Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
| Beide Seiten der vorigen RevisionVorhergehende ÜberarbeitungNächste Überarbeitung | Vorhergehende Überarbeitung | ||
| linux:ssl [2014/01/13 08:49] – swordfish | linux:ssl [2025/01/25 16:56] (aktuell) – Externe Bearbeitung 127.0.0.1 | ||
|---|---|---|---|
| Zeile 1: | Zeile 1: | ||
| - | Standard: | + | Standard |
| <code bash> | <code bash> | ||
| - | openssl | + | openssl |
| - | openssl req -new -key ssl.key -out ssl.csr | + | </ |
| - | openssl rsa -in ssl.key | + | Standard CSR mit alten Key; |
| - | openssl x509 -in ssl.csr | + | <code bash> |
| + | openssl req -out server.csr -new -sha512 -key server.key | ||
| + | </ | ||
| + | |||
| + | Self-signed Certificate: | ||
| + | <code bash> | ||
| + | openssl | ||
| </ | </ | ||
| Certificate Authority (CA) Certificate: | Certificate Authority (CA) Certificate: | ||
| <code bash> | <code bash> | ||
| - | openssl genrsa -des3 -out ca.key 4096 | + | openssl genrsa -aes256 |
| - | openssl req -new -key ca.key -out ca.csr | + | openssl req -new -sha512 |
| - | openssl x509 -req -days 1825 -in ca.csr -signkey ca.key -out ca.crt | + | openssl x509 -sha512 |
| + | openssl x509 -req -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt -days 365 | ||
| </ | </ | ||
| Client Certificate: | Client Certificate: | ||
| <code bash> | <code bash> | ||
| - | openssl req -new -keyout client-req.csr -out client-req.csr -days 365 | + | openssl genrsa -aes256 -out client.key 4096 |
| - | openssl ca -policy policy_anything | + | openssl req -nodes |
| - | openssl pkcs12 -export -in client-cert.pem -inkey client-cert.pem -out client-cert.p12 -name " | + | openssl ca -cert ca.crt |
| + | openssl pkcs12 -export -inkey client.key -name " | ||
| </ | </ | ||
| VPN Server Certificate: | VPN Server Certificate: | ||
| <code bash> | <code bash> | ||
| - | openssl genrsa -des3 -out server.key 4096 | + | openssl genrsa -aes256 |
| - | openssl req -new -key server.key -out server.csr | + | openssl req -nodes |
| - | openssl x509 -req -days 730 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out server.crt -extfile vpn.conf | + | openssl x509 -sha512 |
| </ | </ | ||
| Zeile 32: | Zeile 40: | ||
| extendedKeyUsage = serverAuth, 1.3.6.1.5.5.8.2.2 | extendedKeyUsage = serverAuth, 1.3.6.1.5.5.8.2.2 | ||
| subjectAltName = DNS: | subjectAltName = DNS: | ||
| + | </ | ||
| + | |||
| + | SAN Server Certificate: | ||
| + | <code bash> | ||
| + | openssl genrsa -aes256 -out server.key 4096 | ||
| + | openssl req -nodes -new -sha512 -key server.key -out server.csr -config server.conf | ||
| + | </ | ||
| + | |||
| + | san.conf: | ||
| + | <code txt> | ||
| + | [req] | ||
| + | distinguished_name = req_distinguished_name | ||
| + | req_extensions = v3_req | ||
| + | prompt = no | ||
| + | [req_distinguished_name] | ||
| + | C = EU | ||
| + | ST = | ||
| + | L = | ||
| + | O = Doebl | ||
| + | OU = WIKI | ||
| + | CN = wiki.doebl.eu | ||
| + | [v3_req] | ||
| + | keyUsage = keyEncipherment, | ||
| + | extendedKeyUsage = serverAuth | ||
| + | subjectAltName = @alt_names | ||
| + | [alt_names] | ||
| + | DNS.1 = wiki.doebl.eu | ||
| + | DNS.2 = wiki2.doebl.eu | ||
| </ | </ | ||
