Why don't you read the OpenSSL manual that comes with your SSL-enabled Apache?
Anyway here's a basic command line example:
generate the pop certificate request: -------------------------------------
openssl req -config path/to/ur/openssl.cnf \ -newkey rsa:2048 -keyout pop-server-key.pem \ -out pop-server-req.pem
issue the certificate using a existing CA certificate: ------------------------------------------------------
openssl ca -config path/to/ur/openssl.cnf \ -name name-of-ur-ca \ -in pop-server-req.pem -out pop-server-cert.pem
Read your OpenSSL manual as well.
dave schrieb:
Hello, I've got a 5.3 box that i'm using as a self-signing ca. I want to get keys going for all the various protocols i use, http, which i've done, pop and imap, and smtp. It's these last three i'm having the headache. I'm using postfix as my MTA and courier imap for pop/imap, i know that the latter has a program to generate keys but not csr's, i'm not sure how to get keys from courier and/or postfix to the ca for signing. I'm probably missing somehing very basic, and would appreciate any help. Thanks. Dave.
_______________________________________________ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
!DSPAM:41c5be83339755710121396!
-- Mit freundlichen Gruessen / With kind regards
Daniel S. Haischt | phone: +49 -7032-992909 Grabenstrasse 11 | +49 -700-DHAISCHT | fax: +49 -7032-992910 D-71083 Herrenberg | fax2mail: +49 -7032-7999738 GERMANY | cell: +49 -172-7668936
SIP: sip:[EMAIL PROTECTED]:5060 email: [EMAIL PROTECTED] web: http://www.daniel.stefan.haischt.name/ _______________________________________________ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"