Difference between revisions of "Internal Installing Apache SSL Certs"
Jump to navigation
Jump to search
(Dumping instructions) |
|||
Line 1: | Line 1: | ||
*Load StartSSL trusted login cert into browser | *Load StartSSL trusted login cert into browser (Located on Password Gorilla) | ||
*Login and choose the certificate wizard (verify domain if required) | *Login and choose the certificate wizard (verify domain if required) | ||
Line 7: | Line 7: | ||
*SSH into the server and run in /etc/ssl | *SSH into the server and run in /etc/ssl | ||
wget https://www.startssl.com/certs/ca.pem | wget https://www.startssl.com/certs/ca.pem | ||
wget https://www.startssl.com/certs/sub.class1.server.ca.pem | |||
wget https://www.startssl.com/certs/sub.class1.server.ca.pem | # Generate the request | ||
openssl req -new -newkey rsa:2048 -nodes -keyout fqdn.key -out fqdn.csr | |||
openssl req -new -newkey rsa:2048 -nodes -keyout | |||
*Set the server domain name for CN | *Set the server domain name for CN | ||
Line 19: | Line 18: | ||
*Wait for verification | *Wait for verification | ||
*Follow the instructions in the email and create | *Follow the instructions in the email and create ''fqdn.crt'' | ||
*Rename the ''fqdn.key'' and ''fqdn.crt'' to the common name | |||
*Modify ''/etc/ssl/apache.conf'' to read like this | |||
SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown | SSLEngine On | ||
SSLProtocol all -SSLv2 | |||
SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM | |||
SSLCertificateChainFile /etc/ssl/sub.class1.server.ca.pem | |||
SSLCACertificateFile /etc/ssl/ca.pem | |||
SSLCertificateFile /etc/ssl/certs/<common name>.crt | |||
SSLCertificateKeyFile /etc/ssl/private/<common name>.key | |||
SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown | |||
*Restart the apache server daemon | *Restart the apache server daemon |
Revision as of 20:13, 4 January 2013
- Load StartSSL trusted login cert into browser (Located on Password Gorilla)
- Login and choose the certificate wizard (verify domain if required)
- Skip automatic cert generation in the wizard
- SSH into the server and run in /etc/ssl
wget https://www.startssl.com/certs/ca.pem wget https://www.startssl.com/certs/sub.class1.server.ca.pem # Generate the request openssl req -new -newkey rsa:2048 -nodes -keyout fqdn.key -out fqdn.csr
- Set the server domain name for CN
- Copy server.csr into StartSSL's Cert Wizard
- Wait for verification
- Follow the instructions in the email and create fqdn.crt
- Rename the fqdn.key and fqdn.crt to the common name
- Modify /etc/ssl/apache.conf to read like this
SSLEngine On SSLProtocol all -SSLv2 SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM SSLCertificateChainFile /etc/ssl/sub.class1.server.ca.pem SSLCACertificateFile /etc/ssl/ca.pem SSLCertificateFile /etc/ssl/certs/<common name>.crt SSLCertificateKeyFile /etc/ssl/private/<common name>.key SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown
- Restart the apache server daemon