SigniertesZertifikat

Aus Info-Theke
Version vom 30. September 2018, 11:06 Uhr von 178.7.234.69 (Diskussion) (→‎Kurzform)
(Unterschied) ← Nächstältere Version | Aktuelle Version (Unterschied) | Nächstjüngere Version → (Unterschied)
Zur Navigation springen Zur Suche springen


Kurzform[Bearbeiten]

URL=
URL2=www.$URL
FN=/tmp/config.tmp
cat >$FN <<EOS
[req]
distinguished_name = req_distinguished_name
req_extensions = v3_req
prompt = no
[req_distinguished_name]
C = DE
ST = BY
L = Germering
O = cit-professionals.de
OU = IT-Abteilung
CN = $URL
[v3_req]
keyUsage = keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth
subjectAltName = \@alt_names
[alt_names]
DNS.1 = $URL
DNS.2 = $URL2
EOS
openssl req -new -days 999 -newkey rsa:4096bits -sha512 -x509 -nodes -out /etc/ssl/certs/$URL.pem -keyout /etc/ssl/private/$URL.key -config $FN
chgrp ssl-cert /etc/ssl/private/$URL.key ; chmod 640  /etc/ssl/private/$URL.key
cat <<EOS
    ssl_certificate /etc/ssl/certs/$URL.pem;
    ssl_certificate_key /etc/ssl/private/$URL.key;
EOS
# ======== EinzelURL 
URL=
FN=/tmp/config.tmp
cat >$FN <<EOS
[req]
distinguished_name = req_distinguished_name
req_extensions = v3_req
prompt = no
[req_distinguished_name]
C = DE
ST = BY
L = Germering
O = cit-professionals.de
OU = IT-Abteilung
CN = $URL
[v3_req]
keyUsage = keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth
subjectAltName = \@alt_names
[alt_names]
DNS.1 = $URL
EOS
openssl req -new -days 999 -newkey rsa:4096bits -sha512 -x509 -nodes -out /etc/ssl/certs/$URL.pem -keyout /etc/ssl/private/$URL.key -config $FN
chgrp ssl-cert /etc/ssl/private/$URL.key ; chmod 640  /etc/ssl/private/$URL.key
cat <<EOS
    ssl_certificate /etc/ssl/certs/$URL.pem;
    ssl_certificate_key /etc/ssl/private/$URL.key;
EOS

Zertifikat anschauen[Bearbeiten]

openssl x509 -in /etc/ssl/certs/state.indian.hamatoma.de.pem  -text

Wildcard-Zertifikat[Bearbeiten]

cd /home/CA

VALID_DAYS=1000
CERT=hamatoma.de
# Schlüssel generieren, kein Passwort:
openssl genrsa -out $CERT.key 2048

# Zertifikatsanfrage generieren: CN (Common Name) evt. IP-Adresse
# Bei CN (Common Name) eintragen: "*.f-r-e-i.de"
openssl req -new -key $CERT.key -out $CERT.csr -sha512 -config ./openssl.cnf

# Passwort entfernen:
cp $CERT.key $CERT.key.org
openssl rsa -in $CERT.key.org -out $CERT.key

# Signieren:
openssl x509 -req -days $VALID_DAYS -in $CERT.csr -signkey $CERT.key -out $CERT.crt