Why don't you read the OpenSSL manual that comes with
your SSL-enabled Apache?

Anyway here's a basic command line example:

generate the pop certificate request:
-------------------------------------

openssl req -config path/to/ur/openssl.cnf \
-newkey rsa:2048 -keyout pop-server-key.pem \
-out pop-server-req.pem

issue the certificate using a existing CA certificate:
------------------------------------------------------

openssl ca -config path/to/ur/openssl.cnf \
-name name-of-ur-ca \
-in pop-server-req.pem -out pop-server-cert.pem

Read your OpenSSL manual as well.

dave schrieb:
Hello,
    I've got a 5.3 box that i'm using as a self-signing ca. I want to get
keys going for all the various protocols i use, http, which i've done, pop
and imap, and smtp. It's these last three i'm having the headache. I'm using
postfix as my MTA and courier imap for pop/imap, i know that the latter has
a program to generate keys but not csr's, i'm not sure how to get keys from
courier and/or postfix to the ca for signing. I'm probably missing somehing
very basic, and would appreciate any help.
Thanks.
Dave.

_______________________________________________
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

!DSPAM:41c5be83339755710121396!



-- Mit freundlichen Gruessen / With kind regards

Daniel S. Haischt   | phone:    +49 -7032-992909
Grabenstrasse 11    |           +49 -700-DHAISCHT
                    | fax:      +49 -7032-992910
D-71083 Herrenberg  | fax2mail: +49 -7032-7999738
GERMANY             | cell:     +49 -172-7668936

SIP:   sip:[EMAIL PROTECTED]:5060
email: [EMAIL PROTECTED]
web:   http://www.daniel.stefan.haischt.name/
_______________________________________________
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to