Skip to content

Commit 9f22f38

Browse files
authored
Update https.cnf - Clarify extfile directions
Directions around `extfile.cnf` for client certificates was somewhat confusing. Edited the document to clarify that a separate file was to be created, not append a line to the file that had just been created for the server.
1 parent 3154a93 commit 9f22f38

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

engine/security/https.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -113,24 +113,24 @@ request:
113113

114114
$ openssl req -subj '/CN=client' -new -key key.pem -out client.csr
115115

116-
To make the key suitable for client authentication, create an extensions
116+
To make the key suitable for client authentication, create a new extensions
117117
config file:
118118

119-
$ echo extendedKeyUsage = clientAuth >> extfile.cnf
119+
$ echo extendedKeyUsage = clientAuth > extfile-client.cnf
120120

121121
Now, generate the signed certificate:
122122

123123
$ openssl x509 -req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem \
124-
-CAcreateserial -out cert.pem -extfile extfile.cnf
124+
-CAcreateserial -out cert.pem -extfile extfile-client.cnf
125125
Signature ok
126126
subject=/CN=client
127127
Getting CA Private Key
128128
Enter pass phrase for ca-key.pem:
129129

130130
After generating `cert.pem` and `server-cert.pem` you can safely remove the
131-
two certificate signing requests:
131+
two certificate signing requests and extensions config files:
132132

133-
$ rm -v client.csr server.csr
133+
$ rm -v client.csr server.csr extfile.cnf extfile-client.cnf
134134

135135
With a default `umask` of 022, your secret keys are *world-readable* and
136136
writable for you and your group.

0 commit comments

Comments
 (0)