I have no idea what "target kdm certificate" is :) Please, attach
a signed document to the email.
Aleksey
Paul Keeler wrote:
Here is a link to an online generator of signed documents that will
demonstrate the behaviour I described previously:
http://www.cinecert.com/dci_ref_01/
Is there perhaps something about these documents that means xmlsec is
unable to populate a store of untrusted certificates?
Many thanks for your help already.
On Feb 14, 2008 5:29 PM, Aleksey Sanin <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>> wrote:
The error indicates that verification of one of the certificate
chains failed but xmlsec was able to extract the key either from
another certificate chain or from some other place. Hard to say
more w/o looking at the document.
Aleksey
Paul Keeler wrote:
> I would be grateful if somone could help me with this problem. I
have a
> signed document which reports that it verifies ok, but also gives an
> error message: "unable to get local issuer certificate". The
same thing
> happens both running from my own application and calling xmlsec
from the
> command line:
>
> xmlsec1 --verify --id-attr:<my_ID_attribute_name>
> <my_node_namespace_uri>:<my_first_node_name>
> --id-attr:<my_ID_attribute_name>
> <my_node_namespace_uri>:<my_second_node_name> --trusted-pem
> <my_trusted_root_pem> <my_signed_document>
>
> This is the result:
>
>
func=xmlSecOpenSSLX509StoreVerify:file=x509vfy.c:line=351:obj=x509-store:subj=unknown:error=71:certificate
> verification failed:err=20;msg=unable to get local issuer certificate
> OK
> SignedInfo References (ok/all): 2/2
> Manifests References (ok/all): 0/0
>
> The verification seems to have been successful (indicated by
"OK"), but
> clearly an error was also reported.
>
> The signed document contains my entire certificate chain: Signer ->
> Intermediate CA -> Root CA. The Root CA in the chain is the same
as the
> trusted root pem I pass using the --trusted-pem option, so I would
> expect verification to succeed.
>
> Now, I can make the error message go away by extracting the
Intermediate
> CA certificate from the signed document and passing it to XMLSEC
using
> the --untrusted-pem option:
>
> xmlsec1 --verify --id-attr:<my_ID_attribute_name>
> <my_node_namespace_uri>:<my_first_node_name>
> --id-attr:<my_ID_attribute_name>
> <my_node_namespace_uri>:<my_second_node_name> --trusted-pem
> <my_trusted_root_pem> --untrusted-pem <intermediate_CA_pem>
> <my_signed_document>
>
> I did not expect that I would have to explicitly pass a
certificate from
> the chain to xmlsec and flag it as being untrusted. Am I doing
> something wrong? Surely xmlsec should assume that all X509
certificates
> in a chain are untrusted by default? Have I missed the point
somewhere?
>
> Many thanks in advance.
>
>
>
------------------------------------------------------------------------
>
> _______________________________________________
> xmlsec mailing list
> xmlsec@aleksey.com <mailto:xmlsec@aleksey.com>
> http://www.aleksey.com/mailman/listinfo/xmlsec
------------------------------------------------------------------------
_______________________________________________
xmlsec mailing list
xmlsec@aleksey.com
http://www.aleksey.com/mailman/listinfo/xmlsec
_______________________________________________
xmlsec mailing list
xmlsec@aleksey.com
http://www.aleksey.com/mailman/listinfo/xmlsec