#!/bin/sh ## ## mkcert.sh -- SSL Certificate Generation Utility ## Copyright (c) 1998-2000 Ralf S. Engelschall, All Rights Reserved. ## # parameters parameters=`getopt a:c:t:k:v $*` if [ $# = 0 ]; then cat << EOF Usage: mkcert.sh [-t type] [-a algo] [-c crtfile ] [-k keyfile] [-v] Options: -t type Type of certificates to generate. Valid types are: dummy self-signed Snake Oil cert test test cert signed by Snake Oil CA custom custom cert signed by own CA existing existing cert -a algo Signature algorithm for generated certificate. Valid algorithms are RSA or DSA. -c crtfile Path to an existing certificate -k keyfile Path to an existing key file -v Display the certificate and key, then exit. EOF exit 2 fi set -- $parameters for param; do case $param in -a) algo=$2 ;; -c) crt=$2 ;; -t) type=$2 ;; -k) key=$2 ;; -v) view=1 ;; --) break ;; esac shift done openssl="openssl" confdir=@PKG_SYSCONFDIR@ # configuration sslcrtdir="$confdir/ssl.crt" sslcsrdir="$confdir/ssl.csr" sslkeydir="$confdir/ssl.key" sslprmdir="$confdir/ssl.prm" sslcrldir="$confdir/ssl.crl" if [ ! -d "${sslcrtdir}" ]; then echo "Creating ${sslcrtdir}" mkdir "${sslcrtdir}" || exit 1 fi if [ ! -d "${sslcsrdir}" ]; then echo "Creating ${sslcsrdir}" mkdir "${sslcsrdir}" || exit 1 fi if [ ! -d "${sslkeydir}" ]; then echo "Creating ${sslkeydir}" mkdir "${sslkeydir}" || exit 1 fi if [ ! -d "${sslprmdir}" ]; then echo "Creating ${sslprmdir}" mkdir "${sslprmdir}" || exit 1 fi if [ ! -d "${sslcrldir}" ]; then echo "Creating ${sslcrldir}" mkdir "${sslcrldir}" || exit 1 fi # some optional terminal sequences case $TERM in xterm|xterm*|vt220|vt220*) T_MD=`echo dummy | awk '{ printf("%c%c%c%c", 27, 91, 49, 109); }'` T_ME=`echo dummy | awk '{ printf("%c%c%c", 27, 91, 109); }'` ;; vt100|vt100*) T_MD=`echo dummy | awk '{ printf("%c%c%c%c%c%c", 27, 91, 49, 109, 0, 0); }'` T_ME=`echo dummy | awk '{ printf("%c%c%c%c%c", 27, 91, 109, 0, 0); }'` ;; default) T_MD='' T_ME='' ;; esac # display header echo "${T_MD}SSL Certificate Generation Utility${T_ME} (mkcert.sh)" echo "Copyright (c) 1998-2000 Ralf S. Engelschall, All Rights Reserved." # on request view certificates only if [ ".$view" != . ]; then if [ -f "$sslcrtdir/ca.crt" -a -f "$sslkeydir/ca.key" ]; then echo "" echo "${T_MD}CA X.509 Certificate${T_ME} [ca.crt]" echo "______________________________________________________________________" $openssl x509 -noout -text -in $sslcrtdir/ca.crt echo "" if [ ".`$openssl x509 -noout -text -in $sslcrtdir/ca.crt | grep 'Signature Algorithm' | grep -i RSA`" != . ]; then echo "${T_MD}CA RSA Private Key${T_ME} [ca.key]" echo "______________________________________________________________________" $openssl rsa -noout -text -in $sslkeydir/ca.key else echo "${T_MD}CA DSA Private Key${T_ME} [ca.key]" echo "______________________________________________________________________" $openssl dsa -noout -text -in $sslkeydir/ca.key fi fi if [ -f "$sslcrtdir/server.crt" -a -f "$sslkeydir/server.key" ]; then echo "" echo "${T_MD}Server X.509 Certificate${T_ME} [server.crt]" echo "______________________________________________________________________" $openssl x509 -noout -text -in $sslcrtdir/server.crt echo "" if [ ".