<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Openssl on Janik von Rotz</title>
    <link>https://janikvonrotz.ch/tags/openssl/</link>
    <description>Recent content in Openssl on Janik von Rotz</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 07 Mar 2019 10:23:04 +0100</lastBuildDate>
    <atom:link href="https://janikvonrotz.ch/tags/openssl/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Generate PEM key- and truststores With Puppet</title>
      <link>https://janikvonrotz.ch/2019/03/07/generate-pem-key-and-truststores-with-puppet/</link>
      <pubDate>Thu, 07 Mar 2019 10:23:04 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/03/07/generate-pem-key-and-truststores-with-puppet/</guid>
      <description>&lt;p&gt;This post is a follow-up of &lt;a href=&#34;https://janikvonrotz.ch/2019/01/30/generate-pkcs12-key-and-truststores-with-puppet/&#34;&gt;Generate pkcs12 key- and truststores with Puppet&lt;/a&gt;.&lt;br&gt;&#xA;In this post we are going to create &lt;a href=&#34;https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail&#34;&gt;PEM&lt;/a&gt; key- and truststores with Puppet.&lt;/p&gt;&#xA;&lt;p&gt;PEM files are base64 encoded &lt;a href=&#34;https://en.wikipedia.org/wiki/X.509&#34;&gt;X.509&lt;/a&gt; certificates. Enclosed between &lt;code&gt;-----BEGIN CERTIFICATE-----&lt;/code&gt; and &lt;code&gt;-----END CERTIFICATE-----&lt;/code&gt; multiple PEM files can be concatinated into key- and truststores. And that is exactly what we are going to do using a Puppet manifest.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Generate pkcs12 key- and truststores with Puppet</title>
      <link>https://janikvonrotz.ch/2019/01/30/generate-pkcs12-key-and-truststores-with-puppet/</link>
      <pubDate>Wed, 30 Jan 2019 11:16:52 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/01/30/generate-pkcs12-key-and-truststores-with-puppet/</guid>
      <description>&lt;p&gt;In &lt;a href=&#34;https://janikvonrotz.ch/2019/01/22/create-pkcs12-key-and-truststore-with-keytool-and-openssl/&#34;&gt;my last post&lt;/a&gt; I have showed how to generate pkcs12 key- and truststores using openssl and keytool.&lt;/p&gt;&#xA;&lt;p&gt;For this post we assume that we want to automate the store assembling with Puppet. &lt;a href=&#34;https://puppet.com/&#34;&gt;Puppet&lt;/a&gt; is a configuration management tool that shares many ideas with &lt;a href=&#34;https://www.ansible.com/&#34;&gt;Ansible&lt;/a&gt;. In the world of Puppet you define a &lt;a href=&#34;https://puppet.com/docs/puppet/5.5/lang_summary.html#files&#34;&gt;manifest file&lt;/a&gt; that describes a state of how a file, service or any type of resource should look like. Puppet applies these manifests and makes sure that the targeted system reaches the defined state.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Create pkcs12 key- and truststore with keytool and openssl</title>
      <link>https://janikvonrotz.ch/2019/01/22/create-pkcs12-key-and-truststore-with-keytool-and-openssl/</link>
      <pubDate>Tue, 22 Jan 2019 14:05:15 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/01/22/create-pkcs12-key-and-truststore-with-keytool-and-openssl/</guid>
      <description>&lt;p&gt;In my &lt;a href=&#34;https://janikvonrotz.ch/2019/01/21/create-a-certificate-authority-ca-and-sign-server-certificates-without-prompting-using-openssl/&#34;&gt;last post&lt;/a&gt; I&amp;rsquo;ve showed you how to create a custom certificate authority and sign a server cert using openssl without user interaction.&lt;/p&gt;&#xA;&lt;p&gt;For this post I assume that we want to set up a webservice that requires a &lt;a href=&#34;https://en.wikipedia.org/wiki/PKCS_12&#34;&gt;pkcs12&lt;/a&gt; keystore. Using openssl and the java keytool we are going to create a pkcs12 store and add our ca cert, server cert and server key. Further, we assume that the application also requires a truststore containing the ca cert only.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Create a certificate authority and sign server certificates without prompting using openssl</title>
      <link>https://janikvonrotz.ch/2019/01/21/create-a-certificate-authority-ca-and-sign-server-certificates-without-prompting-using-openssl/</link>
      <pubDate>Mon, 21 Jan 2019 16:20:35 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/01/21/create-a-certificate-authority-ca-and-sign-server-certificates-without-prompting-using-openssl/</guid>
