The cert.command & sign.command Scripts: Step 0

Next

In Securing Communications with SSL/TLS: A High-Level Overview and Using CA.pl, I discuss standard tools for working with SSL/TLS certificates. Today, let's look at some streamlined tools for running your own private Certificate Authority.

I built a couple very simple Bourne shell scripts, cert.command and sign.command. The .command suffix makes them double-clickable on Mac OS X, although personally I run them as command-line programs. cert.command walks through the process of creating a CSR and signing it, to create a new signed certificate; sign.command takes an existing Certificate Signing Request and signs it, as a commercial CA would. Their behavior is the same whether executed from a shell (without arguments) or double-clicked: the script prompts for necessary information and produces a .crt file, signed by the root certificate specified in openssl.cnf. cert.command also prompts for organizational information, but sign.command doesn't, because that information is already in the CSR.

Alternatively, either script may be run from a command line with an argument: cert takes the filename of the certificate to create (e.g., "cert.command www.reppep.com.20071108"), and sign takes the CSR to sign (e.g., "sign.command www.reppep.com.20071108.csr").


up