diff options
author | Todd C. Miller <millert@cvs.openbsd.org> | 2002-10-21 16:29:15 +0000 |
---|---|---|
committer | Todd C. Miller <millert@cvs.openbsd.org> | 2002-10-21 16:29:15 +0000 |
commit | af87f423461805e2fa4fd6c95af73a4417d0172c (patch) | |
tree | b7e37c24df08c2038aaf7e2a2008076a16c631aa | |
parent | 0b7a6f7a73b5ea695f5c0bb4e11019c4111d617b (diff) |
o Add "-days 365" to the examples (default lifetime is 1 month).
o Add an example showing how to make a new cert w/o a new key.
o Mention how to dump a cert in text format.
-rw-r--r-- | share/man/man8/starttls.8 | 34 |
1 files changed, 31 insertions, 3 deletions
diff --git a/share/man/man8/starttls.8 b/share/man/man8/starttls.8 index 3b2853e39b0..20ca2bac8bf 100644 --- a/share/man/man8/starttls.8 +++ b/share/man/man8/starttls.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: starttls.8,v 1.4 2002/10/14 14:48:13 millert Exp $ +.\" $OpenBSD: starttls.8,v 1.5 2002/10/21 16:29:14 millert Exp $ .Dd January 11, 2002 .Dt STARTTLS 8 .Sh NAME @@ -38,9 +38,14 @@ The client then begins the TLS portion of the ESMTP session by issuing the command .Dq STARTTLS . The remaining portion of the ESMTP session occurs over a TLS channel. -.Ss Creating a certificate for sendmail +.Ss Creating a private key and certificate for sendmail This example assumes you are creating your own self-signed certificates for use with sendmail and STARTTLS. +If you have an existing private key and you simply wish to generate +a new certificate (for example, if your old certificate has expired), +see the section entitled +.Sx "Creating a certificate with an existing private key" . +.Pp For the purposes of this example the certificates will be stored in .Pa /etc/mail/certs , though it is possible to use a different directory if needed. @@ -69,10 +74,14 @@ Once you have the parameters generated, you can generate a certificate and unencrypted private key using the command: .Bd -literal -offset indent -width Ds -# openssl req -x509 -nodes -newkey dsa:dsa1024.pem \\ +# openssl req -x509 -nodes -days 365 -newkey dsa:dsa1024.pem \\ -out /etc/mail/certs/mycert.pem -keyout /etc/mail/certs/mykey.pem .Ed .Pp +You may adjust the lifetime of the certificate via the +.Fl days +parameter (one year in this example). +.Pp Make sure to leave the private key files unencrypted, using the .Fl nodes option. @@ -80,6 +89,12 @@ Otherwise, .Xr sendmail 8 will be unable to initiate TLS server functions. .Pp +You can verify that the newly-generated certificate has correct information +with the following command: +.Bd -literal -offset indent -width Ds +# openssl x509 -in /etc/mail/certs/mycert.pem -text +.Ed +.Pp If don't intend to use TLS for authentication (and if you are using self-signed certificates you probably don't) you can simply link your new key to @@ -108,6 +123,19 @@ A simple way to ensure this is to run the following: .Bd -literal -offset indent -width Ds # chmod -R go-rwx /etc/mail/certs .Ed +.Ss Creating a certificate with an existing private key +This example assumes you already have an existing private key, +.Pa /etc/mail/certs/mykey.pem . +You can generate a new certificate based on this key using the command: +.Bd -literal -offset indent -width Ds +# openssl req -x509 -new -days 365 -key /etc/mail/certs/mykey.pem \\ + -out /etc/mail/certs/mycert.pem +# chmod 600 /etc/mail/certs/mycert.pem +.Ed +.Pp +You may adjust the lifetime of the certificate via the +.Fl days +parameter (one year in this example). .Ss Configuring sendmail to utilize TLS The global sendmail configuration files, .Pa /etc/mail/sendmail.cf |