Creating a self-signed SSL certificate: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
*Without making a CA (Certificate Authority) | |||
*Without CA | |||
**<code>$ openssl req -new -x509 -sha256 -days 10000 -nodes -out server.crt -keyout server.key</code> | **<code>$ openssl req -new -x509 -sha256 -days 10000 -nodes -out server.crt -keyout server.key</code> | ||
**Set the Common Name (CN) to the FQDN and enter "." for everything else. | **Set the Common Name (CN) to the FQDN and enter "." for everything else. | ||
*Make a CA and sign a server certificate with it | |||
**openssl genrsa -out myCA.key 2048 | |||
*Put files <code>server.crt</code> and <code>server.key</code> to <code>/etc/httpd/</code> (on Slackware) and set their permissions to 400. | *Put files <code>server.crt</code> and <code>server.key</code> to <code>/etc/httpd/</code> (on Slackware) and set their permissions to 400. | ||
[[Category: Linux]] | [[Category: Linux]] | ||
Revision as of 19:41, 13 June 2015
- Without making a CA (Certificate Authority)
$ openssl req -new -x509 -sha256 -days 10000 -nodes -out server.crt -keyout server.key- Set the Common Name (CN) to the FQDN and enter "." for everything else.
- Make a CA and sign a server certificate with it
- openssl genrsa -out myCA.key 2048
- Put files
server.crtandserver.keyto/etc/httpd/(on Slackware) and set their permissions to 400.