maintenance:general:tools:mk_ssl_cert.pl
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
maintenance:general:tools:mk_ssl_cert.pl [2019/07/16 13:33] – ↷ Links adapted because of a move operation jbosch | maintenance:general:tools:mk_ssl_cert.pl [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== mk_ssl_cert.pl ====== | ||
+ | |||
+ | The '' | ||
+ | |||
+ | This script needs to be run before enabling SSL using [[maintenance: | ||
+ | |||
+ | The script can be used to create certificate signing request (CSR) that must be submitted to a certificate authority for signing. The returned certificate must then be installed. | ||
+ | |||
+ | But the script can also create a self-signed certificate (CRT) which can be used directly but will evoke warnings on the browser and probably needs TWO (!) exceptions to be added. More on this below. | ||
+ | |||
+ | The tool works interactively using a menu with options. It must be executed as ' | ||
+ | |||
+ | The tool is interactive. Abort at any stage using '< | ||
+ | |||
+ | < | ||
+ | yce@genesis / | ||
+ | $ mk_ssl_cert.pl | ||
+ | ----------------------------------------------------- | ||
+ | Actions: | ||
+ | 1) generate CONF file (certificate settings) | ||
+ | 2) generate CSR file (certificate signing request) | ||
+ | 3) extend | ||
+ | 4) generate CRT file (self-signed certificate) | ||
+ | 5) extend | ||
+ | q) quit | ||
+ | Select action: [1] | ||
+ | </ | ||
+ | |||
+ | First, under option 1), a number of configuration parameters need to be answered. The results will be stored in a CONF file that will provide the default answers for a follow-up session (''/ | ||
+ | |||
+ | < | ||
+ | Select action: [1] 1 | ||
+ | Please enter appropriate values for the certificate. | ||
+ | (blank values will be ignored) | ||
+ | Country Name (2 letter code) [NL] | ||
+ | Domain name (genesis.netyce.org or *.netyce.org) [genesis.netyce.org] | ||
+ | Locality Name (eg city) [Weesp] | ||
+ | Organization Name [NetYCE] | ||
+ | Organizational Unit (eg section) [Development] | ||
+ | State or Province Name [Noord-Holland] | ||
+ | Email address | ||
+ | -> created CONF file: / | ||
+ | </ | ||
+ | |||
+ | Next choose option 2) to get the file needed to request a true SSL certificate or option 4) to create a ' | ||
+ | |||
+ | Option 2) will first generate a KEY file for the host and a CSR file. This CSR file must be submitted for signing by an external CA organisation. All certificate files must use the filename convention "< | ||
+ | |||
+ | The certificate file returned by the CA must be copied back to the ''/ | ||
+ | |||
+ | For option 4), the self-signed certificate, | ||
+ | |||
+ | Options 3) and 5) are useful to create extensions of the CSR or CRT in the form of INFO and PEM files. The INFO files report some details that can be extracted from the CSR or CRT. | ||
+ | |||
+ | Please be aware that a KEY file is always used in conjunction with a certificate. Regenerating a KEY file will render a CRT or CSR useless. So instead of overwriting an existing KEY file, the tool will prompt you if a KEY is already present. | ||
+ | |||
+ | < | ||
+ | Select action: [1] 2 | ||
+ | Creating CSR | ||
+ | -> have KEY file: / | ||
+ | WARNING: a KEY file already exists - overwriting will obsolete existing certificates! | ||
+ | Use existing KEY file or create new? [Y] ? | ||
+ | enter ' | ||
+ | Use existing KEY file or create new? [Y] | ||
+ | </ | ||
+ | |||
+ | |||
+ | Once the KEY and CRT and files are in place, [[maintenance: | ||
+ | |||
+ | |||
+ | ===== Self signed certificates ===== | ||
+ | |||
+ | when using self-signed certificates, | ||
+ | |||
+ | |||
+ | |{{ : | ||
+ | |||
+ | |||
+ | The browser usually gives you an option to accept the risk after clicking an ' | ||
+ | |||
+ | However, this may not result in a workable NetYCE front-end just yet. NetYCE uses TWO connections to its servers, one for the http content (now using port 443 for SSL) and one for the data (using port 8080). | ||
+ | |||
+ | When the login page shows the error message "Could not connect to backend - Please contact your administrator", | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | The resolution requires the user to access the port 8080 directly and then repeat the exception process. Change the URL in the browser from | ||
+ | < | ||
+ | https:// | ||
+ | </ | ||
+ | to | ||
+ | < | ||
+ | https:// | ||
+ | </ | ||
+ | |||
+ | After accepting the risks or creating another exception, a page with " | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | Then the user can go back to the regular login-page where he can login normally. | ||
+ | |||
+ | Depending on the browser and the actions taken, the user must repeat this process each time he restarted his browser. | ||
+ | |||