summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--share/man/man8/ssl.810
-rw-r--r--usr.sbin/openssl/openssl.111
2 files changed, 10 insertions, 11 deletions
diff --git a/share/man/man8/ssl.8 b/share/man/man8/ssl.8
index d57dc6390b6..10c5eb390d7 100644
--- a/share/man/man8/ssl.8
+++ b/share/man/man8/ssl.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ssl.8,v 1.46 2010/03/26 19:30:40 jmc Exp $
+.\" $OpenBSD: ssl.8,v 1.47 2011/09/07 09:30:15 jmc Exp $
.\"
.\" Copyright (c) 1999 Theo de Raadt, Bob Beck
.\" All rights reserved.
@@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: March 26 2010 $
+.Dd $Mdocdate: September 7 2011 $
.Dt SSL 8
.Os
.Sh NAME
@@ -94,7 +94,7 @@ directory, with the keys in the
directory.
.Pp
Private keys can be encrypted using
-.Ar 3DES
+.Ar AES
and a passphrase to protect their integrity should the encrypted file
be disclosed.
However, it is important to note that encrypted server keys mean that the
@@ -110,13 +110,13 @@ you will need to generate an
.Ar RSA
certificate.
.Bd -literal -offset indent
-# openssl genrsa -out /etc/ssl/private/server.key 1024
+# openssl genrsa -out /etc/ssl/private/server.key 2048
.Ed
.Pp
Or, if you wish the key to be encrypted with a passphrase that you will
have to type in when starting servers
.Bd -literal -offset indent
-# openssl genrsa -des3 -out /etc/ssl/private/server.key 1024
+# openssl genrsa -aes256 -out /etc/ssl/private/server.key 2048
.Ed
.Pp
The next step is to generate a
diff --git a/usr.sbin/openssl/openssl.1 b/usr.sbin/openssl/openssl.1
index f6014394dee..f88f9ac4097 100644
--- a/usr.sbin/openssl/openssl.1
+++ b/usr.sbin/openssl/openssl.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: openssl.1,v 1.85 2011/01/20 13:32:19 lum Exp $
+.\" $OpenBSD: openssl.1,v 1.86 2011/09/07 09:30:16 jmc Exp $
.\" ====================================================================
.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
.\"
@@ -112,7 +112,7 @@
.\"
.\" OPENSSL
.\"
-.Dd $Mdocdate: January 20 2011 $
+.Dd $Mdocdate: September 7 2011 $
.Dt OPENSSL 1
.Os
.Sh NAME
@@ -6115,17 +6115,17 @@ Examine and verify a certificate request:
.Pp
Create a private key and then generate a certificate request from it:
.Bd -literal -offset indent
-$ openssl genrsa -out key.pem 1024
+$ openssl genrsa -out key.pem 2048
$ openssl req -new -key key.pem -out req.pem
.Ed
.Pp
The same but just using req:
.Pp
-.Dl $ openssl req -newkey rsa:1024 -keyout key.pem -out req.pem
+.Dl $ openssl req -newkey rsa:2048 -keyout key.pem -out req.pem
.Pp
Generate a self-signed root certificate:
.Pp
-.Dl "$ openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem"
+.Dl "$ openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem"
.Pp
Example of a file pointed to by the
.Ar oid_file
@@ -8891,7 +8891,6 @@ $ openssl ts -verify \e
-in design2.tsr -CAfile cacert.pem
.Ed
.Sh TS BUGS
-.Pp
No support for time stamps over SMTP, though it is quite easy
to implement an automatic email-based TSA with
.Xr procmail