User Tools

Site Tools


myhelp:openssl

Create new key and csr for ssl-cert

openssl genrsa -des3 -out server17.key 2048
openssl req -new -key server17.key -out server17.csr

OR all in one command

openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr

and maybe also a self signed certificate:

openssl x509 -req -days 365 -in server17.csr -signkey server17.key -out server17.crt

get key uncrypted:

openssl rsa -in server17.key -out postfix.key.unencrypted

Use a config-File

server.cnf

[req]
distinguished_name = req_distinguished_name
req_extensions = v3_req
default_keyfile = server.key
prompt = no
encrypt_key = no
default_bits = 4096
default_md = sha512

[req_distinguished_name]
# two character country code
C = XX
# State or Province Name
ST = Middelearth
# Locality Name (eg, city)
L = Gondor
# Organization Name (eg, company)
O = Fellowship of the ring
# Organizational Unit Name (eg, section) 
OU = Hobbits
# Common Name (eg, your name or your server's hostname) 
CN = alias1.example.com

[v3_req]
keyUsage = keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth
subjectAltName = @alt_names

[alt_names]
DNS.1 = server1.example.com
DNS.2 = alias1.example.com
IP = 10.20.30.40

After editing the file you can generate your CSR

# openssl req -new -config server.cnf -out server.csr

Get things out of a pfx file

Certificate
# openssl pkcs12 -in /path/to/wildcard.pfx -out /path/to/certstore/mydomain.cer -nokeys -clcerts 
key
# openssl pkcs12 -in /path/to/wildcard.pfx -out /path/to/keystore/mydomain.key -nocerts -nodes 
CA-Cert
# openssl pkcs12 -in /path/to/wildcard.pfx -out /path/to/certstore/ca.cer -nodes -nokeys -cacerts 

Get things in a pfx file

openssl pkcs12 -inkey bob_key.pem -in bob_cert.cert -export -out bob_pfx.pfx
myhelp/openssl.txt · Last modified: by ulrich