You are not logged in.
I'm trying to generate a ssl self-signed certificate with X509v3 extensions (specifically the X509v3 Subject Alternative Name). I basically followed the self-sign instructions from the nginx wiki page (https://wiki.archlinux.org/index.php/Nginx) which states:
# openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:2048 -out cert.key
# chmod 600 cert.key
# openssl req -new -key cert.key -out cert.csr
# openssl x509 -req -days 365 -in cert.csr -signkey cert.key -out cert.crt
When I do this I get a basic self-signed certificate. openssl verify returns the following:
openssl verify cert.crt
cert.crt: C = US, ST = State, L = City, O = Organization, CN = MyName
error 18 at 0 depth lookup:self signed certificate
OK
So all is well. However that ones doesn't include X509v3 extensions.
To add the X509v3 extension I basically followed the instructions from here:
http://techbrahmana.blogspot.com/2013/1 … igned.html
However when creating the new certificate and running verify on it, it would always return:
error 20 at 0 depth lookup:unable to get local issuer certificate
After spending all night trying to find out what caused this I finally stumbled upon:
http://lists.freebsd.org/pipermail/free … 07894.html
and
http://thread.gmane.org/gmane.comp.encr … ocus=48701
Apparently for self-signed certificates the "keyCertSign" needs to be added in keyUsage of the v3_req section.
After that the certificate is verified correctly.
Since I'm rather new to SSL certificates, I wanted to run this by the forum to see if this actually the correct solution or perhaps I'm missing something obvious.
Offline