`$openssl x509 -noout -text -in $sslcrtdir/server.crt | grep 'Signature Algorithm' | grep -i RSA`" != . ]; then echo "${T_MD}Server RSA Private Key${T_ME} [server.key]" echo "______________________________________________________________________" $openssl rsa -noout -text -in $sslkeydir/server.key else echo "${T_MD}Server DSA Private Key${T_ME} [server.key]" echo "______________________________________________________________________" $openssl dsa -noout -text -in $sslkeydir/server.key fi fi exit 0 fi # find some random files # We will always generate a /tmp/randfile using /dev/urandom # before passing $randfile to openssl. randfiles='/tmp/randfile' for file in /var/log/messages /var/adm/messages /var/log/system.log /var/wtmp \ /kernel /kernel/genunix /vmunix /vmlinuz /mach /netbsd \ /etc/hosts /etc/group /etc/resolv.conf /bin/ls; do if [ -r $file ]; then if [ ".$randfiles" = . ]; then randfiles="$file" else randfiles="${randfiles}:$file" fi fi done # initialize random file if [ -f $HOME/.rnd ]; then RANDFILE="$HOME/.rnd" else RANDFILE="/tmp/.mkcert.rnd" (ps; date) >$RANDFILE fi export RANDFILE # canonicalize parameters case "x$type" in x ) type=test ;; esac case "x$algo" in xRSA|xrsa ) algo=RSA ;; xDSA|xdsa ) algo=DSA ;; x ) algo=choose ;; * ) echo "Unknown algorithm \'$algo' (use RSA or DSA!)" 1>&2 exit 1 ;; esac # processing case $type in dummy) echo "" echo "${T_MD}Generating self-signed Snake Oil certificate [DUMMY]${T_ME}" echo "______________________________________________________________________" echo "" if [ ".$algo" = .choose ]; then algo=RSA fi if [ ".$algo" = .RSA ]; then cp $sslcrtdir/snakeoil-rsa.crt $sslcrtdir/server.crt (umask 077; cp $sslkeydir/snakeoil-rsa.key $sslkeydir/server.key) else cp $sslcrtdir/snakeoil-dsa.crt $sslcrtdir/server.crt (umask 077; cp $sslkeydir/snakeoil-dsa.key $sslkeydir/server.key) fi echo "${T_MD}RESULT: Server Certification Files${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.key/server.key${T_ME}" echo " The PEM-encoded $algo private key file which you configure" echo " with the 'SSLCertificateKeyFile' directive (automatically done" echo " when you install via APACI). ${T_MD}KEEP THIS FILE PRIVATE!${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.crt/server.crt${T_ME}" echo " The PEM-encoded X.509 certificate file which you configure" echo " with the 'SSLCertificateFile' directive (automatically done" echo " when you install via APACI)." echo "" echo "WARNING: Do not use this for real-life/production systems" echo "" ;; test) echo "" echo "${T_MD}Generating test certificate signed by Snake Oil CA [TEST]${T_ME}" echo "WARNING: Do not use this for real-life/production systems" if [ ".$algo" = .choose ]; then echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 0: Decide the signature algorithm used for certificate${T_ME}" echo "The generated X.509 CA certificate can contain either" echo "RSA or DSA based ingredients. Select the one you want to use." def1=R def2=r def=RSA prompt="Signature Algorithm ((R)SA or (D)SA) [$def1]:" while [ 1 ]; do echo dummy | awk '{ printf("%s", prompt); }' "prompt=$prompt" read algo if [ ".$algo" = ".$def1" -o ".$algo" = ".$def2" -o ".$algo" = . ]; then algo=$def break elif [ ".$algo" = ".R" -o ".$algo" = ".r" ]; then algo=RSA break elif [ ".$algo" = ".D" -o ".$algo" = ".d" ]; then algo=DSA break else echo "mkcert.sh:Warning: Invalid selection" 1>&2 fi done fi if [ ".$algo" = ".DSA" ]; then echo "" echo "${T_MD}WARNING!${T_ME} You're generating a DSA based certificate/key pair." echo " This implies that RSA based ciphers won't be available later," echo " which for your web server currently still means that mostly all" echo " popular web browsers cannot connect to it. At least not until" echo " you also generate an additional RSA based certificate/key pair" echo " and configure them in parallel." fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 1: Generating $algo private key (1024 bit) [server.key]${T_ME}" (umask 077; head -500 /dev/urandom > randfile) if [ ".