Creat a new certificate for 'example.com' which is valid for 365 days. The key is in server.key and the cert is in server.crt
openssl req -nodes -x509 -newkey rsa:4096 -keyout server.key -out server.crt -days 365 -subj '/CN=example.com'
With AltNames
openssl req -nodes -x509 -newkey rsa:4096 -keyout server.key -out server.crt -days 365 -subj '/CN=example.com' -addext 'subjectAltName = DNS:*.example.com, IP: 10.10.0.1'
openssl req -new -nodes -newkey rsa:4096 -keyout server.key -out server.csr -subj "/CN=example.com" -addext "subjectAltName=DNS:*.example.com,IP:10.10.0.1"
openssl req -new -nodes -newkey rsa:4096 -keyout server.key -out server.csr -subj "/CN=example.com" -reqexts SAN -config <(cat /etc/ssl/openssl.cnf <(printf "[SAN]\nsubjectAltName=DNS:*.example.com,IP:10.10.0.1"))
Export to PKCS12 file, (certificate and key in X509 (pem) format)
openssl pkcs12 -export -in server.crt -inkey server.key -out server.p12
openssl pkcs12 -export -in server.crt -inkey server.key -certfile ca.crt -out server.p12
You can add
-name alias_name
to add an alias for the certificate
Import from PKCS12 to X509 (pem) format
# Extract the key:
openssl pkcs12 -in server.p12 -nocerts -nodes -out server.key
# Extract the client certificate:
openssl pkcs12 -in server.p12 -clcerts -nokeys -out server.crt
# Extract the CA chain (if present):
openssl pkcs12 -in server.p12 -cacerts -nokeys -out ca.crt
-nodes
will remove the password from the key, if you'd like to keep the password remove-nodes
from the command line
openssl rsa -in server-encrypted.key -out server.key
openssl rsa -aes256 -in server.key -out server-encrypted.key
openssl x509 -in server.crt -noout -text
Check modulus
openssl x509 -noout -modulus -in server.crt | openssl md5
openssl rsa -noout -modulus -in server.key | openssl md5
openssl req -noout -modulus -in server.csr | openssl md5
openssl verify -verbose -CAfile ca.crt server.crt
If server.crt has been signed by ca.crt the output would be a simple OK
openssl x509 --fingerprint -sha1 -in cert.pem -noout -text
openssl x509 --fingerprint -sha256 -in cert.pem -noout -text
Checking whether an smtp server support STARTTLS and dump certificate information
openssl s_client -showcerts -connect smtp.server:25 -starttls smtp
Check certificates on host example.com (multiple domains are handled with -servername
for the same IP)
openssl s_client -showcerts -servername example.com -connect example.com:443
curl -D - -vvI https://example.com