[Kroupware] RH7.3

Andreas Korn kroupware@mail.kde.org
Thu, 13 Feb 2003 16:44:30 +0100


Here is the complete output (including everything going to /dev/null 
otherwise). Looks good to me.


Generating kolab's SSL/TLS certificates
generate self-signed CA ... Generating a 1024 bit RSA private key
..++++++
......................++++++
writing new private key to 'demoCA/private/cakey.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:State or Province Name (full name) 
[Some-State]:Locality Name (eg, city) []:Organization Name (eg, company) 
[Internet Widgits Pty Ltd]:Organizational Unit Name (eg, section) 
[]:Common Name (eg, YOUR name) []:Email Address []:done
generate certificate and sign request ... Generating a 1024 bit RSA 
private key
..........++++++
..++++++
writing new private key to 'key.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:State or Province Name (full name) 
[Some-State]:Locality Name (eg, city) []:Organization Name (eg, company) 
[Internet Widgits Pty Ltd]:Organizational Unit Name (eg, section) 
[]:Common Name (eg, YOUR name) []:Email Address []:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:An optional company name []:done
sign certificate with newly created CA ... Using configuration from 
/kolab/etc/openssl/openssl.cnf
Check that the request matches the signature
Signature ok
Certificate Details:
         Serial Number: 1 (0x1)
         Validity
             Not Before: Feb 13 15:41:41 2003 GMT
             Not After : Feb 13 15:41:41 2004 GMT
         Subject:
             commonName                = kolab
         X509v3 extensions:
             X509v3 Basic Constraints:
             CA:FALSE
             Netscape Comment:
             OpenSSL Generated Certificate
             X509v3 Subject Key Identifier:
             2C:19:96:2D:A0:CB:22:A1:42:67:8C:DC:67:30:FE:E6:76:99:FB:CD
             X509v3 Authority Key Identifier:
 
keyid:A8:14:7A:89:99:19:03:F0:02:AA:D4:17:5B:B0:19:E5:42:81:34:F8
             DirName:/CN=minos.intern.net
             serial:00

Certificate is to be certified until Feb 13 15:41:41 2004 GMT (365 days)
Sign the certificate? [y/n]:

1 out of 1 certificate requests certified, commit? [y/n]Write out 
database with 1 new entries
Data Base Updated
done
New certificates have been installed under /kolab/etc/kolab/


Jeffrey Walls wrote:
>>For me this worked fine:
>>Generating kolab's SSL/TLS certificates
>>generate self-signed CA ... done
>>generate certificate and sign request ... done
>>sign certificate with newly created CA ... done
>>New certificates have been installed under /kolab/etc/kolab/
> 
> 
>>But nothing changed.
> 
> 
> 
> I ran it one line at a time, answering the prompts. The output is sent to 
> /dev/null in the script, and you don't see it. 

-- 
Do not meddle in the affairs of wizards,
for they are subtle and quick to anger!
###############################################################################
Andreas Korn, CAxOPEN GmbH, Europaallee 10, 67657 Kaiserslautern
fon: +49.631.30323.52 fax: +49.631.30323.02
eMail: korn@caxopen.de
###############################################################################