
The issuer certificate of a looked up certificate could not be found. : /CN=reidmachine.partyĮrror 20 at 0 depth lookup:unable to get local issuer certificateĢ X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT: unable to get issuer certificate $ openssl verify -CApath /System/Library/OpenSSL/certs Where is the certificate signed by the SSL certificate just added to the Keychain Access app.
#Linux stunnel mac#
Testing installed certificate authority on Mac $ openssl verify -CApath /System/Library/OpenSSL/certs You should see new entries that include the name of the certificate authority that signed the certificate. I left it empty, and it seemed to be okay with that.
#Linux stunnel password#
OS X requires a password on the key file. $ openssl pkcs12 -export -in -inkey -out certkey.p12 $ openssl pkcs12 -export -in pem-certificate-file -nokeys -nodes -out cert.p12 $ openssl pkcs12 -export -in pem-certificate-file -inkey pem-key-file -out certkey.p12 If the key and certificate files are separate:

$ openssl pkcs12 -export -in pem-certificate-and-key-file -out certkey.p12 pem format into PKCS12 format using this command: The CA file needs to be in PKCS12 format (yet another annoying decision to do weird non-standard things by apple engineers). Open Keychain Acces.app to add the certificate to the Mac keychain.
#Linux stunnel install#
If they match, you are ready to install it. Openssl x509 -noout -fingerprint -in ca-certificate-file Calculate the fingerprint for the certificate and ensure it matches: Start by obtaining the CA fingerprint from a trusted source. pem CA file, which you will put into a file named with the certificate's own hash
#Linux stunnel verification#
Skip verification of certificates (not recommended if there is no authentication involved with the traffic being passed to stunnel, since a malicious actor could intercept and decrypt traffic).Using stunnel in a situation where you do not control the client gives you three options: To turn on verification, see Stunnel/Certificates#Verification section below. Verify certificates against locally installed certificates.Using stunnel in a situation where you control both the client and the server gives you two options: Generating a self-signed SSL certificate with openssl: RaspberryPi/SSH Stunnel#Generate Private Keys and Certificates for SSL Controlling both server and client Generating a signed SSL certificate with LetsEncrypt: see LetsEncrypt

The server will need a private key and an SSL certificate. See below, or "Generating stunnel certificate and private key" section of the stunnel howto: Server Certificates Generating a client SSL certificate is the same process as generating a server SSL certificate. While stunnel always requires a certificate (a pem file) to run, a dummy certificate is generated when stunnel is installed, and that dummy pem file can be used by the client since the server will probably not ask the client to present this certificate. Using stunnel in client mode (i.e., stunnel is not acting as an SSL server) means you (the client) probably don't need to present a valid certificate (to the server). The official stunnel howto has some useful (but confusing) information about certificates: Client Certificates 2.1.4 Testing installed certificate authority on Linux.2.1.3 Installing certificate authority on linux.2.1.2 Testing installed certificate authority on Mac.2.1.1 Installing certificate authority on mac.
