well i am still unsure abut the full encryption. i don't like that. if
there is a problem the overheads grow to analyze the situation. what about
just signing the messages? i mean if you have messages for all why do you
want to hide them?

E

On 2 February 2017 at 17:54, <rich.gre...@hushmail.com> wrote:

> Hello,
>
> There is a freshly installed (from Ubuntu 16.04 package) apache server
> running in a large institution that needs to have port 443 traffic
> enabled.  I am helping a friend of mine configure this server and, at the
> same time, writing a document for reproducing the installation procedure
> that will be published online.  The server has it's own subdomain and the
> system administrator generated encryption keys to be used for this server.
> The administrator is talented, but seems to be inexperienced in open-source
> solutions, so outside help is needed.  As a courtesy to my friend, whom I'm
> helping set this up, I've anonymized the TLD from the filename, but the
> files are as follows:
>
> _.example.com.p12
> Intermediate-GeoTrust-True BusinessID-RSA-SHA2-SHA1Root-primary.txt
> SSL Certificate - .example.com.txt
>
> I personally do not have easy access to these files, but I can request
> actions to be performed on them.  I had not previously been acquainted with
> P12 files until now.  I found a website that seems to be able to help me
> export data from the P12 file into a data format that apache can readily
> use:
>
> http://wiki.i.gov.ph/iwiki/bin/view/PNPKI/How+to+install+
> SSL+certificate+in+apache+ubuntu+server
>
> After reading through this website, I proposed these steps:
>
> sudo openssl pkcs12 -in /vault/_.example.com.p12 -nocerts -out
> /vault/private.pem
> sudo openssl rsa -in private.pem -out /vault/key.pem
> sudo openssl pkcs12 -in /vault/_.example.com.p12 -clcerts -nokeys -out
> /vault/cert.pem
> sudo openssl pkcs12 -in /vault/_.example.p12 -nokeys -cacerts -out
> /vault/CAchain.pem
>
> And then modify ./sites-available/site-443.conf with the lines:
>
> SSLCertificateFile /vault/cert.pem
> SSLCertificateKeyFile /vault/keys.pem
> SSLCertificateChainFile /vault/CAchain.pem
> SSLCACertificateFile /vault/Intermediate-GeoTrust-True
> BusinessID-RSA-SHA2-SHA1Root-primary.txt
>
>
> We tried some of the openssl commands in that document, but we don't have
> the password.  The file named "SSL Certificate - .example.com.txt" is
> unused, and that does concern me that I'm either neglecting a critical file
> or needlessly duplicating it.  Before asking the administrator for a
> password, we have questioned whether we are making this needlessly
> difficult and were curious if there is a solution where these files can be
> used directly by apache.
>
> As you can guess, I'm no expert at encryption.  Getting keys, for the
> purpose of self-education is very expensive.  The extent of my experience
> is limited to creating self-signed certificates back in the good old days
> before the web-browser people decided that was to be forbidden practice,
> and more recently, letsencrypt.org, which operates in a magical smoke and
> mirrors method.  I would like to know if this would be the best practice
> for my friend encrypting his server's traffic.  I am very grateful for any
> feedback.
>
> Thank you very much!
>
> Rich
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
> For additional commands, e-mail: users-h...@httpd.apache.org
>
>

Reply via email to