      <description>&lt;p&gt;Most of the times people want to get a certificate for the hostname &lt;em&gt;localhost&lt;/em&gt;, &lt;a href=&#34;https://letsencrypt.org/docs/certificates-for-localhost/&#34;&gt;let&amp;rsquo;s encrypt wrote a nice post&lt;/a&gt; about this, but sometimes people want a certificate for any hostname. And further, signed by a custom CA and if possible should the key material be generated without user interaction. In this post I have covered the less likely case.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Find certificate files that will expire soon and create a csr</title>
      <link>https://janikvonrotz.ch/2018/11/29/find-certificate-files-that-will-expire-soon-and-create-a-csr/</link>
      <pubDate>Thu, 29 Nov 2018 13:44:51 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2018/11/29/find-certificate-files-that-will-expire-soon-and-create-a-csr/</guid>
      <description>&lt;p&gt;The certificate expiration period should be kept as short as possible in a public key infrastructure. But the cost of resigning certificates must not be too high. This trade off causes a lot of problems. Every now and then a certificate expires without anybody noticing it or the same certificate is used for 10 years, which is obviously a security risk. In order to avoid this problem you either use &lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let’s Encrypt&lt;/a&gt; or another fully automated certificate management system. If this is not available you must know at least which certificates are going to expire soon.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open SSL Heartbleed Bug</title>
      <link>https://janikvonrotz.ch/2014/04/09/open-ssl-heartbleed-bug/</link>
      <pubDate>Wed, 09 Apr 2014 15:25:47 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/09/open-ssl-heartbleed-bug/</guid>
      <description>&lt;p&gt;For those who missed it. The OpenSSL project has recently announced a security vulnerability in OpenSSL affecting versions 1.0.1 and 1.0.2 (CVE-2014-0160).&lt;/p&gt;&#xA;&lt;p&gt;Details of the bug are available here: &lt;a href=&#34;http://heartbleed.com/&#34;&gt;The Heartbleed Bug&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;You can check you website here: &lt;a href=&#34;http://filippo.io/Heartbleed/&#34;&gt;Heartbleed test&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Details and update instructions from the websites of your Linux vendor of choice:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://aws.amazon.com/amazon-linux-ami/security-bulletins/ALAS-2014-320/&#34;&gt;Amazon Linux AMI&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://rhn.redhat.com/errata/RHSA-2014-0376.html&#34;&gt;Red Hat&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;http://www.ubuntu.com/usn/usn-2165-1/&#34;&gt;Ubuntu&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;On Ubuntu the update is simply done by executing these commands:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;sudo apt-get update&#xA;sudo apt-get upgrade&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;The following command shows (after an upgrade) all services that need to be restarted.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nginx SSL website</title>
      <link>https://janikvonrotz.ch/2014/04/03/nginx-ssl-website/</link>
      <pubDate>Thu, 03 Apr 2014 07:54:04 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/03/nginx-ssl-website/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9408793&#34;&gt;https://gist.github.com/9408793&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;This best practice shows you the most advanced SSL configurations for your Nginx website.&#xA;For productive usage it&amp;rsquo;s recommended to use only public-signed certificates.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Convert SSL certificates</title>
      <link>https://janikvonrotz.ch/2014/03/27/convert-ssl-certificates/</link>
      <pubDate>Thu, 27 Mar 2014 14:01:50 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/03/27/convert-ssl-certificates/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9413205&#34;&gt;https://gist.github.com/9413205&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;requirements&#34;&gt;Requirements&lt;/h1&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://janikvonrotz.ch/2014/03/26/get-a-free-verified-ssl-certificate-from-startssl/&#34;&gt;Get a free verified SSL certificate from StartSSL (optional)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;instructions&#34;&gt;Instructions&lt;/h1&gt;&#xA;&lt;p&gt;When buying a certificate from you CA (Certification Authority) e.g. a wildcard certificate for *.example.org, you have to convert this file to different formats in order to use them with your webserver installation.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
