共计 9541 个字符,预计需要花费 24 分钟才能阅读完成。
这些是关于使用 OpenSSL 生成证书授权(CA)、中间证书授权和末端证书的速记随笔,内容包括 OCSP、CRL 和 CA 颁发者信息,以及指定颁发和有效期限等。
我们将建立我们自己的根 CA,我们将使用根 CA 来生成一个中间 CA 的例子,我们将使用中间 CA 来签署末端用户证书。

根 CA
创建根 CA 授权目录并切换到该目录:
mkdir ~/SSLCA/root/cd ~/SSLCA/root/
为我们的根 CA 生成一个 8192 位长的 SHA-256 RSA 密钥:
openssl genrsa -aes256 -out rootca.key 8192
样例输出:
Generating RSA private key,8192 bit long modulus.........++....................................................................................................................++e is65537(0x10001)
如果你想要用密码保护该密钥,请添加 -aes256 选项。
创建自签名根 CA 证书 ca.crt;你需要为你的根 CA 提供一个身份:
openssl req -sha256 -new-x509 -days 1826-key rootca.key -out rootca.crt
样例输出:
You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a DistinguishedNameor a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----CountryName(2 letter code)[AU]:NLStateorProvinceName(full name)[Some-State]:ZuidHollandLocalityName(eg, city)[]:RotterdamOrganizationName(eg, company)[InternetWidgitsPtyLtd]:SparklingNetworkOrganizationalUnitName(eg, section)[]:Sparkling CACommonName(e.g. server FQDN or YOUR name)[]:SparklingRoot CAEmailAddress[]:
创建一个存储 CA 序列的文件:
touch certindexecho 1000> certserialecho 1000> crlnumber
放置 CA 配置文件,该文件持有 CRL 和 OCSP 末端的存根。
# vim ca.conf[ ca ]default_ca = myca[ crl_ext ]issuerAltName=issuer:copyauthorityKeyIdentifier=keyid:always[ myca ]dir =./new_certs_dir = $dirunique_subject =nocertificate = $dir/rootca.crtdatabase = $dir/certindexprivate_key = $dir/rootca.keyserial = $dir/certserialdefault_days =730default_md = sha1policy = myca_policyx509_extensions = myca_extensionscrlnumber = $dir/crlnumberdefault_crl_days =730[ myca_policy ]commonName = suppliedstateOrProvinceName = suppliedcountryName = optionalemailAddress = optionalorganizationName = suppliedorganizationalUnitName = optional[ myca_extensions ]basicConstraints = critical,CA:TRUEkeyUsage = critical,anysubjectKeyIdentifier = hashauthorityKeyIdentifier = keyid:always,issuerkeyUsage = digitalSignature,keyEncipherment,cRLSign,keyCertSignextendedKeyUsage = serverAuthcrlDistributionPoints =@crl_sectionsubjectAltName =@alt_namesauthorityInfoAccess =@ocsp_section[ v3_ca ]basicConstraints = critical,CA:TRUE,pathlen:0keyUsage = critical,anysubjectKeyIdentifier = hashauthorityKeyIdentifier = keyid:always,issuerkeyUsage = digitalSignature,keyEncipherment,cRLSign,keyCertSignextendedKeyUsage = serverAuthcrlDistributionPoints =@crl_sectionsubjectAltName =@alt_namesauthorityInfoAccess =@ocsp_section[alt_names]DNS.0=SparklingIntermidiate CA 1DNS.1=Sparkling CA Intermidiate1[crl_section]URI.0= http://pki.sparklingca.com/SparklingRoot.crlURI.1= http://pki.backup.com/SparklingRoot.crl[ocsp_section]caIssuers;URI.0= http://pki.sparklingca.com/SparklingRoot.crtcaIssuers;URI.1= http://pki.backup.com/SparklingRoot.crtOCSP;URI.0= http://pki.sparklingca.com/ocsp/OCSP;URI.1= http://pki.backup.com/ocsp/
如果你需要设置某个特定的证书生效 / 过期日期,请添加以下内容到[myca]:
# format: YYYYMMDDHHMMSSdefault_enddate =20191222035911default_startdate =20181222035911
创建中间 CA
生成中间 CA(名为 intermediate1)的私钥:
openssl genrsa -out intermediate1.key 4096
生成中间 CA 的 CSR:
openssl req -new-sha256 -key intermediate1.key -out intermediate1.csr
样例输出:
