From: Igor Galić getca
or getverisign
programs mentioned by
-Verisign, for installing my Verisign certificate?
The private key sizes for SSL must be either 512 or 1024 bits, for compatibility - with certain web browsers. A keysize of 1024 bits is recommended because - keys larger than 1024 bits are incompatible with some versions of Netscape - Navigator and Microsoft Internet Explorer, and with other browsers that - use RSA's BSAFE cryptography toolkit.
- - -The CA certificates under the path you configured with
- SSLCACertificatePath
are found by SSLeay through hash
- symlinks. These hash values are generated by the `openssl x509 -noout
- -hash
' command. However, the algorithm used to calculate the hash for a
- certificate changed between SSLeay 0.8 and 0.9. You will need to remove
- all old hash symlinks and create new ones after upgrading. Use the
- Makefile
provided by mod_ssl
.
The default certificate format for SSLeay/OpenSSL is PEM, which is simply
Base64 encoded DER, with header and footer lines. For some applications
@@ -573,29 +546,6 @@ SSLeay version 0.8 to 0.9?
$ openssl x509 -in cert.pem -out cert.der -outform DER
getca
or getverisign
programs mentioned by
-Verisign, for installing my Verisign certificate?Verisign has never provided specific instructions - for Apache+mod_ssl. The instructions provided are for C2Net's - Stronghold (a commercial Apache based server with SSL support).
-To install your certificate, all you need to do is to save the
- certificate to a file, and give the name of that file to the
- SSLCertificateFile
directive.
- You will also need to give it the key file. For more information,
- see the SSLCertificateKeyFile
- directive.
Yes. mod_ssl
has included support for the SGC
- facility since version 2.1. No special configuration is required -
- just use the Global ID as your server certificate. The
- step up of the clients is then automatically handled by
- mod_ssl
at run-time.
Verisign uses an intermediate CA certificate between the root CA
@@ -723,7 +673,8 @@ error when connecting to my newly installed server?
Apache has to know the Host
HTTP header field. To do this, the
HTTP request header has to be read. This cannot be done before the SSL
handshake is finished, but the information is needed in order to
- complete the SSL handshake phase. Bingo!
getca
or getverisign
programs mentioned by
-Verisign, for installing my Verisign certificate?The private key sizes for SSL must be either 512 or 1024 bits, for compatibility - with certain web browsers. A keysize of 1024 bits is recommended because - keys larger than 1024 bits are incompatible with some versions of Netscape - Navigator and Microsoft Internet Explorer, and with other browsers that - use RSA's BSAFE cryptography toolkit.
-The CA certificates under the path you configured with
- SSLCACertificatePath
are found by SSLeay through hash
- symlinks. These hash values are generated by the `openssl x509 -noout
- -hash
' command. However, the algorithm used to calculate the hash for a
- certificate changed between SSLeay 0.8 and 0.9. You will need to remove
- all old hash symlinks and create new ones after upgrading. Use the
- Makefile
provided by
The default certificate format for SSLeay/OpenSSL is PEM, which is simply
Base64 encoded DER, with header and footer lines. For some applications
@@ -579,29 +552,6 @@ SSLeay version 0.8 to 0.9?
$ openssl x509 -in cert.pem -out cert.der -outform DER
getca
or getverisign
programs mentioned by
-Verisign, for installing my Verisign certificate?Verisign has never provided specific instructions - for Apache+mod_ssl. The instructions provided are for C2Net's - Stronghold (a commercial Apache based server with SSL support).
-To install your certificate, all you need to do is to save the
- certificate to a file, and give the name of that file to the
-
Yes.
Verisign uses an intermediate CA certificate between the root CA
@@ -731,7 +681,8 @@ error when connecting to my newly installed server?
Apache has to know the Host
HTTP header field. To do this, the
HTTP request header has to be read. This cannot be done before the SSL
handshake is finished, but the information is needed in order to
- complete the SSL handshake phase. Bingo!