Hi Martin

Thanks for clarification!
I went the better approach to generate a csr on the server.

Regards
Stefan

Am 16.01.19 um 14:23 schrieb Martin Bartosch:
Hi,

I'm new to OPENXPKI and I'm wondering how I could create a Certificate for 
apache2.
I have OPENXPKI up and running, I can already create Certificates with the 
predefined TLS/Web Server Certificate Profile.
But I want to modify this profile, that I can create a certificate with key 
without passphrase. I don't want to enter the passphrase everytime I restart 
apache.
The quick answer is: for security reasons OpenXPKI enforces setting a 
passphrase if the private key is generated on the PKI side. This is by design 
and a good practice. It is also not easily possible to disable passphrased on 
keys generated on the PKI.

What you can do, however, is change or remove the passphrase protection from 
the downloaded key.

Download the key in PEM format and run
openssl rsa -in INFILE -out OUTFILE

INFILE is the encrypted private key you downloaded from the PKI. OUTFILE is the 
unencrypted RSA key which can be directly used by Apache.

However, a much better approach is to generate the private key on the server 
where the certificate is used and create a PKCS#10 request (CSR) from the 
private key. This file can be uploaded to OpenXPKI as a certificate request, 
Oxi can issue a certificate and you import the generated certificate on your 
system.
If you do this, the private key never leaves your system, which is much 
preferred to sending around private keys.

CSRs and certificates only contain public information, hence no worried with 
leaking this.

HTH

Martin



_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users



_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to