Brian, That worked flawlessly! Thanks so much! I opted for the encrypted private key. Question: Doesn't logrotate restart my apache server as it rotates the logs? If so, I assume I'll need to be present to put in this phrase. Is there any other way to have this step eliminated?
<<JAV>> On Tue, 2003-02-18 at 14:13, Brian J. Smith-Sweeney wrote: > There is a Makefile in /usr/share/ssl/certs for generating all kinds of > stuff with openssl (csr's, certs, CA, keys, etc). You can use the > makefile by running, in that directory... > > "make ANYNAME.crt" > > where ANYNAME is what you want the crt and key files to start with (I > like to use the server name). > > This will generate a key and then guide you through the steps for > generating a crt file. The only problem is, it requires the use of a > PEM passphrase, which means every time you restart your webserver you > have to be there to type in that password. If you want to avoid this, > you can manually generate the key and make it unencrypted by typing > > /usr/bin/openssl genrsa 1024 > ANYNAME.key > > then run > > "make ANYNAME.crt" > > as above. Now you'll get guided through generating the crt as before, > but it will use an unencrypted private key and you won't have to type > the password in each time you restart apache. Of course, using an > unencrypted private key has it's own nasty implications which I'll leave > to your imagination. > > Once you have the crt and key files, you can replace the ones apache > uses in the /etc/httpd/conf/httpd.conf file (by default they are > server.crt and server.key). You can either point the conf file to the > files in /usr/share/ssl/certs, make symlinks from the /etc/httpd/conf > directory, copy the files over, etc.; however you want to set it up so > that it's intuitive. > > Once you restart the apache server, you'll be able to go to your site > with (hopefully) any browser, and remember the certificate permanently. > You don't need to create a CA with this configuration which I like. > > A little side note: when you're create that crt file, make sure when it > asks for "Common Name" that you point the name of the site you're > clients will be pointing to. For instance, if you're server's name is > "mail.example.com", but you have a DNS cname of "webmail.example.com" > and that's the name you're clients will but using, that must be what you > use as the Common Name for your cert. If you use mail.example.com, when > people go to your site their browsers will give them an error saying the > site name doesn't make the cert name. > > Good luck, > Brian > > PS-I can rarely remember the syntax for this when necessary, so I often > check the /usr/share/ssl/certs/makefile for the openssl lines I need. > > > > -- > ======================================== > Brian Smith-Sweeney > Senior Systems Administrator > University of California, Santa Barbara > Physics Department > [EMAIL PROTECTED] > (805)-893-8366 > ======================================== > > On Tue, 2003-02-18 at 10:32, Joe Polk wrote: > > Okay, I am currently using the default cert on my Red Hat mail server to > > provide (albeit crude) encryption to my web mail login page. Of course, > > this cert is issued by localhost and will not save, so each visit a use > > is prompted to accept the cert. I want to create a unique cert, but I > > don't need a full-blown Thawte cert or anything. Do I need to create a > > CA? RH7.3 doesn't appear to have CA.pl installed with OpenSSL by > > default. I assume I will need this? Any help would be appreciated. > > > > <<JAV>> > > > > > > > > > > -- > redhat-list mailing list > unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe > https://listman.redhat.com/mailman/listinfo/redhat-list -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list