You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a DistinguishedNameor a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----CountryName(2 letter code)[AU]:NLStateorProvinceName(full name)[Some-State]:ZuidHollandLocalityName(eg, city)[]:RotterdamOrganizationName(eg, company)[InternetWidgitsPtyLtd]:SparklingNetworkOrganizationalUnitName(eg, section)[]:Sparkling CACommonName(e.g. server FQDN or YOUR name)[]:SparklingIntermediate CAEmailAddress[]:Please enter the following 'extra' attributesto be sent with your certificate requestA challenge password []:An optional company name []:
确保中间 CA 的主体(CN)和根 CA 不同。
用根 CA 签署中间 CA 的 CSR:
openssl ca -batch -config ca.conf -notext -in intermediate1.csr -out intermediate1.crt
样例输出:
Using configuration from ca.confCheck that the request matches the signatureSignature okTheSubject's Distinguished Name is as followscountryName :PRINTABLE:'NL'stateOrProvinceName :ASN.1 12:'ZuidHolland'localityName :ASN.1 12:'Rotterdam'organizationName :ASN.1 12:'SparklingNetwork'organizationalUnitName:ASN.1 12:'Sparkling CA'commonName :ASN.1 12:'SparklingIntermediate CA'Certificate is to be certified until Mar 30 15:07:43 2017 GMT (730 days)Write out database with 1 new entriesData Base Updated
生成 CRL(同时采用 PEM 和 DER 格式):
openssl ca -config ca.conf -gencrl -keyfile rootca.key -cert rootca.crt -out rootca.crl.pemopenssl crl -inform PEM -in rootca.crl.pem -outform DER -out rootca.crl
每次使用该 CA 签署证书后,请生成 CRL。
如果你需要撤销该中间证书:
openssl ca -config ca.conf -revoke intermediate1.crt -keyfile rootca.key -cert rootca.crt
配置中间 CA
为该中间 CA 创建一个新文件夹,然后进入该文件夹:
mkdir ~/SSLCA/intermediate1/cd ~/SSLCA/intermediate1/
从根 CA 拷贝中间证书和密钥:
cp ~/SSLCA/root/intermediate1.key ./cp ~/SSLCA/root/intermediate1.crt ./
创建索引文件:
touch certindexecho 1000> certserialecho 1000> crlnumber
创建一个新的 ca.conf 文件:
# vim ca.conf[ ca ]default_ca = myca[ crl_ext ]issuerAltName=issuer:copyauthorityKeyIdentifier=keyid:always[ myca ]dir =./new_certs_dir = $dirunique_subject =nocertificate = $dir/intermediate1.crtdatabase = $dir/certindexprivate_key = $dir/intermediate1.keyserial = $dir/certserialdefault_days =365default_md = sha1policy = myca_policyx509_extensions = myca_extensionscrlnumber = $dir/crlnumberdefault_crl_days =365[ myca_policy ]commonName = suppliedstateOrProvinceName = suppliedcountryName = optionalemailAddress = optionalorganizationName = suppliedorganizationalUnitName = optional[ myca_extensions ]basicConstraints = critical,CA:FALSEkeyUsage = critical,anysubjectKeyIdentifier = hashauthorityKeyIdentifier = keyid:always,issuerkeyUsage = digitalSignature,keyEnciphermentextendedKeyUsage = serverAuthcrlDistributionPoints =@crl_sectionsubjectAltName =@alt_namesauthorityInfoAccess =@ocsp_section[alt_names]DNS.0= example.comDNS.1= example.org[crl_section]URI.0= http://pki.sparklingca.com/SparklingIntermidiate1.crlURI.1= http://pki.backup.com/SparklingIntermidiate1.crl[ocsp_section]caIssuers;URI.0= http://pki.sparklingca.com/SparklingIntermediate1.crtcaIssuers;URI.1= http://pki.backup.com/SparklingIntermediate1.crtOCSP;URI.0= http://pki.sparklingca.com/ocsp/OCSP;URI.1= http://pki.backup.com/ocsp/
修改 [alt_names] 部分,添加你需要的主体备选名。如果你不需要主体备选名,请移除该部分包括 subjectAltName = @alt_names 的行。
如果你需要设置一个指定的生效 / 到期日期,请添加以下内容到 [myca]:
# format: YYYYMMDDHHMMSSdefault_enddate =20191222035911default_startdate =20181222035911
生成一个空白 CRL(同时以 PEM 和 DER 格式):
