Stewart Stremler wrote:
Hm. Apparently becoming a CA isn't that hard: it seems that something called
SSLeay has all the programs and scripts you need.

So does OpenSSL.

To create your CA:
openssl req -nodes -config /etc/openssl.conf -days 1825 -x509 -newkey rsa:2048 -out newca.crt -outform PEM

To sign from your CA:
openssl ca -batch -config /etc/openssl.conf -in newcert.csr -out newcert.crt

To generate a CRL (important!):
openssl ca -config /etc/openssl.conf -gencrl -out newcacrl.crt

To revoke a certificate (requires local copy):
openssl ca -config /etc/openssl.conf -revoke somecert.crt
(then generate the CRL again)

The problem with the CRL stuff is that no clients check to see if certificates have been revoked by the issuer. Try it: specify a proper CRL URL in your certificate, revoke the cert, and see what your browser says. SUCKS!

Anyhow, it's easy to roll your own CA and sign certs from it. It's hard to revoke them and have it actually matter.

-kelsey


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to