Size: 1412
Comment:
|
Size: 1669
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 3: | Line 3: |
'''OpenSSL''' provides the cryptographic libraries '''`crypto(7)`''' (a.k.a. '''libcrypto''') and '''`ssl(7)`''' (a.k.a. '''libssl'''), as well as the utility '''`openssl(1)`'''. | '''OpenSSL''' provides the cryptographic libraries '''`crypto(7ssl)`''' (a.k.a. '''libcrypto''') and '''`ssl(7ssl)`''' (a.k.a. '''libssl'''), as well as the utility '''`openssl(1ssl)`'''. |
Line 8: | Line 8: |
Line 42: | Line 44: |
---- == See also == [[https://man.archlinux.org/man/openssl.1ssl|openssl(1ssl)]] [[https://man.archlinux.org/man/core/openssl/crypto.7ssl.en|crypto(7ssl)]] [[https://man.archlinux.org/man/core/openssl/ssl.7ssl.en|ssl(7ssl)]] |
OpenSSL
OpenSSL provides the cryptographic libraries crypto(7ssl) (a.k.a. libcrypto) and ssl(7ssl) (a.k.a. libssl), as well as the utility openssl(1ssl).
Certificates
It is highly recommended to not use openssl(1)-generated certificates for web encryption. Clients have no reason to trust a self-signed certificate unless you
operate your own certificate authority (strongly not recommended)
- configure all client machines
Usage
To generate a certificate and private key simultaneously, try:
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /path/to/domain-name.com/key.pem -out /path/to/domain-name.com/cert.pem
Diffie-Hellman Parameters
ssl(7) defaults to 1024-bit keys, which lags behind the modern standard of 2048-bits. This is a particular problem for software that defer cryptographic decisions to ssl(7) at runtime, such as nginx(8). One of the most common cryptographic decisions that is affected by this situation is the selection of parameters for Diffie-Hellman key exchanges.
To generate a stronger configuration, try:
openssl dhparam -out /path/to/dhparam.pem 4096
For details on how to use this configuration, see the following articles for NGINX.