Dies ist eine alte Version des Dokuments!


Standard:

openssl genrsa -des3 -out ssl.key 4096
openssl req -new -key ssl.key -out ssl.csr
openssl rsa -in ssl.key -out ssl.key
openssl x509 -in ssl.csr -out ssl.crt  -req -signkey ssl.key -days 365

Certificate Authority (CA) Certificate:

openssl genrsa -des3 -out ca.key 4096
openssl req -new -key ca.key -out ca.csr
openssl x509 -req -days 1825 -in ca.csr -signkey ca.key -out ca.crt

Client Certificate:

openssl req -new -keyout client-req.csr -out client-req.csr -days 365
openssl ca -policy policy_anything -config /etc/ssl/openssl.cnf -out client-cert.pem -infiles client-req.csr
openssl pkcs12 -export -in client-cert.pem -inkey client-cert.csr -out client-cert.p12 -name "Client Certificate"

VPN Server Certificate:

openssl genrsa -des3 -out server.key 4096
openssl req -new -key server.key -out server.csr
openssl x509 -req -days 730 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out server.crt -extfile vpn.conf

vpn.conf:

extendedKeyUsage = serverAuth, 1.3.6.1.5.5.8.2.2
subjectAltName = DNS:vpn.doebl.eu

linux/ssl.1389600918.txt.gz · Zuletzt geändert: 2025/01/25 16:55 (Externe Bearbeitung)
Nach oben
CC Attribution-Noncommercial-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0