====== OpenSSL ======
**General Information**
Openssl is a tool to perform many certificate related tasks such as creating a CSR, verifying certs+keys, and converting formats.
**Checklist**
* Distro(s): Any
----
====== Certificate Encoding ======
* Privacy Enhanced Mail (PEM) - One of the most common certificate encodings. ASCII format.
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
Or
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
* PKCS #7 B (P7B) - Represents a set of certificates. (IE a certificate chain)
* PKCS #12/PFX/P12 - Lets you put a private key and certificate into a single file.
* Distinguished Encoding Rules (DER) - Binary format most commonly used to represent certificates.
----
====== Common Extensions ======
* .crt - Used for certificates, commonly on *nix systems.
* .cer - Used for certificates, commonly on Windows.
* .key - Public/private pkcs keys, encoded as binary DER or ASCII PEM.
----
====== Generate Certificate Signing Requests ======
Generating certificate signing requests to send to a certificate authority.
\\
===== New Private Key and CSR =====
openssl req -new -newkey rsa:2048 -nodes -out MYSITE.csr -keyout MYSITE.key
\\
===== New CSR for an Existing Private Key =====
openssl req -sha256 -new -key MYSITE.key -out MYSITE.csr
\\
===== CSR Based On Existing Certificate =====
openssl x509 -x509toreq -in MYSITE.crt -signkey MYSITE.key -out MYSITE.csr
----
====== Self-Signed Certificates ======
Self-signed certificates are for development/home use. They encrypt traffic just fine, but end users will see a warning message since the cert is not signed by a valid certificate authority.
\\
===== Generate Self-Signed =====
Generate a self-signed cert and private key from scratch
openssl req -newkey rsa:2048 -nodes -keyout MYSITE.key -x509 -days 365 -out MYSITE.crt
\\
===== Generate Self-Signed from Existing Private Key =====
Generate a self-signed cert from an existing private key
openssl req -key MYSITE.key -new -x509 -days 365 -out MYSITE.crt
\\
===== Generate Self-Signed from Existing Private Key and CSR =====
Generate a self-signed cert from an existing private key and existing CSR
openssl x509 -signkey MYSITE.key -in MYSITE.csr -req -days 365 -out MYSITE.crt
----
====== Certificate Conversions ======
Converting certificates from one type to another.
\\
===== Extract Cert, Key, CA from PFX =====
* Extract Keyopenssl pkcs12 -in mycertpack.pfx -nocerts -nodes | sed -ne '/-BEGIN PRIVATE KEY-/,/-END PRIVATE KEY-/p' > mykey.key
* Extract Certificateopenssl pkcs12 -in mycertpack.pfx -clcerts -nokeys | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > mycert.crt
* Extract Certificate Authorityopenssl pkcs12 -in mycertpack.pfx -cacerts -nokeys -chain | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > myCA.crt
\\
===== Convert binary DER to PEM =====
openssl x509 -inform der -in MYSITE.cer -out MYSITE.pem
\\
===== Convert PEM to DER =====
openssl x509 -outform der -in MYSITE.pem -out MYSITE.der
\\
===== Convert PKCS#12(.pfx, .p12) that has a private key and certs to PEM =====
openssl pkcs12 -in MYSITE-KEYSTORE.pfx -out MYSITE.pem -nodes
\\
===== Create crt/key from a PFX file =====
openssl pkcs12 -in mysite.pfx -nocerts -out mysite.key.pem
openssl rsa -in mysite.key.pem -out mysite.key
openssl pkcs12 -in mysite.pfx -clcerts -nokeys -out mysite.crt
\\
===== Create client crt and intermediate chain cert from .p7b(PKCS7) =====
Convert p7b to PEM combined, then convert to bundle of certs
openssl pkcs7 -inform DER -outform PEM -in mysite.p7b -out mysite.p7b.pem
openssl pkcs7 -print_certs -in mysite.p7b.pem -out mysite.p7b.bundle
View the "mysite.p7b.bundle" file:
* The top BEGIN/END block is the client cert
* Copy that single BEGIN/END into a new file for the client cert
* The rest is the certificate chain
* Copy all the rest into a new file for the intermediate chain cert
----
====== Cert+Key Matching ======
Openssl can be used to very that a certificate and key match.
\\
Compare to ensure they match
openssl x509 -noout -text -in mysite.crt
openssl rsa -noout -text -in mysite.key
\\
Similar method, but running output through md5 hash for a shorter comparison
openssl x509 -noout -text -in mysite.crt | openssl md5
openssl rsa -noout -text -in mysite.key | openssl md5
----
====== Displaying Certificate Contents ======
Display Certificate Contents
openssl x509 -in mysite.crt -text
\\
Display CSR Contents
openssl req -in mysite.csr -text
----
====== Verification ======
To verify that an intermediate cert and client certificate pass a chain of authority test:
openssl verify -CAfile mysites_intermediate.crt mysite.crt
\\
Remotely check a site's certificate and fingerprint it
openssl s_client -connect :443 -showcerts | openssl x509 -text -fingerprint
----