David Hláčik
2008-Jul-01 10:20 UTC
[CentOS] self Certificate Authority, using /etc/pki/tls/misc/CA
Hello all, lately i am facing problems with Certification Authorities. I have used centos script /etc/pki/tls/misc/CA my own certificate authority. In next steps i am generating requests for certificates to services such as LDAP,NNRPD and lately signing requests with CA. My approach is to import my own CA into Windows Vista OS as root CA and trusted, to avoid messages in clients such as "certificate could not be verified, certificate is not signed or cerficate authority cannot be verified". When i asked for help at openssl mailinglist i have recieved interesting answer : Just make sure your certificate is actually one "son" of your CA.> > It is right To make one CA cert with the 509 extensions set to CA > X509v3 Basic Constraints: > CA:TRUE > X509v3 Key Usage: > Certificate Sign, CRL Sign > Netscape Cert Type: > SSL CA, S/MIME CA > > But it is a mistake to make the "son" as ANOTHER SELF SIGNED cert with > those > extensions not set as CA > X509v3 extensions: > X509v3 Basic Constraints: > CA:FALSE > Netscape Cert Type: > SSL Client, SSL Server, S/MIME, Object Signing > X509v3 Key Usage: > Digital Signature, Non Repudiation, Key Encipherment > Netscape Comment: > > I know of important companies doing this mistake. > The second cert has to be one SIGNED by the first CA authority, not a > selfsigned one with CA fields "off" of false. > Said in other words: the second cert is the result or output of a CSR > (certificate signing request) signed by the CA cert.Yes, that is true, so why this is not so in case of /etc/pki/tls/misc/CA . All my generated server certificates signed with own CA, using this script have : X509v3 extensions:> X509v3 Basic Constraints: > CA:FALSE > Netscape Comment: > OpenSSL Generated Certificate > X509v3 Subject Key Identifier: > CC:FC:A1:2D:DE:CD:D1:9E:34:F3:89:08:F9:D6:30:79:AF:EE:6B:94 > X509v3 Authority Key Identifier: > > keyid:C7:B9:B0:BC:5A:A2:73:18:02:F2:80:E2:8A:0C:BC:58:0C:87:14:95Thanks in advance! DAVID -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20080701/4ca080df/attachment-0002.html>
Maybe Matching Threads
- puppet kick getting hostname not match with the server certificate
- Need help in addressing this error - ERROR OpenSSL::SSL::SSLError: SSL_accept returned=1 errno=0 state=SSLv3 read client certificate A: tlsv1 alert unknown ca
- Why is localhost self-signed cert a CA cert?
- X.509 certificate integration continue with PKCS11 and FIPS capable OpenSSL
- INN with SSL