A which has issued a sub-CA "B"
>> for me. I use "B" to create, for example, a certificate for my webserver
>> "D".
>>
>> Now I have clients which should onl
On 13.01.2012 01:02, Dave Thompson wrote:
>>> The verify fails. Why is that? The immediate signature is valid, does
>>> the "verify" command expect to always terminate at a self-signed
>>> certificate?
>>>
> Yes. Or rather the libcrypto routine X509_verify_cert, used by the
> 'verify' utility and
On 12.01.2012 19:23, Michael S. Zick wrote:
> On Thu January 12 2012, Johannes Bauer wrote:
>> Hello group,
>>
>> I have a question regarding the verify method of OpenSSL: If I have a
>> certificate chain
>>
>> Root -> A -> B -> Leaf
>>
>> where "Leaf" is the certificate of a webserver (https) and
On 12.01.2012 19:05, Kenneth Goldman wrote:
>> I have a question regarding the verify method of OpenSSL: If I have a
>> certificate chain
>>
>> Root -> A -> B -> Leaf
>>
>> where "Leaf" is the certificate of a webserver (https) and Root is a
>> self-signed certificate.
>>
>> In this scenario, is it
> From: owner-openssl-us...@openssl.org On Behalf Of Michael S. Zick
> Sent: Thursday, 12 January, 2012 13:24
> On Thu January 12 2012, Johannes Bauer wrote:
> > Hello group,
> >
> > I have a question regarding the verify method of OpenSSL: If I have a
> > certificate chain: Root -> A -> B -> Lea
On Thu January 12 2012, Johannes Bauer wrote:
> Hello group,
>
> I have a question regarding the verify method of OpenSSL: If I have a
> certificate chain
>
> Root -> A -> B -> Leaf
>
> where "Leaf" is the certificate of a webserver (https) and Root is a
> self-signed certificate.
>
> In this s
Hello group,
I have a question regarding the verify method of OpenSSL: If I have a
certificate chain
Root -> A -> B -> Leaf
where "Leaf" is the certificate of a webserver (https) and Root is a
self-signed certificate.
In this scenario, is it valid for the webserver to provide only A/B/Leaf
and
12 matches
Mail list logo