Greetings,
I have a few questions so I'll try to keep it as short as I can.
1: Some time back when MvCALL first started supporting ssl, i was
having trouble getting it to work. I found this post here and tried it =
and
it solved the problem. Granted I was only trying to MvCALL a page on my =
own
secure domain from the same unsecure domain.
> -----Original Message-----
> From: [email protected] [mailto:[email protected]]On
> Behalf Of Hubbard, David
> Sent: Saturday, December 07, 2002 6:15 PM
> To: 'Craig'; [email protected]
> Subject: RE: [meu] Mvcall https
>=20
>=20
> Assuming you have openssl on the system, and
> you have your certificate, NOT your key, in a
> file named certificatefile.crt, here is how you
> get that name:
>=20
> openssl x509 -noout -hash < certificatefile.crt
>=20
>=20
> David
> Hostasaurus.Com
At the time, I had access to my ssl command line at my IHP. I ran the
command and it worked. I was able to MvCALL my own secure server. Since
then, I've changed ISPs and have a different cert and now I do not have
access to the openssl comand line. In the release notes for version =
4.13,
there's some new x509 functions. However, I simply do not understand the
documentation/technology fully enough to know what they actually do. =
Does
anyone know if the x509_create function will accomplish this? Or at =
least
explain what some of the various parameters? Maybe the new CERTFILE
attribute of MvCALL should be used instead, since I don't think it was
available at the time of the above post?
2: While researching the above I found this post.
"....He was asking if a cert is necessary for making client to
server HTTPS connections. The answer to that is yes in
the case of Empresa. Empresa will not make remote HTTPS
connections to sites running certificates it cannot verify
as valid. That's why it has 129 public CA certificate files
in the certs directory of the distribution, so it can
verify the authenticity of the certificate authority who
issued the certificate in use on the site......"
Ok, what I get from this is that there are a bunch of public cert files =
in
the certs directory. These are used to verify the cert that's being used =
on
a site that is being MvCALLED. I'm assuming there are so many because =
the
idea is to be able to verify the most widely used CA's. My new cert is =
from
GeoTrust. Since I need to run the openssl command (above) on my cert =
file to
get miva to verify my cert in order to MvCALL _my_ secure server from my
standard server (same machine), does that mean if I try to MvCALL =
another
site with GeoTrust cert that it will fail without _their_ public =
GeoTrust
cert installed on my server, or would having mine installed be enough? =
If I
didn't have a GeoTrust cert, then how would I get a public one for use =
with
Empressa for the sole purpose of being able to MvCALL sites using them? =
This
is the part that is really confusing me...... Another thing is that =
GeoTrust
is a fairly well known CA, so why isn't it included in the cert =
directory by
default, or am I totally missing the point?
Thanks in advance,
Bill M.
Comment