Nicolas Ostermann wrote:
> 
> Following is what I did in my Linux server:
> 
> - For my self signed CA certificate:
> openssl genrsa -des3 -out ssl.key/CA.key 1024
> openssl req -new -x509 -days 365 -key ssl.key/CA.key -out ssl.crt/CA.crt
> openssl pkcs12 -export -in ssl.crt/CA.crt -inkey ssl.key/CA.key -out
> pkcs12/CA.p12
> (pkcs12 command to have the ca certificate in pkcs12 format and be able to
> import it into browsers)
> 

That command lets everyone know your CA private key, resulting in zero
security.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Gemplus: http://www.gemplus.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to