untrusted certificate

I am running Apache 2.4.10 on Linux Slackware 14.1 kernel 3.10.17. I've configured Apache for SSL and I created and downloaded certificates from But, I get the error that "This certificate cannot be verified ..." (see image) and I have to select whether or not to continue. I must have done something wrong. My httpd.conf entries are:

SSLCertificateFile "/etc/ssl/OHPRS/"
SSLCertificateKeyFile "/etc/ssl/OHPRS/privkey.pem"
SSLCACertificateFile "/etc/ssl/OHPRS/CACERT-root.crt"

where privkey.pem was generated as follows:

$ openssl genrsa -out privkey.pem 4096
$ openssl req -new -key privkey.pem -out cert.csr

I then uploaded the cert.csr to and downloaded the resulting

I downloaded the CACERT-root.crt from's root page, Class 1 PKI Key, PEM format.

So, what's up?
Who is Participating?
giltjrConnect With a Mentor Commented:
O.K, the screen shot looks like it is from a Windows computer.  Do you have's certificate in your Windows Certificate store?

If not, you will need to import it into your Window's certificate store.

A program only trusts certificates when the signing certificates are in the store that the program uses.  In most the case of most Windows based programs, this is the Windows certificate store.
gheistConnect With a Mentor Commented:
CACert certificates are not trusted by IE or firefox. You need to import CACert root key to trust them.

One day you will get free certificate:
jmarkfoleyAuthor Commented:
Huh! I didn't know the root cert had to be installed on the local computer. Other questions make sense now. And here is a simple howto to do it:
We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!

Yes.  How SSL works is that you have a file on your computer that lists the CA (certificate authorities) that you trust.  Programs will check this file to see if the certificate it is trying to verify is signed by somebody trusted.  Everybody that is trusted should be in this file.  If it is in the file, it's trusted, if its not in the file, it's not trusted.

What is in the file also has be be current, that is if what is y our file is an expired cert, then every cert it signed is no longer trusted because the root is no longer trusted.

It's like one of your friend vouching for somebody you don't know.  You trust your friend, so now you trust the person they vouch for.  If you stop trusting your friend, now you don't trust anybody they vouched for.
You just double click on cert file? Why would one need any online instructions on how to  do it?
jmarkfoleyAuthor Commented:
First of all, you have to know that a root cert has to be installed on your local workstation ... which I didn't.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.