I have a set up as follows: Root CA-> Intermediate CA -> Client Cert and Server Cert.
On the client side I have a directory containing client.crt, client.key, and a symbolic hash link to chain.crt. chain.crt contains the intermediate cert followed by the root cert (concatenated).
On the server side I have a directory containing server.crt, server.key, and a symbolic hash link to chain.crt. chain.crt is the same as the one described above.
When I run openssl verify -CApath certs.d client.crt. It returns and OK status. The same thing happens when I run it on server.crt.
When I try to send logs from the client to the server, I get errors, on the client side, stating that the Root certificate could not be validated because it is self signed.
The configuration on the client is:
destination d_server {
syslog( "some ip" port(some port) transport("tls")
tls( peer-verify(required-trusted)
cipher-suite(some cipher)
ca-dir(".../certs.d/")
key-file(".../certs.d/client.key")
cert-file(".../certs.d/client.crt") ) );
};
Does anyone know how I can fix this?