openssl req -new -x509 -nodes -days 1530 -out server.crt -keyout server.key
Using the above, you instantly create a self-signed certificate valid for 1530 days and you can simply skip to step #5.) below.
If You Need a Real SSL Certificate (eg. Equifax/Openssl) then you need to create a CSR request (you'll need to follow Steps 1.) and 2.) in order to create the CSR. You then upload the CSR Certificate to your SSL Provider and they will e-mail you the .crt (SSL Certificate). Remember to keep your key from Step 1, you need the .key and .crt (from your SSL) provider to make use of your certificate.
openssl genrsa -out ssl-private.key 2048
(note above I didn't include the -des3 switch as that makes you choose a passphrase for your key which we don't want).
*Be sure not to lose this key file, especially if you are using the CSR request in Step 2.) to apply for a real SSL certificate
Generating RSA private key, 2048 bit long modulus
.............................................+++
..................................................................................+++
e is 65537 (0x10001)
Enter pass phrase for ssl-private.key:
Verifying - Enter pass phrase for ssl-private.key:
openssl req -new -key ssl-private.key -out ssl-request.csr
Enter pass phrase for ssl-private.key:
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [GB]:
State or Province Name (full name) [Berkshire]:
Locality Name (eg, city) [Newbury]:
Organization Name (eg, company) [My Company Ltd]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []:
Email Address []:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
mv ssl-private.key ssl-private.key-pass
openssl rsa -in ssl-private.key-pass -out ssl-private.key
Enter pass phrase for ssl-private.key-pass:
writing RSA key
openssl x509 -req -days 730 -in ssl-request.csr -signkey ssl-private.key -out ssl-certificate.crt
unable to load certificate
20243:error:0906D06C:PEM routines:PEM_read_bio:no start line:pem_lib.c:632:Expecting: TRUSTED CERTIFICATE
*(don't forget the -req or you'll get the above error)
cp ssl-private.key ssl.key/server.key
cp ssl-certificate.crt ssl.crt/server.crt
Here is what you should be inside the vhost (obviously be sure that you have the correct path and filenames):
SSLEngine on
SSLVerifyClient none
SSLCertificateFile /etc/httpd/ssl-certs/server.crt
SSLCertificateKeyFile /etc/httpdssl-certs/server.key
*Remember to restart Apache or the new certificate won't be applied/take effect until you do.
enable, ssl, certificates, apache, linux, unix, eg, redhat, centos, debianshortcut, easiest, openssl, req, nodes, server, crt, keyout, instantly, certificate, valid, equifax, csr, ll, upload, provider, genrsa, didn, des, passphrase, generating, rsa, modulus, phrase, verifying, incorporated, distinguished, dn, fields, default, gb, province, berkshire, locality, newbury, ltd, organizational, hostname, email, attributes, password, optional, mv, signkey, unable, pem, routines, pem_read_bio, pem_lib, etc, httpd, conf, edit, vhost, cp, filenames, sslengine, sslverifyclient, sslcertificatefile, certs, sslcertificatekeyfile, httpdssl, restart, applied,