OpenSSL

OpenSSL

Tout pour faire du openssl rapidement :)

Commandes rapides pour déchiffrer du SSL

General OpenSSL Commands

  • Generate a new private key and Certificate Signing Request:
    openssl req -out CSR.csr -new -newkey rsa:2048 -nodes -keyout privateKey.key
  • Generate a self-signed certificate (see How to Create and Install an Apache Self Signed Certificate for more info):
    openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout privateKey.key -out certificate.crt
  • Generate a certificate signing request (CSR) for an existing private key:
    openssl req -out CSR.csr -key privateKey.key -new
  • Generate a certificate signing request based on an existing certificate:
    openssl x509 -x509toreq -in certificate.crt -out CSR.csr -signkey privateKey.key
  • Remove a passphrase from a private key:
    openssl rsa -in privateKey.pem -out newPrivateKey.pem

Checking Using OpenSSL

If you need to check the information within a Certificate, CSR or Private Key, use these commands. You can also check CSRs and check certificates using our online tools.

  • Check a Certificate Signing Request (CSR)
    openssl req -text -noout -verify -in CSR.csr
  • Check a private key:
    openssl rsa -check -in privateKey.key
  • Check a certificate:
    openssl x509 -text -noout -in certificate.crt
  • Check a PKCS#12 file (.pfx or .p12):
    openssl pkcs12 -info -in keyStore.p12

Debugging Using OpenSSL

If you are receiving an error that the private doesn't match the certificate or that a certificate that you installed to a site is not trusted, try one of these commands. If you are trying to verify that an SSL certificate is installed correctly, be sure to check out the SSL Checker.

  • Check an MD5 hash of the public key to ensure that it matches with what is in a CSR or private key:
    openssl x509 -noout -modulus -in certificate.crt | openssl md5
    openssl rsa -noout -modulus -in privateKey.key | openssl md5
    openssl req -noout -modulus -in CSR.csr | openssl md5
  • Check an SSL connection. All the certificates (including Intermediates) should be displayed:
    openssl s_client -connect www.paypal.com:443

Converting Using OpenSSL

These commands allow you to convert certificates and keys to different formats to make them compatible with specific types of servers or software. For example, you can convert a normal PEM file that would work with Apache to a PFX (PKCS#12) file and use it with Tomcat or IIS. Use our SSL Converter to convert certificates without messing with OpenSSL.

  • Convert a DER file (.crt .cer .der) to PEM:
    openssl x509 -inform der -in certificate.cer -out certificate.pem
  • Convert a PEM file to DER:
    openssl x509 -outform der -in certificate.pem -out certificate.der
  • Convert a PKCS#12 file (.pfx .p12) containing a private key and certificates to PEM:
    openssl pkcs12 -in keyStore.pfx -out keyStore.pem -nodes
    You can add -nocerts to only output the private key or add -nokeys to only output the certificates.
  • Convert a PEM certificate file and a private key to PKCS#12 (.pfx .p12):
    openssl pkcs12 -export -out certificate.pfx -inkey privateKey.key -in certificate.crt -certfile CACert.crt

Source: https://www.sslshopper.com/article-most-common-openssl-commands.html

Générer un certificat autosigné rapidement

La commande:
CERTNAME=my_server
openssl req -x509 -newkey rsa:4092 -keyout $CERTNAME.key -out $CERTNAME.crt -days 3650 -subj '/CN=my.super.domain.com'

On a ainsi un couple clé privée/publique en une commande. Pour ne pas protéger la clé avec un mot de passe, rajoutez l'option -nodes (comprendre No DES)

Générer un certificat autosigné rapidement avec une CA

Pour générer la CA:
openssl genrsa -aes256 -out ca.key 8192
On autosigne sa clé:
openssl req -new -x509 -extensions v3_ca -key ca.key -out ca.crt -days 3650

Récupérer le certificat SSL d'un serveur et l'installer localement

Voici la proc2dure:
SERVER=<server:port>
echo | openssl s_client -connect $SERVER 2>/dev/null | openssl x509 > /tmp/$SERVER


# Debian 8
mkdir /usr/local/share/ca-certificates/$SERVER
cp /tmp/$SERVER /usr/local/share/ca-certificates/$SERVER
update-ca-certificates

# CentOS7
yum install ca-certificates
update-ca-trust enable
cp /tmp/$SERVER /etc/pki/ca-trust/source/anchors/
update-ca-trust extract

Alternatives:

  • openssl x509 -in <(openssl s_client -connect $SITE:443 -prexit 2>/dev/null)
  • openssl x509 -in <(openssl s_client -connect $SITE:443 -prexit 2>/dev/null) -text

Crypter et decrypter rapidement des fichiers: ssl-vault

J'ai écrit un petit script pour faire du chiffrement symétrique. Les soruces sont là, mais il mériterai quelques améliorations: https://github.com/mrjk/ssl-vault C'est un clone de ansible-vault, il mimique les meme commandes.

Page last modified on April 21, 2017, at 08:35 PM EST