$algo" = .RSA ]; then if [ ".$randfiles" != . ]; then $openssl genrsa -rand $randfiles -out $sslkeydir/server.key 1024 else $openssl genrsa -out $sslkeydir/server.key 1024 fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate RSA private key" 1>&2 exit 1 fi else echo "Generating DSA private key via SnakeOil CA DSA parameters" if [ ".$randfiles" != . ]; then (umask 077 $openssl gendsa -rand $randfiles \ -out $sslkeydir/server.key \ $sslprmdir/snakeoil-ca-dsa.prm) else (umask 077 $openssl gendsa -out $sslkeydir/server.key \ $sslprmdir/snakeoil-ca-dsa.prm) fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate DSA private key" 1>&2 exit 1 fi fi rm -f randfile echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 2: Generating X.509 certificate signing request [server.csr]${T_ME}" cat >/tmp/.mkcert.cfg <&2 exit 1 fi rm -f /tmp/.mkcert.cfg prompt="8. Certificate Validity (days) [365]:" echo dummy | awk '{ printf("%s", prompt); }' "prompt=$prompt" read days if [ ".$days" = . ]; then days=365 fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 3: Generating X.509 certificate signed by Snake Oil CA [server.crt]${T_ME}" echo dummy | awk '{ printf("%s", prompt); }' "prompt=Certificate Version (1 or 3) [3]:" read certversion extfile="" if [ ".$certversion" = .3 -o ".$certversion" = . ]; then extfile="-extfile /tmp/.mkcert.cfg" cat >/tmp/.mkcert.cfg </tmp/.mkcert.serial fi if [ ".$algo" = .RSA ]; then $openssl x509 $extfile \ -days $days \ -CAserial /tmp/.mkcert.serial \ -CA $sslcrtdir/snakeoil-ca-rsa.crt \ -CAkey $sslkeydir/snakeoil-ca-rsa.key \ -in $sslcsrdir/server.csr -req \ -out $sslcrtdir/server.crt else $openssl x509 $extfile \ -days $days \ -CAserial /tmp/.mkcert.serial \ -CA $sslcrtdir/snakeoil-ca-dsa.crt \ -CAkey $sslkeydir/snakeoil-ca-dsa.key \ -in $sslcsrdir/server.csr -req \ -out $sslcrtdir/server.crt fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate X.509 certificate" 1>&2 exit 1 fi rm -f /tmp/.mkcert.cfg echo "Verify: matching certificate & key modulus" modcrt=`$openssl x509 -noout -modulus -in $sslcrtdir/server.crt | sed -e 's;.*Modulus=;;'` if [ ".$algo" = .RSA ]; then modkey=`$openssl rsa -noout -modulus -in $sslkeydir/server.key | sed -e 's;.*Modulus=;;'` else modkey=`$openssl dsa -noout -modulus -in $sslkeydir/server.key | sed -e 's;.*Key=;;'` fi if [ ".$modcrt" != ".$modkey" ]; then echo "mkcert.sh:Error: Failed to verify modulus on resulting X.509 certificate" 1>&2 exit 1 fi echo "Verify: matching certificate signature" if [ ".$algo" = .RSA ]; then $openssl verify -CAfile $sslcrtdir/snakeoil-ca-rsa.crt $sslcrtdir/server.crt else $openssl verify -CAfile $sslcrtdir/snakeoil-ca-dsa.crt $sslcrtdir/server.crt fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to verify signature on resulting X.509 certificate" 1>&2 exit 1 fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 4: Enrypting $algo private key with a pass phrase for security [server.key]${T_ME}" echo "The contents of the server.key file (the generated private key) has to be" echo "kept secret. So we strongly recommend you to encrypt the server.key file" echo "with a Triple-DES cipher and a Pass Phrase." while [ 1 ]; do echo dummy | awk '{ printf("Encrypt the private key now? [Y/n]: "); }' read rc if [ ".$rc" = .n -o ".$rc" = .N ]; then rc="n" break fi if [ ".$rc" = .y -o ".$rc" = .Y -o ".