openssl ca -config ca.conf -gencrl -keyfile rootca.key -cert rootca.crt -out rootca.crl.pemopenssl crl -inform PEM -in rootca.crl.pem -outform DER -out rootca.crl
生成末端用户证书
我们使用这个新的中间 CA 来生成一个末端用户证书,请重复以下操作来使用该 CA 为每个用户签署。
mkdir enduser-certs
生成末端用户的私钥:
openssl genrsa -out enduser-certs/enduser-example.com.key 4096
生成末端用户的 CSR:
openssl req -new-sha256 -key enduser-certs/enduser-example.com.key -out enduser-certs/enduser-example.com.csr
样例输出:
You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a DistinguishedNameor a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----CountryName(2 letter code)[AU]:NLStateorProvinceName(full name)[Some-State]:NoordHollandLocalityName(eg, city)[]:AmsterdamOrganizationName(eg, company)[InternetWidgitsPtyLtd]:ExampleIncOrganizationalUnitName(eg, section)[]:IT DeptCommonName(e.g. server FQDN or YOUR name)[]:example.comEmailAddress[]:Please enter the following 'extra' attributesto be sent with your certificate requestA challenge password []:An optional company name []:
使用中间 CA 签署末端用户的 CSR:
openssl ca -batch -config ca.conf -notext -in enduser-certs/enduser-example.com.csr -out enduser-certs/enduser-example.com.crt
样例输出:
Using configuration from ca.confCheck that the request matches the signatureSignature okTheSubject's Distinguished Name is as followscountryName :PRINTABLE:'NL'stateOrProvinceName :ASN.1 12:'NoordHolland'localityName :ASN.1 12:'Amsterdam'organizationName :ASN.1 12:'ExampleInc'organizationalUnitName:ASN.1 12:'IT Dept'commonName :ASN.1 12:'example.com'Certificate is to be certified until Mar 30 15:18:26 2016 GMT (365 days)Write out database with 1 new entriesData Base Updated
生成 CRL(同时以 PEM 和 DER 格式):
openssl ca -config ca.conf -gencrl -keyfile intermediate1.key -cert intermediate1.crt -out intermediate1.crl.pemopenssl crl -inform PEM -in intermediate1.crl.pem -outform DER -out intermediate1.crl
每次你使用该 CA 签署证书后,都需要生成 CRL。
如果你需要撤销该末端用户证书:
openssl ca -config ca.conf -revoke enduser-certs/enduser-example.com.crt -keyfile intermediate1.key -cert intermediate1.crt
样例输出:
Using configuration from ca.confRevokingCertificate1000.DataBaseUpdated
通过连接根证书和中间证书来创建证书链文件。
cat ../root/rootca.crt intermediate1.crt > enduser-certs/enduser-example.com.chain
发送以下文件给末端用户:
enduser-example.com.crtenduser-example.com.keyenduser-example.com.chain
你也可以让末端用户提供他们自己的 CSR,而只发送给他们这个 .crt 文件。不要把它从服务器删除,否则你就不能撤销了。
校验证书
你可以对证书链使用以下命令来验证末端用户证书:
openssl verify -CAfile enduser-certs/enduser-example.com.chain enduser-certs/enduser-example.com.crtenduser-certs/enduser-example.com.crt: OK
你也可以针对 CRL 来验证。首先,将 PEM 格式的 CRL 和证书链相连接:
cat ../root/rootca.crt intermediate1.crt intermediate1.crl.pem > enduser-certs/enduser-example.com.crl.chain
验证证书:
openssl verify -crl_check -CAfile enduser-certs/enduser-example.com.crl.chain enduser-certs/enduser-example.com.crt
没有撤销时的输出:
enduser-certs/enduser-example.com.crt: OK
撤销后的输出如下:
enduser-certs/enduser-example.com.crt: CN = example.com, ST =NoordHolland, C = NL, O =ExampleInc, OU = IT Depterror 23 at 0 depth lookup:certificate revoked
通过 OpenSSL 提供 FTP+SSL/TLS 认证功能,并实现安全数据传输 http://www.linuxidc.com/Linux/2013-05/84986.htm
利用 OpenSSL 签署多域名证书 http://www.linuxidc.com/Linux/2014-10/108222.htm
Linux 下使用 OpenSSL 生成证书 http://www.linuxidc.com/Linux/2015-05/117034.htm
OpenSSL 的详细介绍:请点这里
OpenSSL 的下载地址:请点这里
本文永久更新链接地址:http://www.linuxidc.com/Linux/2015-05/117479.htm






