Skip to main content

Creating Self-signed and CA Certificate using OpenSSL

A self-signed certificate is very useful for us when we are in a development or closed environment and require a secure communication channel between nodes in our system like implementing HTTPS for client-server communication. To make our self-signed certificate to be recognized by all nodes in the system, we should generate the CA certificate and distribute it to all nodes. This CA certificate is used to verify and determine the issuer of the self-signed certificate. It is like a stamp on a certificate that ensures the certificate is issued by the authority informed in the certificate itself. OpenSSL CLI tool will be used for this purpose. The following steps can be run to generate valid self-signed and CA certificates.

  1. Generate a private CA key
  2. Generate a public CA certificate
  3. Generate a private key for the target server
  4. Generate a CSR for the server
  5. Generate a public server certificate and sign it with the CA certificate

Before we start the certificate generation, we should create a directory and run all commands inside the directory to store all results in it. We may only generate CA-related certificates once so that we can store the CA certificates directly in the root of the directory. But, we may have multiple servers and require multiple server-related certificates. So, we can put the server certificates in a sub-directory for each server. The structure is illustrated in the content below.

certs/
  ca.key
  ca.crt
  server1/
    server.key
    server.csr
    server.crt
  server2/
    server.key
    server.csr
    server.crt

Generate a private key for the CA

We can run the following command. By setting it to use DES3, we should set a password for the private key.

openssl genrsa -des3 -out ca.key 2048

Generate a public certificate for the CA

We can generate the public certificate with the following command. When we run the following command, some required data will be prompted on the terminal. Note that the FQDN should be a domain name aligned with how the target server will be accessed. The IP address of the server is also allowed for the FQDN.

openssl req -x509 -new -nodes –key ca.key –sha256 -days 365 –out ca.crt

The following capture is an example of the required data we need to fill in.


Generate a private key for the target server

We can generate the key with the following command. We don't set any encryption for flexibility while it is implemented in a web server engine or other applications.

openssl genrsa -out server1/server.key 2048

Generate the server CSR

The following command will start the CSR generation and prompt several required data to be filled. But, this time, the data is about the target server, not the CA. We can leave blank the requested challenge password.

openssl req -new -key server1/server.key -out server1/server.csr

Generate a public certificate and sign it with the CA certificate

After we have the server CSR, we can generate the public certificate and sign it with CA certificates. We can run the following command and fill in the password of the CA key when it is prompted.

openssl x509 -req -in server1/server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server1/server.crt -days 365 -sha256

If we apply the certificates on a web server that serves a web application, we can see the certificate information from the browser tool.

Comments

Popular posts from this blog

Increase of Malicious Activities and Implementation of reCaptcha

In recent time, I've seen the increase of malicious activities such as login attempts or phishing emails to some accounts I manage. Let me list some of them and the actions taken. SSH Access Attempts This happened on a server that host a Gitlab server. Because of this case, I started to limit the incoming traffic to the server using internal and cloud firewall provided by the cloud provider. I limit the exposed ports, connected network interfaces, and allowed protocols. Phishing Attempts This typically happened through email and messaging platform such as Whatsapp and Facebook Page messaging. The malicious actors tried to share a suspicious link lured as invoice, support ticket, or something else. Malicious links shared Spammy Bot The actors leverage one of public endpoint on my website to send emails. Actually, the emails won't be forwarded anywhere except to my own email so this just full my inbox. This bot is quite active, but I'm still not sure what...

Configuring Swap Memory on Ubuntu Using Ansible

If we maintain a Linux machine with a low memory capacity while we are required to run an application with high memory consumption, enabling swap memory is an option. Ansible can be utilized as a helper tool to automate the creation of swap memory. A swap file can be allocated in the available storage of the machine. The swap file then can be assigned as a swap memory. Firstly, we should prepare the inventory file. The following snippet is an example, you must provide your own configuration. [server] 192.168.1.2 [server:vars] ansible_user=root ansible_ssh_private_key_file=~/.ssh/id_rsa Secondly, we need to prepare the task file that contains not only the tasks but also some variables and connection information. For instance, we set /swapfile  as the name of our swap file. We also set the swap memory size to 2GB and the swappiness level to 60. - hosts: server become: true vars: swap_vars: size: 2G swappiness: 60 For simplicity, we only check the...

Deliver SaaS According Twelve-Factor App

If you haven't heard of  the twelve-factor app , it gives us a recommendation or a methodology for developing SaaS or web apps structured into twelve items. The recommendation has some connections with microservice architecture and cloud-native environments which become more popular today. We can learn the details on its website . In this post, we will do a quick review of the twelve points. One Codebase Multiple Deployment We should maintain only one codebase for our application even though the application may be deployed into multiple environments like development, staging, and production. Having multiple codebases will lead to any kinds of complicated issues. Explicitly State Dependencies All the dependencies for running our application should be stated in the project itself. Many programming languages have a kind of file that maintains a list of the dependencies like package.json in Node.js. We should also be aware of the dependencies related to the pla...

Kenshin VS The Assassin

It is an assassin versus assassin.

Free Cloud Services from UpCloud

Although I typically deploy my development environment or experimental services on UpCloud , I do not always stay updated on its announcements. Recently, I discovered that UpCloud has introduced a new plan called the Essentials plan, which enables certain cloud services to be deployed at no cost. The complimentary services are generally associated with network components or serve as the foundation for other cloud services. This feature is particularly useful when retaining foundational services, such as a load balancer, is necessary, while tearing down all services and reconfiguring the DNS and other application settings each time we temporarily clean up infrastructure to reduce costs is undesirable.  When reviewing the service specifications of the cloud services in the Essentials plan, they appear to be very similar to those in the Development plan. The difference in service levels is unclear, but it could be related to hardware or resource allocation. For instance, the loa...

What's Good About Strapi, a Headless CMS

Recently, I've been revisiting Strapi as a solution for building backend systems. I still think this headless CMS can be quite useful in certain cases, especially for faster prototyping or creating common websites like company profiles or e-commerce platforms. It might even have the potential to handle more complex systems. With the release of version 5, I'm curious to know what updates it brings. Strapi has launched a new documentation page, and it already feels like an improvement in navigation and content structure compared to the previous version. That said, there's still room for improvement, particularly when it comes to use cases and best practices for working with Strapi. In my opinion, Strapi stands out with some compelling features that could catch developers' attention. I believe three key aspects of Strapi offer notable advantages. First, the content-type builder feature lets us design the data structure of an entity or database model, including field ...