Skip to content
Discussion options

You must be logged in to vote

To make sure i tested credentials using openssl clinet -server:
openssl s_server -accept 4242 -key ssl_keys/server_privkey.pem -cert ssl_keys/server.crt -CAfile ssl_keys/ca.crt -no-CApath -dtls1_2 openssl s_client -connect localhost:4242 -dtls1_2 -CAfile ssl_keys/client.crt
And this works- so it seems certificates are ok.

The certificates are ok, but there is some confusion on the actual key/certificate use I believe. Are you sure those commands actually succeedd for you? Because when I tried to reproduce your steps, the handshake indeed proceeds (because there's no -verify_return_error option in the client call), but the actual certificate verification failes, it can be seen in the logs:

Replies: 2 comments 3 replies

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
3 replies
@CreativeIndustryAg
Comment options

@rlubos
Comment options

rlubos Aug 9, 2022
Collaborator

@CreativeIndustryAg
Comment options

Answer selected by CreativeIndustryAg
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants