- +1 902 791 1110
- contact@bobbitt.ca
Get into the correct directory:
cd /etc/pki/tls/certs
Generate key
openssl genrsa -des3 -out mike.key 4096
chmod 600 mike.key
Generate signing request
openssl req -new -key mike.key -out mike.csr
chmod 600 mike.csr
Get the CA to sign the request
openssl x509 -req -days 10000 -in mike.csr -out mike.cert \
-CA /etc/pki/tls/certs/army.ca/Army.ca_CA.cer \
-CAkey /etc/pki/tls/certs/army.ca/Army.ca_CA.key -CAcreateserial
openssl pkcs12 -export -in mike.cert -inkey mike.key -out mike.p12
To strip the passphrase from a key (I.E. decrypt it)
openssl rsa -in mike.key -out mike-nopass.key
To display a cert's contents:
openssl x509 -text -in mike.cert
Create a PEM file with key and cert included:
cat mike-nopass.key mike.cert > mike.pem
Verify that a cert is ok to use as an HTTPS cert:
openssl verify -purpose sslserver -CAfile /etc/pki/CA/cacert.pem /etc/pki/CA/certs/Milnet_HTTP.crt
Included below are some commands that I have found, created or tweaked to help make life easier along the way.
Getting SELinux working can be tough. Here are some commands I found useful.
Is SELinux enabled?
Deactivate all inactive users in the last year:
Yes, some distros still use rpm.
Extract files from an RPM:
Get into the correct directory:
cd /etc/pki/tls/certs