$rc" = . ]; then rc="y" break fi done if [ ".$rc" = .y ]; then if [ ".$algo" = .RSA ]; then (umask 077 $openssl rsa -des3 \ -in $sslkeydir/server.key \ -out $sslkeydir/server.key.crypt) else (umask 077 $openssl dsa -des3 \ -in $sslkeydir/server.key \ -out $sslkeydir/server.key.crypt) fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to encrypt $algo private key" 1>&2 exit 1 fi (umask 077; cp $sslkeydir/server.key.crypt $sslkeydir/server.key) rm -f $sslkeydir/server.key.crypt echo "Fine, you're using an encrypted $algo private key." else echo "Warning, you're using an unencrypted $algo private key." echo "Please notice this fact and do this on your own risk." fi echo "______________________________________________________________________" echo "" echo "${T_MD}RESULT: Server Certification Files${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.key/server.key${T_ME}" echo " The PEM-encoded $algo private key file which you configure" echo " with the 'SSLCertificateKeyFile' directive (automatically done" echo " when you install via APACI). ${T_MD}KEEP THIS FILE PRIVATE!${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.crt/server.crt${T_ME}" echo " The PEM-encoded X.509 certificate file which you configure" echo " with the 'SSLCertificateFile' directive (automatically done" echo " when you install via APACI)." echo "" echo "o ${T_MD}$confdir/ssl.csr/server.csr${T_ME}" echo " The PEM-encoded X.509 certificate signing request file which" echo " you can send to an official Certificate Authority (CA) in order" echo " to request a real server certificate (signed by this CA instead" echo " of our demonstration-only Snake Oil CA) which later can replace" echo " the $confdir/ssl.crt/server.crt file." echo "" echo "WARNING: Do not use this for real-life/production systems" echo "" ;; custom) echo "" echo "${T_MD}Generating custom certificate signed by own CA [CUSTOM]${T_ME}" if [ ".$algo" = .choose ]; then echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 0: Decide the signature algorithm used for certificates${T_ME}" echo "The generated X.509 certificates can contain either" echo "RSA or DSA based ingredients. Select the one you want to use." def1=R def2=r def=RSA prompt="Signature Algorithm ((R)SA or (D)SA) [$def1]:" while [ 1 ]; do echo dummy | awk '{ printf("%s", prompt); }' "prompt=$prompt" read algo if [ ".$algo" = ".$def1" -o ".$algo" = ".$def2" -o ".$algo" = . ]; then algo=$def break elif [ ".$algo" = ".R" -o ".$algo" = ".r" ]; then algo=RSA break elif [ ".$algo" = ".D" -o ".$algo" = ".d" ]; then algo=DSA break else echo "mkcert.sh:Warning: Invalid selection" 1>&2 fi done fi if [ ".$algo" = ".DSA" ]; then echo "" echo "${T_MD}WARNING!${T_ME} You're generating DSA based certificate/key pairs." echo " This implies that RSA based ciphers won't be available later," echo " which for your web server currently still means that mostly all" echo " popular web browsers cannot connect to it. At least not until" echo " you also generate an additional RSA based certificate/key pair" echo " and configure them in parallel." fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 1: Generating $algo private key for CA (1024 bit) [ca.key]${T_ME}" (umask 077; head -500 /dev/urandom > randfile) if [ ".$algo" = .RSA ]; then if [ ".$randfiles" != . ]; then $openssl genrsa -rand $randfiles -out $sslkeydir/ca.key 1024 else $openssl genrsa -out $sslkeydir/ca.key 1024 fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate RSA private key" 1>&2 exit 1 fi else if [ ".