Skip to content

Latest commit

 

History

History
124 lines (110 loc) · 4.11 KB

SSL.md

File metadata and controls

124 lines (110 loc) · 4.11 KB

self-signed localhost

chrome

image

firefox

image

edge

image

create

$env:RANDFILE=".rnd"
openssl genrsa -des3 -out rootCA.key 2048
openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 1095 -out rootCA.pem -config cert.conf -reqexts v3_req -extensions v3_ca
openssl req -new -sha256 -nodes -newkey rsa:2048 -out localhost.csr -keyout localhost.key -config cert.conf
openssl x509 -req -in localhost.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out localhost.crt -days 1095 -sha256 -extfile cert.conf -extensions v3_req

cert.conf

[req]
default_bits = 2048
prompt = no
default_md = sha256
x509_extensions = v3_req
distinguished_name = dn

[v3_ca]
basicConstraints = critical,CA:TRUE
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer:always

[v3_req]
subjectAltName = @alt_names
basicConstraints = CA:FALSE
keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth
authorityKeyIdentifier = keyid,issuer

[dn]
CN = localhost

[alt_names]
DNS.1 = localhost

verify

openssl req -text -noout -verify -in localhost.csr
openssl rsa -in localhost.key -check
openssl x509 -in localhost.crt -text -noout
openssl pkcs12 -info -in localhost.pfx

export

openssl pkcs12 -export -in localhost.crt -inkey localhost.key -out localhost.p12
openssl pkcs12 -inkey localhost.key -in localhost.crt -export -out localhost.pfx

import

import rootCA.pem to "Manage User Certificates/Trusted Root Certification Authorities"

edge

edge://flags/#edge-automatic-https
edge://flags/#allow-insecure-localhost
edge://net-internals/#hsts

chrome

chrome://flags/#allow-insecure-localhost
chrome://net-internals/#hsts
domain localhost delete
clean cache
HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\HSTSPolicyBypassList
100 SZ localhost

firefox

import rootCA.pem to "Options/Privacy & Security/View Certificates/Authorities"

use

localhost.crt (Certificates)
localhost.key (Private Key)

export to pfx

openssl pkcs12 -in localhost.pfx -out localhost.txt -nodes
copy -----BEGIN CERTIFICATE----- to -----END CERTIFICATE----- to localhost.crt
copy -----BEGIN PRIVATE KEY----- to -----END PRIVATE KEY----- to localhost.key

keys

ssh-keygen -t rsa -b 2048 -C "denernun@gmail.com"

Generating public/private rsa key pair.
Enter file in which to save the key (~/.ssh/id_rsa):

Private Key: ~/.ssh/id_rsa.
Public key: ~/.ssh/id_rsa.pub.

cat ~/.ssh/id_rsa.pub
ssh-rsa AAAAB3N...AAAAB3N ubuntu authorized_keys

puttygen to generate .ppk

netcore

dotnet dev-certs https --help
dotnet dev-certs https --trust
donwload

https://sourceforge.net/projects/openssl/
https://opendec.wordpress.com/
https://indy.fulgan.com/SSL/

links

https://gist.github.com/princeppy/d00bad66d9caac86d9b7d3ce9e35fc12
https://github.com/jsha/minica
https://www.hanselman.com/blog/DevelopingLocallyWithASPNETCoreUnderHTTPSSSLAndSelfSignedCerts.aspx
https://www.freecodecamp.org/news/how-to-get-https-working-on-your-local-development-environment-in-5-minutes-7af615770eec
https://blogs.msdn.microsoft.com/robert_mcmurray/2013/11/15/how-to-trust-the-iis-express-self-signed-certificate