Dmitrii Kostakov

Instruction

Requirments

SSL hot commands

openssl s_client -showcerts -verify 5 -connect pypi.org:443 < /dev/null > ./chain.txt
cat ./client.crt ./ca.crt > ./client.pem
openssl pkcs12 -export -out store.p12 -in ./client.pem -inkey ./client.key
keytool -list -keystore ./store.p12 (-v optional)
openssl pkcs12 -info -in ./store.pfx
keytool -importcert -file ./epa.crt -keystore truststore.jks -alias "epa"
echo -n | openssl s_client -connect pypi.org:443 -servername pypi.org | openssl x509 > ./pypi.org:443.crt
keytool -changealias -alias fpch -destalias localhost -keystore ./keystore.jks
openssl verify -CAfile ./ca.crt -untrusted ./subca.crt ./client.crt
keytool -storepasswd -keystore ./store.p12
keytool -importkeystore -srckeystore keystore.p12 -srcstoretype pkcs12 -destkeystore keystore.jks -deststoretype jks
keytool -list -rfc -keystore ./truststore.jks >> store.pem
keytool -delete -alias "caroot" -keystore ./kafka.keystore.jks
openssl rsautl -encrypt -in ./password.txt -out ./password.txt.enc -pubin -inkey ./key.pem
openssl rsautl -decrypt -in ./password.txt.enc -out ./password2.txt -inkey ./key.pem

Certificate request temolate

[req]
default_bits = 2048
prompt = no
default_md = sha256
req_extensions = req_ext
distinguished_name = dn

[dn]
C = CA
ST = BC
L = VAN
O = Local
OU = Home
CN = my.domain.local

[req_ext]
keyUsage = keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth, clientAuth
subjectAltName = @alt_names

[alt_names]
DNS.1 = my.domain.local
DNS.2 = my2.dmain.local
openssl req -newkey rsa:2048  -nodes -sha256 -keyout key.pem -out req.csr -config ssl_req.conf
openssl req -text -noout -verify -in req.csr