Hello all,

I'm a newbie in ssl and certificates and I need some explanation about (I've already red manuals and howtos but still too dark for me) :
On debian,
* To generate a self-signed certificate, I use these commands :
/usr/lib/ssl/misc/CA.sh -newca
openssl req -newkey rsa:1024 -nodes -keyout newreq.pem -out newreq.pem
/usr/lib/ssl/misc/CA.sh -sign

Files resulting of these operations are demoCA/cacert.pem demoCA/private/cakey.pem, newreq.pem, newcert.pem

Questions : These commands are they sufficient and good ?
To generate other certificates on the same host, should I execute again (and use the demoCA): openssl req -newkey rsa:1024 -nodes -keyout newreq.pem -out newreq.pem
                  /usr/lib/ssl/misc/CA.sh -sign

                  in the same directory ?

Self signed certificates, even if they are not signed by an official CA, provide a good security level for TLS communications ?
                  Can I obtain official and free certificates ?

To finish, the recurrent issue (sorry), but in a real case :
I've got to servers with mail servers and openldap (both in a lan but not in the same site) and I want to replicate openldap db using TLS.
   machine 1 name : server1.domain.com
   machine 2 name: server2             (no domain name)
theses machines have no entry in dns (like ldap.domain.com).

   During CA creation, what Common Name should I provide on each host ?
During selfsigned certificates creation, what Common Name should I provide on each host ?

   Should I use the same CA for both certificates ?


If someone could answer simply and clearly, it could be helpful.

Thx.

Max

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to