生成自签名SSL证书

下面介绍如何生成自签名SSL证书。前提是系统已经安装好openssl。

[root@mail ~]# cd /etc/pki/tls/certs

# 生成私钥
[root@mail certs]# make server.key
umask 77 ; \
/usr/bin/openssl genrsa -aes128 2048 > server.key
Generating RSA private key, 2048 bit long modulus
..............................................................+++
.........+++
e is 65537 (0x010001)
Enter pass phrase:    #输入密码
Verifying - Enter pass phrase:  #重复输入密码

#下面这个步骤是删除server.key中的密码
[root@mail certs]# openssl rsa -in server.key -out server.key
Enter pass phrase for server.key:  #输入刚才设置的密码
writing RSA key

# 生成CSR(证书签名请求)
[root@mail certs]# make server.csr
umask 77 ; \
/usr/bin/openssl req -utf8 -new -key server.key -out server.csr
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [XX]:CN   #国家简称
State or Province Name (full name) []:Beijing   #省
Locality Name (eg, city) [Default City]:Beijing  #城市
Organization Name (eg, company) [Default Company Ltd]:OPS  #公司名
Organizational Unit Name (eg, section) []:OPS   #部门名
Common Name (eg, your name or your server's hostname) []:mail.opsky.top
Email Address []:[email protected]  

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:  #直接按Enter
An optional company name []:  #直接按Enter

#生成自签名证书
[root@mail certs]# openssl x509 -in server.csr -out server.crt -req -signkey server.key -days 3650
Signature ok
subject=C = CN, ST = Beijing, L = Beijing, O = OPS, OU = OPS, CN = mail.opsky.top, emailAddress = [email protected]
Getting Private key

#设置权限
[root@mail certs]# chmod 400 server.*

生成自签名证书后,就可以使用sever.crt和server.key加密通信数据。

猜你喜欢

转载自blog.csdn.net/shile/article/details/78437258