diff options
author | Daniel Stenberg <daniel@haxx.se> | 2004-08-25 08:09:48 +0000 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2004-08-25 08:09:48 +0000 |
commit | c10196afc03b79d6a759f672342222d68b074c31 (patch) | |
tree | 380f3811819a50e06435e4a1fcabd373a30f3784 /docs/SSLCERTS | |
parent | 49746d1dceb286a2852018501d0f45168ccd969f (diff) |
Frankie V's description on how to get a CA cert for a random site using
IE
Diffstat (limited to 'docs/SSLCERTS')
-rw-r--r-- | docs/SSLCERTS | 28 |
1 files changed, 20 insertions, 8 deletions
diff --git a/docs/SSLCERTS b/docs/SSLCERTS index a46006266..c4d940ae7 100644 --- a/docs/SSLCERTS +++ b/docs/SSLCERTS @@ -32,7 +32,25 @@ server, do one of the following: configure with the --with-ca-bundle option pointing out the path of your choice. - If you're using the curl command line tool, you can specify your own CA + To do this, you need to get the CA cert for your server in PEM format and + then append that to your CA cert bundle. + + If you use Internet Explorer, this is one way to get extract the CA cert + for a particular server: + + o View the certificate by double-clicking the padlock + o Find out where the CA certificate is kept (Certificate> + Authority Information Access>URL) + o Get a copy of the crt file using curl + o Convert it from crt to PEM using the openssl tool: + openssl x509 -inform DES -in yourdownloaded.crt \ + -out outcert.pem -text + o Append the 'outcert.pem' to the CA cert bundle or use it stand-alone + as described below. + + (Thanks to Frankie V for this description) + + 4. If you're using the curl command line tool, you can specify your own CA cert path by setting the environment variable CURL_CA_BUNDLE to the path of your choice. @@ -45,7 +63,7 @@ server, do one of the following: 4. Windows Directory (e.g. C:\windows) 5. all directories along %PATH% - 4. Get a better/different/newer CA cert bundle! One option is to extract the + 5. Get a better/different/newer CA cert bundle! One option is to extract the one a recent Mozilla browser uses, by following the instruction found here: @@ -56,9 +74,3 @@ certificate that isn't signed by one of the certificates in the installed CA cert bundle, will cause SSL to report an error ("certificate verify failed") during the handshake and SSL will then refuse further communication with that server. - -This procedure has been deemed The Right Thing even though it adds this extra -trouble for some users, since it adds security to a majority of the SSL -connections that previously weren't really secure. It turned out many people -were using previous versions of curl/libcurl without realizing the need for -the CA cert options to get truly secure SSL connections. |