<?xml version="1.0" encoding="utf-8" ?>
<feed xmlns="http://www.w3.org/2005/Atom">
<title>Fun with ones and zeros - openssl</title>
<subtitle>Barry&#039;s notes on computer software and hardware</subtitle>
<link href="/blog/tags/openssl"></link>
<updated>2026-05-21T03:39:29-07:00</updated>
<id>urn:uuid:d7702658-922f-dfe8-d6e6-f63ecd226979</id>
<entry>
<title>HTTPS Now</title>
<link href="/blog/entries/https-now"></link>
<id>urn:uuid:2b596b7e-9588-27c1-a7da-5fa4fcf8e960</id>
<updated>2015-05-04T08:40:39-07:00</updated>
<author><name>Barry Pederson</name>
<email>bp@barryp.org</email>
</author>
<content type="html">&lt;p&gt;Put in a actual, recognized SSL Certificate on the site, and setup redirects to run everything through that now.&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;Figured that was a reasonable thing to do because people are still occasionally downloading old software from this site, and the cert was free for the year (Gandi).&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;Hopefully by the time it expires the &lt;a href=&quot;https://letsencrypt.org/&quot;&gt;Let&#039;s Encrypt&lt;/a&gt; service will be up and running.&lt;/p&gt;</content>
</entry>
<entry>
<title>Self-Signed SSL Certificates</title>
<link href="/blog/entries/ssl_cert"></link>
<id>urn:uuid:43d57ffd-91e3-e119-38de-b3879d29eb5d</id>
<updated>2006-02-15T15:07:45-08:00</updated>
<author><name>Barry Pederson</name>
<email>bp@barryp.org</email>
</author>
<content type="html">
&lt;p&gt;Quite often I find myself needing to generate self-signed certificates
   for use with &lt;a href=&quot;http://www.openssl.org&quot;&gt;OpenSSL&lt;/a&gt;.  There are 
   only three steps required...
&lt;/p&gt;
&lt;p&gt;Generate a key file, named &lt;code&gt;ssl.key&lt;/code&gt; for example:
&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;openssl genrsa -out ssl.key 1024
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Generate a Certificate Signing Request for the key, named &lt;code&gt;ssl.csr&lt;/code&gt; in this 
   example.  You&#039;ll be asked a bunch of questions, when asked for 
   &lt;code&gt;Common Name (eg, YOUR name)&lt;/code&gt; be sure to enter the domain-name you&#039;re 
   making the certificate for (such as &lt;code&gt;www.foobar.edu&lt;/code&gt;).
&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;openssl req -new -key ssl.key -out ssl.csr
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Generate a signed certificate given the request and key, valid for 10 years
   (3650 days) and named &lt;code&gt;ssl.crt&lt;/code&gt; in this example.  When you&#039;re done, 
   the &lt;code&gt;ssl.key&lt;/code&gt; and &lt;code&gt;ssl.crt&lt;/code&gt;
   files are what you usually need to install in your server.  &lt;br /&gt;
&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;openssl x509 -req -days 3650 -in ssl.csr -signkey ssl.key -out ssl.crt
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;As a bonus, here&#039;s how to view the contents of a certificate 
   file named &lt;code&gt;ssl.crt&lt;/code&gt;
&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;openssl x509 -in ssl.crt -text
&lt;/code&gt;&lt;/pre&gt;

</content>
</entry>
</feed>