$randfiles" != . ]; then $openssl dsaparam -rand $randfiles -out $sslprmdir/ca.prm 1024 echo "Generating DSA private key:" (umask 077 $openssl gendsa -rand $randfiles -out $sslkeydir/ca.key $sslprmdir/ca.prm) else $openssl dsaparam -out $sslprmdir/ca.prm 1024 echo "Generating DSA private key:" (umask 077 $openssl gendsa -out $sslkeydir/ca.key $sslprmdir/ca.prm) fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate DSA private key" 1>&2 exit 1 fi fi rm -f randfile echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 2: Generating X.509 certificate signing request for CA [ca.csr]${T_ME}" cat >/tmp/.mkcert.cfg <&2 exit 1 fi rm -f /tmp/.mkcert.cfg prompt="8. Certificate Validity (days) [365]:" echo dummy | awk '{ printf("%s", prompt); }' "prompt=$prompt" read days if [ ".$days" = . ]; then days=365 fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 3: Generating X.509 certificate for CA signed by itself [ca.crt]${T_ME}" echo dummy | awk '{ printf("%s", prompt); }' "prompt=Certificate Version (1 or 3) [3]:" read certversion extfile="" if [ ".$certversion" = .3 -o ".$certversion" = . ]; then extfile="-extfile /tmp/.mkcert.cfg" cat >/tmp/.mkcert.cfg <&2 exit 1 fi rm -f /tmp/.mkcert.cfg echo "Verify: matching certificate & key modulus" modcrt=`$openssl x509 -noout -modulus -in $sslcrtdir/ca.crt | sed -e 's;.*Modulus=;;'` if [ ".$algo" = .RSA ]; then modkey=`$openssl rsa -noout -modulus -in $sslkeydir/ca.key | sed -e 's;.*Modulus=;;'` else modkey=`$openssl dsa -noout -modulus -in $sslkeydir/ca.key | sed -e 's;.*Key=;;'` fi if [ ".$modcrt" != ".$modkey" ]; then echo "mkcert.sh:Error: Failed to verify modulus on resulting X.509 certificate" 1>&2 exit 1 fi echo "Verify: matching certificate signature" $openssl verify $sslcrtdir/ca.crt if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to verify signature on resulting X.509 certificate" 1>&2 exit 1 fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 4: Generating $algo private key for SERVER (1024 bit) [server.key]${T_ME}" (umask 077; head -500 /dev/urandom > randfile) if [ ".$algo" = .RSA ]; then if [ ".$randfiles" != . ]; then $openssl genrsa -rand $randfiles -out $sslkeydir/server.key 1024 else $openssl genrsa -out $sslkeydir/server.key 1024 fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate RSA private key" 1>&2 exit 1 fi else if [ ".$randfiles" != . ]; then (umask 077 $openssl gendsa -rand $randfiles \ -out $sslkeydir/server.key $sslprmdir/ca.prm) else (umask 077 $openssl gendsa -out $sslkeydir/server.key $sslprmdir/ca.prm) fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate DSA private key" 1>&2 exit 1 fi fi rm -f randfile echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 5: Generating X.509 certificate signing request for SERVER [server.csr]${T_ME}" cat >/tmp/.mkcert.cfg <&2 exit 1 fi rm -f /tmp/.mkcert.cfg prompt="8. Certificate Validity (days) [365]:" echo dummy | awk '{ printf("%s", prompt); }' "prompt=$prompt" read days if [ ".$days" = . ]; then days=365 fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 6: Generating X.509 certificate signed by own CA [server.crt]${T_ME}" echo dummy | awk '{ printf("%s", prompt); }' "prompt=Certificate Version (1 or 3) [3]:" read certversion extfile="" if [ ".$certversion" = .3 -o ".