# openssl req -x509 -newkey rsa:1024 -keyout /etc/httpd/conf/ssl.key/server .key -out /etc/httpd/conf/ssl.crt/server .crt -days 9999 -nodes
# chown root:root /etc/httpd/conf/ssl.key/server .key
# chmod 400 /etc/httpd/conf/ssl.key/server .key
- sandip's blog
- Login or register to post comments
Comments
openssl req -new -key server.key -out server.csr
openssl req -nodes -newkey rsa:2048 -keyout server.key -out server.csr
Commands used:
openssl s_client -connect host.domain.tld:443
openssl s_client -showcerts -connect host.domain.tld:443
openssl s_client -state -nbio -connect host.domain.tld:443 2>&1
Reference: /debugging-ssl-communications- from-unix-shell-prompt.html test-ssl-certificates-diagnosi s-ssl-certificate/
http://www.cyberciti.biz/tips
http://www.cyberciti.biz/faq/
digicert.com
openssl rsa -in passphrase.key -out nopass.key
openssl req -text -noout -in /path/to/server.csr
Full text information:
Issuer of the certificate:
Issued to:
Valid dates:
All of the above:
Hash value:
MD5 fingerprint:
# openssl x509 -text -in server.crt
# openssl x509 -noout -in server.crt -issuer
# openssl x509 -noout -in server.crt -subject
# openssl x509 -noout -in server.crt -dates
# openssl x509 -noout -in server.crt -issuer -subject -dates
# openssl x509 -noout -in server.crt -hash
# openssl x509 -noout -in server.crt -fingerprint
After generating a renewed self-signed ssl cert, I got the below message:
With some digging, found that a new serial number can be set as below.
# openssl req -x509 -new -key /etc/httpd/conf/ssl.key/server .key \ .crt -days 9999 -nodes -set_serial 99999
-out /etc/httpd/conf/ssl.crt/server
man x509 for more info.