[EMAIL PROTECTED] wrote:
Hi,
Hello Leon,

I've found this on http://www.nyetwork.org/wiki/ssl_root_ca_new

"Create a PKCS#7 format of the Root CA's public certificate:

This will allow clients to easily import it into their
their PKI storage places, such as Outlook Express and Netscape.

This doc assumes an local root CA certificate that issued
you server certificate.

But you have a self signed server certificate.

cd /usr/local/ssl.ca
openssl crl2pkcs7 -nocrl -certfile ca.crt -outform DER -out ca.pkcs7

ca.pkcs7 will only contain the public portion of the CA's certificate,
so you can email it to whomever with instructions on how to import it,
put it up for download, or whatever."

Any help?

Setup and administration is usually easier with an small root CA
cert that issues your server certs.

(Especially if you have more than one server.)

It is possible your client refuses to import host certificates as
CA certificates...

(By the way: I assume you really wanted to use the certificate to
 authenticate the server.
 Setup of client certificates (used to authenticate the client
 against the server _requires_ a CA...) is also possible.)

Bye

Goetz

--
DMCA: The greed of the few outweighs the freedom of the many

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

----
Cyrus Home Page: http://asg.web.cmu.edu/cyrus
Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu
List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list.html

Reply via email to