# openssl req -x509 -newkey rsa:1024 -keyout /etc/httpd/conf/ssl.key/server .key -out /etc/httpd/conf/ssl.crt/server .crt -days 9999 -nodes
# chown root:root /etc/httpd/conf/ssl.key/server .key
# chmod 400 /etc/httpd/conf/ssl.key/server .key- sandip's blog
- Login or register to post comments
Comments
openssl req -new -key server.key -out server.csropenssl req -nodes -newkey rsa:2048 -keyout server.key -out server.csrCommands used:
openssl s_client -connect host.domain.tld:443openssl s_client -showcerts -connect host.domain.tld:443
openssl s_client -state -nbio -connect host.domain.tld:443 2>&1
Reference: /debugging-ssl-communications- from-unix-shell-prompt.html test-ssl-certificates-diagnosi s-ssl-certificate/
http://www.cyberciti.biz/tips
http://www.cyberciti.biz/faq/
digicert.com
openssl rsa -in passphrase.key -out nopass.keyopenssl req -text -noout -in /path/to/server.csrFull text information:
Issuer of the certificate:
Issued to:
Valid dates:
All of the above:
Hash value:
MD5 fingerprint:
# openssl x509 -text -in server.crt# openssl x509 -noout -in server.crt -issuer# openssl x509 -noout -in server.crt -subject# openssl x509 -noout -in server.crt -dates# openssl x509 -noout -in server.crt -issuer -subject -dates# openssl x509 -noout -in server.crt -hash# openssl x509 -noout -in server.crt -fingerprintAfter generating a renewed self-signed ssl cert, I got the below message:
With some digging, found that a new serial number can be set as below.
# openssl req -x509 -new -key /etc/httpd/conf/ssl.key/server .key \ .crt -days 9999 -nodes -set_serial 99999-out /etc/httpd/conf/ssl.crt/server
man x509 for more info.