Setting Up SSL Certificates and Keys for EAP-TLS
This section demonstrates how to set up SSL certificate and key
files for use by AAA servers and WiFi clients. The first example
shows a simplified procedure such as you might use from the
command line. The second example describes how to set up SSL files on
Windows
Important
Whatever method you use to generate the certificate and key
files, the Common Name value used for the server and client
certificates/keys must each differ from the Common Name value
used for the CA certificate. Otherwise, the certificate and
key files will not work for servers compiled using OpenSSL. A
typical error in this case is:
ERROR 2026 (HY000): SSL connection error: error:00000001:lib(0):func(0):reason(1)
Example 1: Creating SSL Files from the Command Line on Unix
The following example shows a set of commands to create AAA
server and client certificate and key files. You will need to
respond to several prompts by the openssl
commands. To generate test files, you can press Enter to all
prompts. To generate files for production use, you should
provide nonempty responses.
# Create clean environment shell>rm -rf newcerts
shell>mkdir newcerts && cd newcerts
# Create CA certificate shell>openssl genrsa 2048 > ca-key.pem
shell>openssl req -new -x509 -nodes -days 3600 \
-key ca-key.pem -out ca-cert.pem
# Create server certificate, remove passphrase, and sign it # server-cert.pem = public key, server-key.pem = private key shell>openssl req -newkey rsa:2048 -days 3600 \
-nodes -keyout server-key.pem -out server-req.pem
shell>openssl rsa -in server-key.pem -out server-key.pem
shell>openssl x509 -req -in server-req.pem -days 3600 \
-CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 -out server-cert.pem
# Create client certificate, remove passphrase, and sign it # client-cert.pem = public key, client-key.pem = private key shell>openssl req -newkey rsa:2048 -days 3600 \
-nodes -keyout client-key.pem -out client-req.pem
shell>openssl rsa -in client-key.pem -out client-key.pem
shell>openssl x509 -req -in client-req.pem -days 3600 \
-CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 -out client-cert.pem
After generating the certificates, verify them:
shell> openssl verify -CAfile ca-cert.pem server-cert.pem client-cert.pem
server-cert.pem: OK
client-cert.pem: OK
Example 2: Creating SSL Files on Windows
Download OpenSSL for Windows if it is not installed on your
system. An overview of available packages can be seen here:
http://www.slproweb.com/products/Win32OpenSSL.html
Choose the Win32 OpenSSL Light or Win64 OpenSSL Light package,
depending on your architecture (32-bit or 64-bit). The default
installation location will be
C:\OpenSSL-Win32
or
C:\OpenSSL-Win64
, depending on which package
you downloaded. The following instructions assume a default
location of C:\OpenSSL-Win32
. Modify this as
necessary if you are using the 64-bit package.
If a message occurs during setup indicating
'...critical component is missing: Microsoft Visual C++
2008 Redistributables'
, cancel the setup and download
one of the following packages as well, again depending on your
architecture (32-bit or 64-bit):
-
Visual C++ 2008 Redistributables (x86), available at:
http://www.microsoft.com/downloads/details.aspx?familyid=9B2DA534-3E03-4391-8A4D-074B9F2BC1BF
-
Visual C++ 2008 Redistributables (x64), available at:
http://www.microsoft.com/downloads/details.aspx?familyid=bd2a6171-e2d6-4230-b809-9a8d7548c1b6
After installing the additional package, restart the OpenSSL
setup procedure.
During installation, leave the default
C:\OpenSSL-Win32
as the install path, and
also leave the default option 'Copy OpenSSL DLL files
to the Windows system directory'
selected.
When the installation has finished, add
C:\OpenSSL-Win32\bin
to the Windows System
Path variable of your server:
- On the Windows desktop, right-click the My Computer icon, and select .
- Select the tab from the menu that appears, and click the button.
- Under System Variables, select , then click the button. The dialogue should appear.
-
Add
';C:\OpenSSL-Win32\bin'
to the end (notice the semicolon). - Press OK 3 times.
-
Check that OpenSSL was correctly integrated into the Path
variable by opening a new command console
(Start>Run>cmd.exe) and verifying
that OpenSSL is available:
Microsoft Windows [Version ...] Copyright (c) 2006 Microsoft Corporation. All rights reserved. C:\Windows\system32>
cd \
C:\>openssl
OpenSSL>exit
<<< If you see the OpenSSL prompt, installation was successful. C:\>
Depending on your version of Windows, the preceding path-setting
instructions might differ slightly.
After OpenSSL has been installed, use instructions similar to
those from from Example 1 (shown earlier in this section), with
the following changes:
-
Change the following Unix commands:
# Create clean environment shell>
On Windows, use these commands instead:rm -rf newcerts
shell>mkdir newcerts && cd newcerts
# Create clean environment shell>
md c:\newcerts
shell>cd c:\newcerts
The above content taken from http://dev.mysql.com/doc/refman/5.0/en/creating-ssl-certs.html.
This comment has been removed by a blog administrator.
ReplyDelete