Size: 563
Comment:
|
Size: 1347
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 3: | Line 3: |
A library for implementing SSL/TLS encryption. | The '''OpenSSL''' project maintains the acryptographic library `ssl(7)` and a userland tool `openssl(1)`. |
Line 11: | Line 11: |
It is highly recommended to '''not''' use OpenSSL certificates for web encryption. These certificates will be self-signed (as opposed to signed by a trusted certificate authority). | It is highly recommended to '''not''' use `openssl(1)`-generated certificates for web encryption. Clients have no reason to trust a self-signed certificate unless you 1. operate your own certificate authority ('''''strongly'' not recommended''') 2. configure all client machines |
Line 20: | Line 23: |
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/domain-name.com/key.pem -out /etc/ssl/domain-name.com/cert.pem | openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /path/to/domain-name.com/key.pem -out /path/to/domain-name.com/cert.pem |
Line 22: | Line 25: |
---- == Diffie-Hellman Parameters == `openssl(1)` defaults to 1024-bit keys, which lags behind the modern standard of 2048-bits. This is a particular problem for software that defer cryptographic decisions to `openssl(1)` at runtime, such as `nginx(8)`. One of the most common cryptographic decisions that is affected by this situation is the selection of parameters for Diffie-Hellman key exchanges. To generate a stronger configuration, try: {{{ openssl dhparam -out /path/to/dhparam.pem 4096 }}} For details on how to use this configuration, see the following articles for [[NGINX/SSL|NGINX]]. |
OpenSSL
The OpenSSL project maintains the acryptographic library ssl(7) and a userland tool openssl(1).
Certificates
It is highly recommended to not use openssl(1)-generated certificates for web encryption. Clients have no reason to trust a self-signed certificate unless you
operate your own certificate authority (strongly not recommended)
- configure all client machines
Usage
To generate a certificate and private key simultaneously, try:
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /path/to/domain-name.com/key.pem -out /path/to/domain-name.com/cert.pem
Diffie-Hellman Parameters
openssl(1) defaults to 1024-bit keys, which lags behind the modern standard of 2048-bits. This is a particular problem for software that defer cryptographic decisions to openssl(1) at runtime, such as nginx(8). One of the most common cryptographic decisions that is affected by this situation is the selection of parameters for Diffie-Hellman key exchanges.
To generate a stronger configuration, try:
openssl dhparam -out /path/to/dhparam.pem 4096
For details on how to use this configuration, see the following articles for NGINX.