Sponsored Content
Top Forums Web Development SSL Certificate Installation problem Post 302274952 by Trusevich on Thursday 8th of January 2009 06:08:58 PM
Old 01-08-2009
SSL Certificate Installation problem

Hello everybody
Hope somebody can help me

I'm trying to install SSL Certificate on Apache/mod_ssl on Linux with Zend for Oracle.

I bought and downloaded certificate from certificate from Network Solutions. Than I followed the instructions to the dot.

I created a directory for certificate
Code:
[root@online ssl]# pwd
/usr/local/Zend/apache2/ssl
[root@online ssl]# ls -la
total 40
drwxrwxrwx   2 root root 4096 Jan  8 17:14 .
drwxr-xr-x  18 root root 4096 Jan  6 11:41 ..
-rwxrwxrwx   1 root root 3199 Jan  8 17:12 Apache_Plesk_Install.txt
-rwxrwxrwx   1 root root  887 Jan  8 17:10 myserver.key
-rwxrwxrwx   1 root root 1776 Jan  8 16:58 ONLINE.ODL.COM.crt

Than I modified httpd.conf file to add
Code:
SSLCertificateFile /usr/local/Zend/apache2/ssl/ONLINE.ODL.COM.crt
SSLCertificateKeyFile /usr/local/Zend/apache2/ssl/myserver.key
SSLCertificateChainFile /usr/local/Zend/apache2/ssl/Apache_Plesk_Install.txt

Than I restarted apache (and the server too). Than go to the my website and it still shows security alert, and old (homegenerated by previous guy) certificate info. Like nothing changed.

The funny thing is, I did a search for *.crt files on my server and found this directory, with the date exactly matching the start date that certificate window in IE shows (March 21). It sure looks like that's what outside world see instead of the right certificate:
Code:
[root@online ssl]# ls -la /usr/local/Zend/apache2/conf/ssl.key/
total 100
drwxr-xr-x  4 root root 4096 Mar 21  2007 .
drwxr-xr-x  3 root root 4096 Jan  8 17:21 ..
-rw-r--r--  1 root root 4720 Mar 21  2007 ca.crt
-rw-r--r--  1 root root 2151 Mar 21  2007 class3.crt
drwxr-xr-x  2 root root 4096 Mar 21  2007 new
-rw-r--r--  1 root root 1172 Mar 21  2007 rootca.crt
-rw-r--r--  1 root root 2569 Mar 21  2007 root.crt
drwxr-xr-x  2 root root 4096 Mar 21  2007 save
-rw-r--r--  1 root root 1732 Mar 21  2007 server.crt
-rw-r--r--  1 root root 1058 Mar 21  2007 server.csr
-r--r--r--  1 root root 1675 Mar 21  2007 server.key
-rw-r--r--  1 root root 1743 Mar 21  2007 server.key.original

What am I missing?
 

9 More Discussions You Might Find Interesting

1. Web Development

SSL certificate

Dear All Anyone know how to issue two different certification on apache virtualhost fyi i have one virtualhost eg 69.192.1.25:443 already signed with verisign how can i configure another virtualhost 69.192.1.25:443 which signing with another certificate which self signing. i search net not... (1 Reply)
Discussion started by: netxus
1 Replies

2. AIX

Installing SSL certificate on AIX

Hello, I am new in UNIX, and some one asks me to install SSL certificates to allow exchange with an external system. Can someone tell how to install certificate (ex : verisignxxx.cer) on a UNIX server? Many thanks. Tibo (4 Replies)
Discussion started by: tibo51
4 Replies

3. Cybersecurity

SSL certificate

Hi guys. I have some questions about ssl certificates. I looked at SSL providers and saw that they are providing 2 types of certificates: per server or per domain. my server host name is: srv1.example.com I have a smtp, imap, web server on this box. but all services accessed by different... (1 Reply)
Discussion started by: majid.merkava
1 Replies

4. Web Development

export SSL certificate

we are doing TCP for our systems. I have a working SSL certificate on prodction webserver. Im planning to export it to our DR server for TCP purposes. However when I export based on the procedure below, it doesn't work. When I restart the DR webserver, it still says the certifcate is expired.Any... (1 Reply)
Discussion started by: lhareigh890
1 Replies

5. Red Hat

SSL Certificate Renewal on Tomcat

Hi, I want to renew the ssl certificate for one of my application on tomcat without down time. I want to know what would the possible impacts for the users who currently have sessions to the app. Regards, Arumon (1 Reply)
Discussion started by: arumon
1 Replies

