summaryrefslogtreecommitdiff
path: root/static/openbsd/man8/ssl.8
diff options
context:
space:
mode:
Diffstat (limited to 'static/openbsd/man8/ssl.8')
-rw-r--r--static/openbsd/man8/ssl.8175
1 files changed, 175 insertions, 0 deletions
diff --git a/static/openbsd/man8/ssl.8 b/static/openbsd/man8/ssl.8
new file mode 100644
index 00000000..98ebc118
--- /dev/null
+++ b/static/openbsd/man8/ssl.8
@@ -0,0 +1,175 @@
+.\" $OpenBSD: ssl.8,v 1.70 2024/05/30 14:06:23 tb Exp $
+.\"
+.\" Copyright (c) 1999 Theo de Raadt, Bob Beck
+.\" All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd $Mdocdate: May 30 2024 $
+.Dt SSL 8
+.Os
+.Sh NAME
+.Nm ssl
+.Nd details for libssl and libcrypto
+.Sh DESCRIPTION
+This document describes some of the issues relating to the use of
+the OpenSSL libssl and libcrypto libraries.
+This document is intended as an overview of what the libraries do,
+and what uses them.
+.Pp
+The libssl and libcrypto libraries implement the TLS version 1 protocol.
+It is most commonly used by the HTTPS protocol for encrypted
+web transactions, as can be done with
+.Xr httpd 8 .
+The libcrypto library is also used by various programs such as
+.Xr ssh 1 ,
+.Xr sshd 8 ,
+and
+.Xr isakmpd 8 .
+.Sh SERVER CERTIFICATES
+The most common uses of TLS will require you to generate a server
+certificate, which is provided by your host as evidence of its identity
+when clients make new connections.
+The certificates reside in the
+.Pa /etc/ssl
+directory, with the keys in the
+.Pa /etc/ssl/private
+directory.
+.Pp
+Private keys can be encrypted using AES and a passphrase to protect their
+integrity should the encrypted file be disclosed.
+However, it is important to note that encrypted server keys mean that the
+passphrase needs to be typed in every time the server is started.
+If a passphrase is not used, you will need to be absolutely sure your
+key file is kept secure.
+.Sh GENERATING RSA SERVER CERTIFICATES FOR WEB SERVERS
+To support HTTPS transactions in
+.Xr httpd 8
+you will need to generate an RSA certificate.
+Start by creating a private key of the desired length:
+.Bd -literal -offset indent
+# openssl genrsa -out /etc/ssl/private/server.key 4096
+.Ed
+.Pp
+Or, if you wish the key to be encrypted with a passphrase that you will
+have to type in when starting servers
+.Bd -literal -offset indent
+# openssl genrsa -aes256 -out /etc/ssl/private/server.key 4096
+.Ed
+.Pp
+If you are only generating a private key to use with
+.Xr acme-client 1
+(for example, with a non-default key length)
+you may stop here.
+.Pp
+Otherwise, the next step is to generate a Certificate Signing Request (CSR)
+which is used to get a Certificate Authority (CA) to sign your certificate.
+To do this use the command:
+.Bd -literal -offset indent
+# openssl req -new -key /etc/ssl/private/server.key \e
+ -out /etc/ssl/private/server.csr
+.Ed
+.Pp
+This
+.Pa server.csr
+file can then be given to a Certificate Authority who will sign the key.
+.Pp
+You can also sign the key yourself, using the command:
+.Bd -literal -offset indent
+# openssl x509 -sha256 -req -days 365 \e
+ -in /etc/ssl/private/server.csr \e
+ -signkey /etc/ssl/private/server.key \e
+ -out /etc/ssl/server.crt
+.Ed
+.Pp
+Note that standard web browsers do not use the common name of a subject,
+but instead require that subject alt names are provided.
+This requires the use of
+.Ar -extfile Pa server.ext
+when self-signing.
+.Bd -literal -offset indent
+# this is an example server.ext file
+subjectAltName=DNS:example.com,DNS:www.example.com
+.Ed
+.Pp
+With
+.Pa /etc/ssl/server.crt
+and
+.Pa /etc/ssl/private/server.key
+in place, you should be able to start
+.Xr httpd 8
+with SSL configured, enabling HTTPS transactions with your machine on port 443.
+.Pp
+You will most likely want to generate a self-signed certificate in the
+manner above along with your certificate signing request to test your
+server's functionality even if you are going to have the certificate
+signed by another Certificate Authority.
+Once your Certificate Authority returns the signed certificate to you,
+you can switch to using the new certificate by replacing the self-signed
+.Pa /etc/ssl/server.crt
+with the certificate signed by your Certificate Authority, and then
+restarting
+.Xr httpd 8 .
+.Sh GENERATING ECDSA SERVER CERTIFICATES
+First, generate a private ECDSA key.
+The following command will use a NIST/SECG curve over a 384-bit
+prime field:
+.Bd -literal -offset indent
+# openssl ecparam -name secp384r1 -genkey \e
+ -noout -out /etc/ssl/private/eccert.key
+.Ed
+.Pp
+Note that some Certificate Authorities will only issue certificates for
+keys generated using prime256v1 parameters.
+.Pp
+If you are only generating a private key to use with
+.Xr acme-client 1 ,
+you may stop here.
+Otherwise, the next step is to generate a Certificate Signing Request (CSR)
+which is used to get a Certificate Authority (CA) to sign your certificate.
+To do this use the command:
+.Bd -literal -offset indent
+# openssl req -key /etc/ssl/private/eccert.key -new \e
+ -out /etc/ssl/private/eccert.csr
+.Ed
+.Pp
+This
+.Pa eccert.csr
+file can then be given to a CA who will sign the key.
+.Pp
+You can also sign the key yourself, using the command:
+.Bd -literal -offset indent
+# openssl x509 -sha256 -req -days 365 \e
+ -in /etc/ssl/private/eccert.csr \e
+ -signkey /etc/ssl/private/eccert.key \e
+ -out /etc/ssl/eccert.crt
+.Ed
+.Sh SEE ALSO
+.Xr acme-client 1 ,
+.Xr openssl 1 ,
+.Xr ssh 1 ,
+.Xr ssl 3 ,
+.Xr httpd 8 ,
+.Xr isakmpd 8 ,
+.Xr rc 8 ,
+.Xr smtpd 8 ,
+.Xr sshd 8 ,
+.Xr starttls 8