Date: Sat, 12 Jul 2003 17:39:13 -0700 (PDT) From: =?ISO-8859-1?Q?Mikko_Ty=F6l=E4j=E4rvi?= <mbsd@pacbell.net> To: admin <admin2@enabled.com> Cc: freebsd-questions@freebsd.org Subject: Re: mod_ssl question: using my own CA? Message-ID: <20030712173646.X32110@atlas.home> In-Reply-To: <20030713001401.M81814@enabled.com> References: <20030713001401.M81814@enabled.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 12 Jul 2003, admin wrote: > OS: FreeBSD 4.8 > apache 1.3.27 > modssl 2.8.14 > > goals: > > generate a server.crt file for apache > generate a server.key file for apache > I will be my own CA > > Hi, > > okay I am trying to find a way to overcome this most elusive and vague > documentationt that I am finding on the modssl.org website. I am completely > confused by the documentation at this point. > > from: > http://www.modssl.org/docs/2.7/ssl_faq.html#ToC29 "So a script named sign.sh is distributed with the mod_ssl distribution" ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > --- snip ---- > 4. Now you can use this CA to sign server CSR's in order to create real SSL > Certificates for use inside an Apache webserver (assuming you already have a > server.csr at hand): > > $ ./sign.sh server.csr > > This signs the server CSR and results in a server.crt file. > > shell# find / -name sign.sh % tar ztf mod_ssl-2.8.14-1.3.27.tar.gz | grep sign.sh mod_ssl-2.8.14-1.3.27/pkg.contrib/sign.sh $.02, /Mikko
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030712173646.X32110>