6. Web Development

WebLogic SSL enabling ignoring CA certificate

Hi, I was trying to enable SSL cert on WebLogic 10.3 (CentOS), I don't have a third party Certificate Authority(C.A) to get the .csr file certified. Is there an alternate way that replaces the step sending .csr file to CA ? Thanks SZS (1 Reply)
Discussion started by: szs
1 Replies

7. Red Hat

SSL certificate generation error 8016

Hi guys, I'm trying to generate a key using the genkey command in centos 6.4 and RHEL6.4, Every thing seems to go cool but I get this error message bad certificate request error -8016 and no key/cert is generated. I don't want use the many openssl(s) commands instead since genkey is a shourtcut... (4 Replies)
Discussion started by: leo_ultra_leo
4 Replies

8. Cybersecurity

SSL Certificate Stores

Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right? If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies

9. Web Development

CronJobs issues after SSL certificate

Hello! I had a cron job running on my website, activating a php script every friday. The Php script just activated another photo to add in the gallery. It worked fine until I got an SSL certificate for my website, then everything broke. This was the command before: lynx -source... (0 Replies)
Discussion started by: AGDesign
0 Replies
NE_SSL_SET_VERIFY(3)						neon API reference					      NE_SSL_SET_VERIFY(3)

NAME
ne_ssl_set_verify - register an SSL certificate verification callback SYNOPSIS
#include <ne_session.h> typedef int ne_ssl_verify_fn(void *userdata, int failures, const ne_ssl_certificate *cert); void ne_ssl_set_verify(ne_session *session, ne_ssl_verify_fn verify_fn, void *userdata); DESCRIPTION
To enable manual SSL certificate verification, a callback can be registered using ne_ssl_set_verify. If such a callback is not registered, when a connection is established to an SSL server which does not present a certificate signed by a trusted CA (see ne_ssl_trust_cert), or if the certificate presented is invalid in some way, the connection will fail. When the callback is invoked, the failures parameter gives a bitmask indicating in what way the automatic certificate verification failed. The value is equal to the bit-wise OR of one or more of the following constants (and is guaranteed to be non-zero): NE_SSL_NOTYETVALID The certificate is not yet valid. NE_SSL_EXPIRED The certificate has expired. NE_SSL_IDMISMATCH The hostname used for the session does not match the hostname to which the certificate was issued. NE_SSL_UNTRUSTED The Certificate Authority which signed the certificate is not trusted. Note that if either of the NE_SSL_IDMISMATCH or NE_SSL_UNTRUSTED failures is given, the connection may have been intercepted by a third party, and must not be presumed to be "secure". The cert parameter passed to the callback represents the certificate which was presented by the server. If the server presented a chain of certificates, the chain can be accessed using ne_ssl_cert_signedby. The cert object given is not valid after the callback returns. RETURN VALUE
The verification callback must return zero to indicate that the certificate should be trusted; and non-zero otherwise (in which case, the connection will fail). EXAMPLES
The following code implements an example verification callback, using the dump_cert function from ne_ssl_cert_subject to display certification information. Notice that the hostname of the server used for the session is passed as the userdata parameter to the callback. static int my_verify(void *userdata, int failures, const ne_ssl_certificate *cert) { const char *hostname = userdata; dump_cert(cert); puts("Certificate verification failed - the connection may have been " "intercepted by a third party!"); if (failures & NE_SSL_IDMISMATCH) { const char *id = ne_ssl_cert_identity(cert); if (id) printf("Server certificate was issued to '%s' not '%s'. ", id, hostname); else printf("The certificate was not issued for '%s' ", hostname); } if (failures & NE_SSL_UNTRUSTED) puts("The certificate is not signed by a trusted Certificate Authority."); /* ... check for validity failures ... */ if (prompt_user()) return 1; /* fail verification */ else return 0; /* trust the certificate anyway */ } int main(...) { ne_session *sess = ne_session_create("https", "some.host.name", 443); ne_ssl_set_verify(sess, my_verify, "some.host.name"); ... } SEE ALSO
ne_ssl_trust_cert, ne_ssl_readable_dname, ne_ssl_cert_subject AUTHOR
Joe Orton <neon@lists.manyfish.co.uk> Author. COPYRIGHT
neon 0.30.0 31 July 2013 NE_SSL_SET_VERIFY(3)
All times are GMT -4. The time now is 07:18 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy