it was just figuring out a straight https connetion that we were interested
in - but it appears the cert is probably the least of the problems in
getting https working so it can be added to the ever growing list of things
to be solved (now including an upgrade to 1.4.9) which I'm sure we'll get
around to some day

Gary

----- Original Message -----
From: "Tim Sellar" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, June 09, 2001 9:37 PM
Subject: RE: SSL cert generation in VS


> As of freeVSD-1.4.8 it is possible for freeVSD to be installed into a
> virtual server, this allows a virtual server owner to run vsd-genca and
> create her own certificate authority just a hosting server owner can. She
> may then generate signed certificates to allow authenticated access to
> adminsister domains using a windows client. It should be possible to use
the
> same VSD CA to generate certificate/key pairs for use with HTTPS but this
> isn't something I have tried yet. Using the existing vsd-ca command set it
> is possible to generate valid certificates with any specified CommonName
> based on the /etc/vsd/openssl.cnf file. In freeVSD-1.4.8 the example
> openssl.cnf had, for simplicty, been considerably stripped down and
tweaked
> from the default file supplied with OpenSSL. This meant that many of the
> extension features, which are used by browsers but not utilised by
freeVSD,
> were not present and this may well cause problems if you attempt to use
the
> resulting certifates for HTTPS.
>
> With the freeVSD-1.4.9 code (availabler via CVS) VSD CA has been
> considerably enhanced (see the freeVSD-1.4.9 INSTALL document) and all SSL
> support in freeVSD now properly references a single openssl.cnf file. This
> file can now include all valid extensions, in fact the default openssl.cnf
> file supplied with OpenSSL can be used successfully with freeVSD, though
the
> version incldued in the distribution is preferable. This VSD CA should
> produce all the files necessary for use with Apache mod_ssl, but it is not
> something I have tried yet. Having had a quick look at the http/conf/ file
> structure I would say:
>
> ssl.key/snakeoil-ca.key is equivalent to /etc/vsd/ca/private/cakey.pem
> ssl.key/snakeoil.key is equivalent to /etc/vsd/certs/<server>.key
>
> ssl.crt/snakeoil-ca.crt is equivalent to /etc/vsd/ca/cacert.pem
> ssl.crt/snakeoil.crt is equivalent to /etc/vsd/certs/<server>.crt
>
> It should be just a matter of taking the files from your self-signed VSD
CA
> and placing them (or linking them?) into the httpd.conf structure, or
> modifying httpd.conf itself to reference the files themselves...
>
> I did notice that the snakeoil.key file is in a different format to that
> produced by VSD CA - this may be something that needs resolving.
>
> The only problem with using certificates from a VSD CA for HTTPS is that
the
> browser will deem the certificates are coming from an untrusted source,
and
> various warnings and messages will result. The only solution to this is
get
> your certificates signed by a Trusted Authority, for a fee. At present I
do
> not believe there is any way round this...
>
>
> Anyway, all this assumes you want to use the VSD CA interface which is
> intended to simplify the whole certificate handling operation, but the
> initial task has been providing authenticated access for VSD clients. I do
> intend to make the whole thing more amenable to managing certificates/keys
> for more general purposes, including Apache sites, and properly handling
> certificate requests. I intend to base some of my work on the information
> provided here: http://cognac.epfl.ch/SIC/SL/CA/ which should give you the
> knowledge you seek.
>
> If you can't wait for me to get round to it, (and it will be at least a
> month as I am taking a fortnight off soon), feel free to get stuck in
> yourself - just give me some feedback on how best it could be incoproated
> into the VSD CA.
>
> Tim
>
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED]]On Behalf Of Gary Reid
> > Sent: 09 June 2001 15:26
> > To: [EMAIL PROTECTED]
> > Subject: SSL cert generation in VS
> >
> >
> > Hi
> >
> > Should it be possible for a VS admin to create a cert/key for a
> > virt domain
> > in his VS (IP based not name based)? Or even gen info for a VS
> > cert for the
> > main site on the VS. There is the 'snake-oil' key/cert etc. This is on
an
> > rpm/pre-built-skel VSD host and I do mean a cert for https connections
to
> > 8443 not for the windows client to 1726.
> >
> > We would usually use
> >
> > openssl req -new > new.cert.csr
> > openssl rsa -in privkey.pem -out new.cert.key
> > openssl x509 -in new.cert.csr -out new.cert.cert -req -signkey
> > new.cert.key -days 365
> >
> > we get:
> >
> > bash: new.cert.csr: Permission denied
> >
> > Thanks
> >
> > gary
>

Reply via email to