|
You are here |
sdn-warrior.org | ||
| | | | |
markentier.tech
|
|
| | | | | Sometimes I need a TLS1 certificate, for some local HTTPS or other services/protocols with some level of security to pla... | markentier.tech | |
| | | | |
memo.mx
|
|
| | | | | A Certificate Authority or CA is an entity that signs digital certificates. These digital certificates are used to validate the connection while using secure mechanisms. Generating a root CA We will use a root CA to create intermediate CA's which are trusted to sign certificates on its behalf. First, prepare the environment. mkdir /root/ca && cd /root/ca mkdir certs crl newcerts private chmod 700 private touch index.txt echo 1000 > serial Then download the template for /root/ca/openssl.... | |
| | | | |
zaries.wordpress.com
|
|
| | | | | There are thousands of articles and entries in stackexchange but none of them worked for me out of the box. So after hours of battling with this issue here is my short recipe. Create the Root Key: openssl genrsa -out rootCA.key 2048 Self-sign this root certificate: openssl req -x509 -new -nodes -key rootCA.key -sha256 -days... | |
| | | | |
www.sudo.ws
|
|
| | | Using sudo_logsrvd to centrally collect sudo session recordings from your network is a huge step forward in security: users cannot delete or modify session recordings locally. However, by default, transmission of recordings is not encrypted, making it open to modifications and eavesdropping. Encrypting the connection between sudo and sudo_logsrvd can eliminate these problems. Larger environments usually either have in-house PKI tooling in place, or colleagues who know all openssl options off the top of their heads. However, small and medium enterprises often lack the infrastructure or knowledge to work with TLS certificates. | ||