Forum

Comodo PossitiveSSL Setup?

GentZu
24 November 2014, 20:29
According to this HowTo page I generate as follows:
1 openssl genrsa -out serverkey.pem 2048
2 openssl req -new -x509 -days 3650 -key serverkey.pem -out server.crt
3 echo "" >> serverkey.pem
4 cat server.crt >> serverkey.pem
5 echo "" >> serverkey.pem
6 rm -f server.crt

is second step makes csr file?
but when I enter the key to reissue ssl in namechep show error that the CSR can not be decoded!

Hiawatha version: 9.8
Operating System: Centos 6.6
Hugo Leisink
24 November 2014, 20:47
Step 2 is to create a self-signed certificate. To create a CSR, remove the -x509 option.
GentZu
24 November 2014, 20:56
so how structure serverkey correct? I have the following files:
openssl genrsa -out serverkey.pem 2048 >> serverkey.pem
openssl req -new -out -sha256 -Key serverkey.pem server.csr >> server.csr
Root CA Certificate - AddTrustExternalCARoot.crt
Intermediate CA Certificate - COMODORSAAddTrustCA.crt
Intermediate CA Certificate - COMODORSADomainValidationSecureServerCA.crt
PositiveSSL Certificate - domain_com.crt
Hugo Leisink
24 November 2014, 21:02
Use "openssl x509 -in <file>.crt -noout -text" to get certificate information. Use your website certificate first, followed by the one that signed it (Issuer of your certificate matching Subject of subCA certificate), followed by the CA certificate (Issuer of subCA certificate matching Subject of CA certicate) and so on. Don't include the certificate it is present in web browsers. So, only include your website CA certificate and intermediate CA certificates.
This topic has been closed.