Hey Luke,

You did a great job in they reply below - it's almost an FAQ!

The question I have is WHERE do you put one's CN at?

Can the CN be domain.com or does it need to be host.domain.com?
Can it be *.domain.com as an example?

Jim...

-- 
"I know you believe you understand what you think I said,
but I am not sure you realize that what you heard is not what I meant."



Luke Ross wrote:
> 
> Hi
> 
> - AGROLAN wrote:
> >
> > Where can I find instruction how to operate Opensa+ssl under or win32 ?
> 
> Once I'd made my certificate, I just plonked it into the directories
> where the other are and updated the httpd.conf file in Apache's conf
> directory to reflect the new certificate (search for SSL and you'll find
> the right entry soon enough - httpd.conf is fairly well commented).
> 
> > I am using Apache under NT and I started a new server with Opensa 0.20 + ssl
> > and it is working but I need to get my CA  , how can I do the CA by official
> > sites  or How can I do it my self ?
> 
> Documentation is thin on the ground for OpenSSL (I am fortunate in that
> I've used SSLeay before), and it's online help is simply an options
> listing.  There is an online man page in progress at
> http://www.openssl.org.
> 
> Your choices are:
> 
> * Generate a self-signed key.  This is free, but all browsers will warn
> that the site is untrusted as the key is signed by an unknown body.  For
> personal use or on an Intranet you can request that it is explicitly
> trusted.  To make a self-signed key, cd to your OpenSSL directory and
> type:
> 
> openssl req -new -key key.pem -out cert.pem -x509 -config openssl.cnf
> 
> key.pem is your private key and cert.pem is the public key.
> 
> * Get a CA to sign your key - this costs a fair bit.  The cheapest is
> probably Thawte (http://www.thawte.com), but also you may want to look
> at Verisign and GlobalSign.
> 
> You use OpenSSL to generate a key, and then send your public key to the
> CA to be signed.  They send you back the signed key.  To do this, use:
> 
> openssl req -new -key key.pem -out req.pem -config openssl.cnf
> 
> key.pem is the private key you copy to the server directory, and req.pem
> is sent to the CA for signing.  You use the key they send back as your
> public key.  This has the advantage that browsers will not generate an
> error message.
> 
> * Become your own CA.  This only holds benefits if you are in control of
> the computer connecting to the server, and you have several secure
> servers running.  Then you can load one key to trust all of them.  This
> is time consuming, and I have written a cheap'n'nasty batch file to sort
> this out (drop me a line if need be).
> 
> One last point, the Common Name part of your certificate should be the
> name of your server people will connect to, ie. www.mydomain.com.
> Otherwise it _will_ be rejected.
> 
> > How can I run Opensa+ssl as service under NT
> 
> This is in the docs in windows.html.  Use apache -n "service name".
> 
> HTH,
> 
> Luke

Reply via email to