Hi!

Even if I'm not the OP, this is a good guide... Cool.

On Sat, Jun 14, 2008 at 10:42:37AM -0700, Dustin Lundquist wrote:
>[...]

>The process of setting up signed cert is as follows:
>1. Generate your private key and secure file permissions (you want to do
>this in a secure fashion, i.e. on the box directly as a root or a
>private user). Guard this file: if it is compromised the security SSL
>provides is compromised.:
>openssl genrsa -out secure.example.com.key 4096
>chmod 400 secure.example.com.key

Before all that: umask 077, so there'll be no window of time when the
key will be group/world readable.

>[...]

>3. Send the CSR (you can open the file and copy and paste the contents
>into an email, or the certificate authority's website) to the
>certificate authority along with what ever other documentation they
>require (there job is to verify you are who you are requesting a
>certificate for before signing the key, they usally require some proof
>of domain ownership and everything else you entered in step 2).

>4. You will then receive your signed certificate, you can either keep
>the certificate in a separate file from your private key, or cat them
>together to make a .pem file: cat secure.example.com.key
>secure.example.com.cert > secure.example.com.pem; chmod 400
>secure.example.com.pem
>Configure apache to use your new cert and key:
>SSLCertificateFile /etc/ssl/secure.example.com.cert
>SSLCertificateKeyFile /etc/ssl/secure.example.com.key
> - or -
>SSLCertificateFile /etc/ssl/secure.example.com.key

Again, before the cat, use umask 077, for the same reason.

>Since apache is chrooted, have to restart it to read the new key and
>certificate.

>Dustin Lundquist

Again, thanks for the cool explanations and step-by-step kind of guide.
Will probably be helpful for more than the original poster.

Kind regards,

Hannah.

Reply via email to