This might be useful http://unmitigatedrisk.com/?p=194

Ryan Hurst


Sent from my phone, please forgive the brevity.

> On Oct 12, 2013, at 12:53 AM, Ted Byers <r.ted.by...@gmail.com> wrote:
> 
> I found a Linux FAQ dealing with this subject, but it is very dated
> (11.5 years old) and I do not know how much has changed since it was
> last updated.  While I am a programmer, I am looking only to use
> openssl to make the certificates and keys I need, and not to create
> new programs using openssl (unless in the course of my studyign the
> use of openssl, I find I need to write some custom code).
> 
> Here is what I want to do.  I want to create a certificate authority
> to make certificates for a couple of my web servers, for the purpose
> of having support for HTTPS, and if possible sign selected documents
> that are then served to the user's browser (just those I selected, not
> all by any means); with the ability to let the user download the
> certificate to let him trust the server afterwards.  I also want to
> support creating client side certificates that support encrypting and
> signing emails and form data on web pages (to support non-repudiation,
> with the assurance that the signed document was not altered since it
> was signed).  None of the certificates I need need support for code
> signing.
> 
> Do I need both root and non root CAs, or will a root CA suffice by itself.
> 
> And where should the keys and certificates be placed on Ubuntu and
> Suse (I have both), and should I do all this as a normal user or as
> root (NB: I am still trying to learn anough about administering Linux
> that I can at least deal with the things I need to do on my Linux
> boxes, so it is OK to be a little pedantic)?
> 
> I am a bit concerned about usability on the server as the FAQ I have
> been reading (actually one of the clearest I have seen even though it
> is old), since it says I should not remove the pass phrase from the
> certificate, but I would think that would make HTTPS unusable since it
> would ask the user for a password each time he asks for a resource
> from the server.  At the same time, can I force a requirement that the
> client side certificates require a password that has a reasonable
> strength?  If so, how?
> 
> And for all this, will one opeenssl.cnf suffice, or do I have to make several?
> 
> Finally, is there a good document or example that tells me not only
> what cofiguration options are available to enter in openssl.cnf, but
> what values will provide me with the best security for the longest
> period consistent with what is supported in the most commonly used
> browsers?  Something that says something like 'This is X, and it is
> for Y, but do not touch it unless you know what you're doing', and yet
> provides no guidance for further reading so the user can learn what he
> needs to know about all of it, is not so useful for my purposes.
> 
> NB: This is primarily for my own education.
> 
> Thank you for your time.
> 
> Ted
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to