C:\etc>md server
C:\etc>move *.pem server
C:\etc\newcert.pem
C:\etc\newkey.pem
C:\etc\newreq.pemC:\etc>move *.crt server
C:\etc\server.crt
C:\etc>CA.pl -newreq
Loading 'screen' into random state - done
Generating a 1024 bit RSA private key
.........++++++
..............++++++
writing new private key to 'newkey.pem'
Enter PEM pass phrase:xxxxx[Enter] ← 中間CA用パスフレーズ入力(画面上何も変化はないが処理されている)
Verifying - Enter PEM pass phrase:xxxxx[Enter] ← 中間CA用パスフレーズ再入力
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:JP[Enter] (国コード)
State or Province Name (full name) Some-State]:Tokyo[Enter] (都道府県 名)
Locality Name (eg, city) []:Edogawa[Enter] (市町村名)
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Private_CA1[Enter] (組織名*)
Organizational Unit Name (eg, section) []:Admin[Enter] (組織内ユ ニット名)
Common Name (eg, YOUR name) []:Private_CA1[Enter] (組織/サーバ名)
Email Address []:oyaji@mail.aconus.com[Enter] (管理者メー ルアドレス)
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:[Enter] ← Enterのみ入力
An optional company name []:[Enter] ← Enterのみ入力
Request is in newreq.pem, private key is in newkey.pem
*: 組織名(ON)はルートCAとは異なる名前にすること。
C:\etc>CA.pl -signCA
Using configuration from C:\OpenSSL\bin\openssl.cnf
Loading 'screen' into random state - done
Enter pass phrase for ./demoCA/private/cakey.pem:xxxxx[Enter] ← ルートCA用パスフレーズ入力
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number:
f1:d4:c6:f4:2a:9b:48:2e
Validity
Not Before: Mar 19 13:24:51 2008 GMT
Not After : Mar 19 13:24:51 2010 GMT
Subject:
countryName = JP
stateOrProvinceName = Tokyo
localityName = Edogawa
organizationName = Private_CA1
organizationalUnitName = Admin
commonName = Private_CA1
emailAddress = oyaji@mail.aconus.com
X509v3 extensions:
X509v3 Subject Key Identifier:
06:A1:06:3F:6E:69:20:2F:05:08:30:80:38:F8:1A:0A:8F:EA:A4:C6
X509v3 Authority Key Identifier:
keyid:66:7B:3B:19:89:E0:C1:04:99:C9:98:79:E5:60:C7:0B:D1:D8:E5:BB
DirName:/C=JP/ST=Tokyo/O=Private_CA1/OU=Admin/CN=Private_CA1/emailAddress=oyaji@mail.aconus.com
serial:F1:D4:C6:F4:2A:9B:48:2A
X509v3 Basic Constraints:
CA:TRUE
Netscape Cert Type:
SSL CA, S/MIME CA
Certificate is to be certified until Mar 19 13:24:51 2010 GMT (730 days)
Sign the certificate? [y/n]:y[Enter]
1 out of 1 certificate requests certified, commit? [y/n]y[Enter]
Write out database with 1 new entries
Data Base Updated
Signed CA certificate is in newcert.pem
C:\etc>openssl x509 -inform pem -in newcert.pem -outform der -out ca1.der
Apacheで中間CAを使ってSSL化する場合は、後で作成するサーバキー、サーバ証明書とともに、ここで作成した中間証明書
(newcert.pem)を SSLCertificateChainFile ディレクティブで指定してください。
C:\etc>md
..\etc1 |
C:\etc>cd
..\etc1 |