From 2905a2c54b4116ff59b45d59815b5420ba580dd3 Mon Sep 17 00:00:00 2001 From: Bruce Momjian <bruce@momjian.us> Date: Thu, 21 Dec 2000 19:08:05 +0000 Subject: [PATCH] >openssl req -new -text -out cert.req (you will have to enter a password) >mv privkey.pem cert.pem.pw >openssl rsa -in cert.pem.pw -out cert.pem (this removes the password) >openssl req -x509 -in cert.req -text -key cert.pem -out cert.cert then cp cert.pem $PGDATA/server.key cp cert.cert $PGDATA/server.crt Thank you; this works. Oliver Elphick --- doc/src/sgml/runtime.sgml | 43 ++++++++++++++++++++++----------------- 1 file changed, 24 insertions(+), 19 deletions(-) diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml index 8e1e6bda0e6..6cd1a2d14a2 100644 --- a/doc/src/sgml/runtime.sgml +++ b/doc/src/sgml/runtime.sgml @@ -1,5 +1,5 @@ <!-- -$Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.42 2000/12/17 11:22:00 petere Exp $ +$Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.43 2000/12/21 19:08:05 momjian Exp $ --> <Chapter Id="runtime"> @@ -1823,26 +1823,31 @@ set semsys:seminfo_semmsl=32 <para> For details on how to create your server private key and certificate, refer to the <productname>OpenSSL</> documentation. A simple self-signed - certificate can be used to get started testing, but a certificate signed + certificate can be used to get started for testing, but a certificate signed by a CA (either one of the global CAs or a local one) should be used in production so the client can verify the servers identity. To create - a quick self-signed certificate, use the <filename>CA.pl</filename> - script included in OpenSSL: -<programlisting> -CA.pl -newcert -</programlisting> - Fill out the information the script asks for. Make sure to enter - the local host name as Common Name. The script will generate a key - that is passphrase protected. To remove the passphrase (required - if you want automatic start-up of the postmaster), run the command -<programlisting> -openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.pem -</programlisting> - Enter the old passphrase to unlock the existing key. Copy the file - <filename>newreq.pem</> to <filename><replaceable>PGDATA</>/server.crt</> - and <filename>newkey_no_passphrase.pem</> to - <filename><replaceable>PGDATA</>/server.key</>. Remove the PRIVATE KEY part - from the <filename>server.crt</filename> using any text editor. + a quick self-signed certificate, use the following OpenSSL command: + <programlisting> + openssl req -new -text -out cert.req + </programlisting> + Fill out the information that openssl asks for. Make sure that you enter + the local host name as Common Name; the challenge password can be + left blank. The script will generate a key that is passphrase protected; + it will not accept a pass phrase that is less than four characters long. + To remove the passphrase (as you must if you want automatic start-up of + the postmaster), run the commands + <programlisting> + mv privkey.pem cert.pem.pw + openssl rsa -in cert.pem.pw -out cert.pem + </programlisting> + Enter the old passphrase to unlock the existing key. Now do + </programlisting> + openssl req -x509 -in cert.req -text -key cert.pem -out cert.cert + cp cert.pem $PGDATA/server.key + cp cert.cert $PGDATA/server.crt + </programlisting> + to turn the certificate into a self-signed certificate and to copy the + key and certificate to where the postmaster will look for them. </para> </sect1> -- GitLab