$certversion" = . ]; then extfile="-extfile /tmp/.mkcert.cfg" cat >/tmp/.mkcert.cfg </tmp/.mkcert.serial fi $openssl x509 $extfile \ -days $days \ -CAserial /tmp/.mkcert.serial \ -CA $sslcrtdir/ca.crt \ -CAkey $sslkeydir/ca.key \ -in $sslcsrdir/server.csr -req \ -out $sslcrtdir/server.crt if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to generate X.509 certificate" 1>&2 exit 1 fi rm -f /tmp/.mkcert.cfg echo "Verify: matching certificate & key modulus" modcrt=`$openssl x509 -noout -modulus -in $sslcrtdir/server.crt | sed -e 's;.*Modulus=;;'` if [ ".$algo" = .RSA ]; then modkey=`$openssl rsa -noout -modulus -in $sslkeydir/server.key | sed -e 's;.*Modulus=;;'` else modkey=`$openssl dsa -noout -modulus -in $sslkeydir/server.key | sed -e 's;.*Key=;;'` fi if [ ".$modcrt" != ".$modkey" ]; then echo "mkcert.sh:Error: Failed to verify modulus on resulting X.509 certificate" 1>&2 exit 1 fi echo "Verify: matching certificate signature" $openssl verify -CAfile $sslcrtdir/ca.crt $sslcrtdir/server.crt if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to verify signature on resulting X.509 certificate" 1>&2 exit 1 fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 7: Enrypting $algo private key of CA with a pass phrase for security [ca.key]${T_ME}" echo "The contents of the ca.key file (the generated private key) has to be" echo "kept secret. So we strongly recommend you to encrypt the server.key file" echo "with a Triple-DES cipher and a Pass Phrase." while [ 1 ]; do echo dummy | awk '{ printf("Encrypt the private key now? [Y/n]: "); }' read rc if [ ".$rc" = .n -o ".$rc" = .N ]; then rc="n" break fi if [ ".$rc" = .y -o ".$rc" = .Y -o ".$rc" = . ]; then rc="y" break fi done if [ ".$rc" = .y ]; then if [ ".$algo" = .RSA ]; then (umask 077 $openssl rsa -des3 \ -in $sslkeydir/ca.key \ -out $sslkeydir/ca.key.crypt) else (umask 077 $openssl dsa -des3 \ -in $sslkeydir/ca.key \ -out $sslkeydir/ca.key.crypt) fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to encrypt $algo private key" 1>&2 exit 1 fi (umask 077; cp $sslkeydir/ca.key.crypt $sslkeydir/ca.key) rm -f $sslkeydir/ca.key.crypt echo "Fine, you're using an encrypted private key." else echo "Warning, you're using an unencrypted private key." echo "Please notice this fact and do this on your own risk." fi echo "______________________________________________________________________" echo "" echo "${T_MD}STEP 8: Enrypting $algo private key of SERVER with a pass phrase for security [server.key]${T_ME}" echo "The contents of the server.key file (the generated private key) has to be" echo "kept secret. So we strongly recommend you to encrypt the server.key file" echo "with a Triple-DES cipher and a Pass Phrase." while [ 1 ]; do echo dummy | awk '{ printf("Encrypt the private key now? [Y/n]: "); }' read rc if [ ".$rc" = .n -o ".$rc" = .N ]; then rc="n" break fi if [ ".$rc" = .y -o ".$rc" = .Y -o ".$rc" = . ]; then rc="y" break fi done if [ ".$rc" = .y ]; then if [ ".$algo" = .RSA ]; then (umask 077 $openssl rsa -des3 \ -in $sslkeydir/server.key \ -out $sslkeydir/server.key.crypt) else (umask 077 $openssl dsa -des3 \ -in $sslkeydir/server.key \ -out $sslkeydir/server.key.crypt) fi if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to encrypt $algo private key" 1>&2 exit 1 fi (umask 077; cp $sslkeydir/server.key.crypt $sslkeydir/server.key) rm -f $sslkeydir/server.key.crypt echo "Fine, you're using an encrypted $algo private key." else echo "Warning, you're using an unencrypted $algo private key." echo "Please notice this fact and do this on your own risk." fi echo "______________________________________________________________________" echo "" echo "${T_MD}RESULT: CA and Server Certification Files${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.key/ca.key${T_ME}" echo " The PEM-encoded $algo private key file of the CA which you can" echo " use to sign other servers or clients. ${T_MD}KEEP THIS FILE PRIVATE!