2019-10-21 14:38:28 -04:00
|
|
|
The certificates in this dir expire on Sept, 27th, 2118
|
|
|
|
|
|
|
|
Certificates generated using original instructions from this gist:
|
|
|
|
https://gist.github.com/cecilemuller/9492b848eb8fe46d462abeb26656c4f8
|
|
|
|
|
|
|
|
## Certificate authority (CA)
|
|
|
|
|
2020-02-17 11:59:51 -05:00
|
|
|
Generate RootCA.pem, RootCA.key, RootCA.crt:
|
2019-10-21 14:38:28 -04:00
|
|
|
|
|
|
|
```shell
|
|
|
|
openssl req -x509 -nodes -new -sha256 -days 36135 -newkey rsa:2048 -keyout RootCA.key -out RootCA.pem -subj "/C=US/CN=Example-Root-CA"
|
|
|
|
openssl x509 -outform pem -in RootCA.pem -out RootCA.crt
|
|
|
|
```
|
|
|
|
|
|
|
|
Note that Example-Root-CA is an example, you can customize the name.
|
|
|
|
|
|
|
|
## Domain name certificate
|
|
|
|
|
|
|
|
First, create a file domains.txt that lists all your local domains (here we only
|
|
|
|
list localhost):
|
|
|
|
|
|
|
|
```shell
|
|
|
|
authorityKeyIdentifier=keyid,issuer
|
|
|
|
basicConstraints=CA:FALSE
|
|
|
|
keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
|
|
|
|
subjectAltName = @alt_names
|
|
|
|
[alt_names]
|
|
|
|
DNS.1 = localhost
|
|
|
|
```
|
|
|
|
|
|
|
|
Generate localhost.key, localhost.csr, and localhost.crt:
|
|
|
|
|
|
|
|
```shell
|
|
|
|
openssl req -new -nodes -newkey rsa:2048 -keyout localhost.key -out localhost.csr -subj "/C=US/ST=YourState/L=YourCity/O=Example-Certificates/CN=localhost.local"
|
|
|
|
openssl x509 -req -sha256 -days 36135 -in localhost.csr -CA RootCA.pem -CAkey RootCA.key -CAcreateserial -extfile domains.txt -out localhost.crt
|
|
|
|
```
|
|
|
|
|
|
|
|
Note that the country / state / city / name in the first command can be
|
|
|
|
customized.
|
|
|
|
|
|
|
|
For testing purposes we need following files:
|
|
|
|
|
|
|
|
- `RootCA.crt`
|
|
|
|
- `RootCA.key`
|
|
|
|
- `RootCA.pem`
|
|
|
|
- `locahost.crt`
|
|
|
|
- `locahost.key`
|