SSL/TLS Certificates¶
X.509 is an ITU standard defining the format of public key certificates. X.509 are used in TLS/SSL, which is the basis for HTTPS. An X.509 certificate binds an identity to a public key using a digital signature. A certificate contains an identity (hostname, organization, etc.) and a public key (RSA, DSA, ECDSA, ed25519, etc.), and is either signed by a Certificate Authority or is Self-Signed.
- Self-Signed Certificates
- Certificate Formats
- Verify Certificates
- Install the CA Cert as a trusted root CA
Self-Signed Certificates¶
Generate CA¶
- Generate RSA
openssl genrsa -aes256 -out ca-key.pem 4096
- Generate a public CA Cert
openssl req -new -x509 -sha256 -days 365 -key ca-key.pem -out ca.pem
Optional Stage: View Certificate's Content¶
openssl x509 -in ca.pem -text
openssl x509 -in ca.pem -purpose -noout -text
Generate Certificate¶
- Create a RSA key
openssl genrsa -out cert-key.pem 4096
- Create a Certificate Signing Request (CSR)
openssl req -new -sha256 -subj "/CN=yourcn" -key cert-key.pem -out cert.csr
- Create a extfilewith all the alternative names
echo "subjectAltName=DNS:your-dns.record,IP:257.10.10.1" >> extfile.cnf
# optional
echo extendedKeyUsage = serverAuth >> extfile.cnf
- Create the certificate
openssl x509 -req -sha256 -days 365 -in cert.csr -CA ca.pem -CAkey ca-key.pem -out cert.pem -extfile extfile.cnf -CAcreateserial
Certificate Formats¶
X.509 Certificates exist in Base64 Formats PEM (.pem, .crt, .ca-bundle), PKCS#7 (.p7b, p7s) and Binary Formats DER (.der, .cer), PKCS#12 (.pfx, p12).
Convert Certs¶
| COMMAND | CONVERSION | 
|---|---|
| openssl x509 -outform der -in cert.pem -out cert.der | PEM to DER | 
| openssl x509 -inform der -in cert.der -out cert.pem | DER to PEM | 
| openssl pkcs12 -in cert.pfx -out cert.pem -nodes | PFX to PEM | 
Verify Certificates¶
openssl verify -CAfile ca.pem -verbose cert.pem
Install the CA Cert as a trusted root CA¶
On Android¶
The exact steps vary device-to-device, but here is a generalised guide:
- Open Phone Settings
- Locate Encryption and Credentialssection. It is generally found under `SettingsSecurity > Encryption and Credentials` 
- Choose Install a certificate
- Choose CA Certificate
- Locate the certificate file ca.pemon your SD Card/Internal Storage using the file manager.
- Select to load it.
- Done!
On Arch¶
System-wide – Arch(p11-kit) (From arch wiki)
- Run (As root)
trust anchor --store myCA.crt
- The certificate will be written to /etc/ca-certificates/trust-source/myCA.p11-kit and the "legacy" directories automatically updated.
- If you get "no configured writable location" or a similar error, import the CA manually:
- Copy the certificate to the /etc/ca-certificates/trust-source/anchors directory.
- and then
update-ca-trust
wiki page here
On Debian and Derivatives¶
- Move the CA certificate (ca.pem) into/usr/local/share/ca-certificates/ca.crt.
- Update the Cert Store with:
sudo update-ca-certificates
Refer the documentation here and here.
On Fedora¶
- Move the CA certificate (ca.pem) to/etc/pki/ca-trust/source/anchors/ca.pemor/usr/share/pki/ca-trust-source/anchors/ca.pem
- Now run (with sudo if necessary):
update-ca-trust
Refer the documentation here.
On iOS¶
Apple makes this far more difficult than it should be:
- Send ca.pemto the iOS device through iCloud, AirDrop, or a direct download from your server.
- After downloading a dialog will appear on screen telling you that the profile has been downloaded.
- Open the Settings app, and a Profile Downloadeditem will be at the top. If it is not there you may find it inGeneral → VPN & Device Management.
- Click Install.
- The device will ask for your passcode. Enter it.
- The device will then warn you about the certificate. Click Installagain.
- And, as if clicking Installtwice wasn't enough a confirmation button will appear at the bottom of the screen. ClickInstallone last time.
- Done!
On macOS¶
Assuming the path to your generated CA certificate is ~/ca.pem, run (as root):
security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain ~/ca.pem
A dialog box will appear asking for an administrator's username and password. Enter
it, and it will be stored in the system keychain. This can be verified by opening the
Keychain Access application (/Applications/Utilities/Keychain Access.app). On the
sidebar under System Keychains select System, and the new certificate should be
listed.
On Windows¶
Assuming the path to your generated CA certificate as C:\ca.pem, run:
Import-Certificate -FilePath "C:\ca.pem" -CertStoreLocation Cert:\LocalMachine\Root
- Set -CertStoreLocationtoCert:\CurrentUser\Rootin case you want to trust certificates only for the logged in user.
OR
In Command Prompt, run:
certutil.exe -addstore root C:\ca.pem
- certutil.exeis a built-in tool (classic- System32one) and adds a system-wide trust anchor.