${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.crt/ca.crt${T_ME}" echo " The PEM-encoded X.509 certificate file of the CA which you use to" echo " sign other servers or clients. When you sign clients with it (for" echo " SSL client authentication) you can configure this file with the" echo " 'SSLCACertificateFile' directive." echo "" echo "o ${T_MD}$confdir/ssl.key/server.key${T_ME}" echo " The PEM-encoded $algo private key file of the server which you configure" echo " with the 'SSLCertificateKeyFile' directive (automatically done" echo " when you install via APACI). ${T_MD}KEEP THIS FILE PRIVATE!${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.crt/server.crt${T_ME}" echo " The PEM-encoded X.509 certificate file of the server which you configure" echo " with the 'SSLCertificateFile' directive (automatically done" echo " when you install via APACI)." echo "" echo "o ${T_MD}$confdir/ssl.csr/server.csr${T_ME}" echo " The PEM-encoded X.509 certificate signing request of the server file which" echo " you can send to an official Certificate Authority (CA) in order" echo " to request a real server certificate (signed by this CA instead" echo " of our own CA) which later can replace the $confdir/ssl.crt/server.crt" echo " file." echo "" echo "Congratulations that you establish your server with real certificates." echo "" ;; existing) echo "" echo "${T_MD}Using existing custom certificate [EXISTING]${T_ME}" echo "______________________________________________________________________" echo "" if [ ".$crt" = . ]; then echo "mkcert.sh: No certificate file given" 1>&2 exit 1 fi if [ ! -f "$crt" ]; then echo "mkcert.sh: Cannot find certificate file: $crt" 1>&2 exit 1 fi if [ $crt -ef $sslcrtdir/server.crt ]; then mv -f $crt $crt.backup crt="$crt.backup" fi if [ ".$key" != . ]; then if [ ! -f "$key" ]; then echo "mkcert.sh: Cannot find private key file: $key" 1>&2 exit 1 fi if [ $key -ef $sslkeydir/server.key ]; then mv -f $key $key.backup key="$key.backup" fi cp $crt $sslcrtdir/server.crt (umask 077; cp $key $sslkeydir/server.key) else if [ $crt -ef $sslcrtdir/server.crt ]; then mv -f $crt $crt.backup crt="$crt.backup" fi key=$crt umask 077 touch $sslkeydir/server.key sed -e '/-----BEGIN CERTIFICATE/,/-----END CERTIFICATE/p' -e '/.*/d' \ <$crt >$sslcrtdir/server.crt sed -e '/-----BEGIN ... PRIVATE KEY/,/-----END ... PRIVATE KEY/p' -e '/.*/d' \ <$key >$sslkeydir/server.key fi $openssl x509 -noout -in $sslcrtdir/server.crt if [ $? -ne 0 ]; then echo "mkcert.sh:Error: Failed to check certificate contents: $crt" 1>&2 exit 1 fi if [ ".`grep 'PRIVATE KEY' $sslkeydir/server.key | grep RSA`" != . ]; then algo=RSA else algo=DSA fi echo "${T_MD}RESULT: Server Certification Files${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.key/server.key${T_ME}" echo " The PEM-encoded $algo private key file which you configure" echo " with the 'SSLCertificateKeyFile' directive (automatically done" echo " when you install via APACI). ${T_MD}KEEP THIS FILE PRIVATE!${T_ME}" echo "" echo "o ${T_MD}$confdir/ssl.crt/server.crt${T_ME}" echo " The PEM-encoded X.509 certificate file which you configure" echo " with the 'SSLCertificateFile' directive (automatically done" echo " when you install via APACI)." echo "" echo "Congratulations that you establish your server with real certificates." echo "" ;; esac ##EOF##