From: Rich Bowen Date: Thu, 27 Oct 2011 13:25:07 +0000 (+0000) Subject: Applies patch from Tomas Pospisek improving SSL FAQ on the topic... X-Git-Tag: 2.2.22~100 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=006b39cd529c9e8e6ece047791cb783e394dc629;p=thirdparty%2Fapache%2Fhttpd.git Applies patch from Tomas Pospisek improving SSL FAQ on the topic of intermediate certs. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@1189746 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/ssl/ssl_faq.html.en b/docs/manual/ssl/ssl_faq.html.en index b9e9e530b10..c43f53a7588 100644 --- a/docs/manual/ssl/ssl_faq.html.en +++ b/docs/manual/ssl/ssl_faq.html.en @@ -276,7 +276,7 @@ Verisign, for installing my Verisign certificate?
  • Can I use the Server Gated Cryptography (SGC) facility (aka Verisign Global ID) with mod_ssl?
  • Why do browsers complain that they cannot -verify my Verisign Global ID server certificate?
  • +verify my server certificate?

    What are RSA Private Keys, CSRs and Certificates?

    @@ -628,15 +628,23 @@ facility (aka Verisign Global ID) with mod_ssl?

    Why do browsers complain that they cannot -verify my Verisign Global ID server certificate?

    -

    Verisign uses an intermediate CA certificate between the root CA - certificate (which is installed in the browsers) and the server - certificate (which you installed on the server). You should have - received this additional CA certificate from Verisign. - If not, complain to them. Then, configure this certificate with the - SSLCertificateChainFile - directive. This ensures that the intermediate CA certificate is - sent to the browser, filling the gap in the certificate chain.

    +verify my server certificate? +

    One reason this might happen is because your server certificate is signed + by an intermediate CA. Various CAs, such as Verisign or Thawte, have started + signing certificates not with their root certificate but with intermediate + certificates.

    + +

    Intermediate CA certificates lie between the root CA certificate (which is + installed in the browsers) and the server certificate (which you installed + on the server). In order for the browser to be able to traverse and verify + the trust chain from the server certificate to the root certificate it + needs need to be given the intermediate certificates. The CAs should + be able to provide you such intermediate certificate packages that can be + installed on the server.

    + +

    You need to include those intermediate certificates with the + SSLCertificateChainFile + directive.

    top
    diff --git a/docs/manual/ssl/ssl_faq.xml b/docs/manual/ssl/ssl_faq.xml index 06834b834c6..30f5feceb54 100644 --- a/docs/manual/ssl/ssl_faq.xml +++ b/docs/manual/ssl/ssl_faq.xml @@ -283,7 +283,7 @@ Verisign, for installing my Verisign certificate?
  • Can I use the Server Gated Cryptography (SGC) facility (aka Verisign Global ID) with mod_ssl?
  • Why do browsers complain that they cannot -verify my Verisign Global ID server certificate?
  • +verify my server certificate?
    What are RSA Private Keys, CSRs and Certificates? @@ -635,15 +635,23 @@ facility (aka Verisign Global ID) with mod_ssl?
    Why do browsers complain that they cannot -verify my Verisign Global ID server certificate? -

    Verisign uses an intermediate CA certificate between the root CA - certificate (which is installed in the browsers) and the server - certificate (which you installed on the server). You should have - received this additional CA certificate from Verisign. - If not, complain to them. Then, configure this certificate with the - SSLCertificateChainFile - directive. This ensures that the intermediate CA certificate is - sent to the browser, filling the gap in the certificate chain.

    +verify my server certificate? +

    One reason this might happen is because your server certificate is signed + by an intermediate CA. Various CAs, such as Verisign or Thawte, have started + signing certificates not with their root certificate but with intermediate + certificates.

    + +

    Intermediate CA certificates lie between the root CA certificate (which is + installed in the browsers) and the server certificate (which you installed + on the server). In order for the browser to be able to traverse and verify + the trust chain from the server certificate to the root certificate it + needs need to be given the intermediate certificates. The CAs should + be able to provide you such intermediate certificate packages that can be + installed on the server.

    + +

    You need to include those intermediate certificates with the + SSLCertificateChainFile + directive.