# openssl req -x509 -newkey rsa:1024 -keyout /etc/httpd/conf/ssl.key/server.key -out /etc/httpd/conf/ssl.crt/server.crt -days 9999 -nodes
# chown root:root /etc/httpd/conf/ssl.key/server.key
# chmod 400 /etc/httpd/conf/ssl.key/server.keyGenerating Apache SSL Self-Signed Certificate
            Submitted by sandip on Thu, 07/26/2007 - 21:59
    
    
	    
    
	    
	    
» 
  - sandip's blog
 - Login or register to post comments
 
Generating CSR from existing key
openssl req -new -key server.key -out server.csrGenerating 2048 bit CSR
openssl req -nodes -newkey rsa:2048 -keyout server.key -out server.csrdebug ssl cert with openssl
Commands used:
openssl s_client -connect host.domain.tld:443openssl s_client -showcerts -connect host.domain.tld:443
openssl s_client -state -nbio -connect host.domain.tld:443 2>&1
Reference:
http://www.cyberciti.biz/tips/debugging-ssl-communications-from-unix-shell-prompt.html
http://www.cyberciti.biz/faq/test-ssl-certificates-diagnosis-ssl-certificate/
very certificate and chain installed fine online
digicert.com
Remove passphrase from ssl key
openssl rsa -in passphrase.key -out nopass.keyCSR info
openssl req -text -noout -in /path/to/server.csrSSL certificate information
Full text information:
 
Issuer of the certificate:
 
Issued to:
 
Valid dates:
 
All of the above:
 
Hash value:
 
MD5 fingerprint:
 
# openssl x509 -text -in server.crt# openssl x509 -noout -in server.crt -issuer# openssl x509 -noout -in server.crt -subject# openssl x509 -noout -in server.crt -dates# openssl x509 -noout -in server.crt -issuer -subject -dates# openssl x509 -noout -in server.crt -hash# openssl x509 -noout -in server.crt -fingerprintRenewing self signed SSL certificate
After generating a renewed self-signed ssl cert, I got the below message:
With some digging, found that a new serial number can be set as below.
# openssl req -x509 -new -key /etc/httpd/conf/ssl.key/server.key \-out /etc/httpd/conf/ssl.crt/server.crt -days 9999 -nodes -set_serial 99999
man x509 for more info.