Ok but click the right botton and choose translate and you put the text in the language you want, it is very simple and better than prohibit anything but ok, only english?, ok only english.
this is what I did but do not work…
I’m going to make the certificates on another machine with this procedure, sorry it’s in Spanish
What is your opinion?
create directory structure
mkdir -p ca/{certs, crl, csr, newcerts, private}
certs –> stores the certificates or public keys
crl–>certificate revocation list csr–>certificate signing requests newcerts–>store certificates
that emits the AC
private –> store private keys
copy the openssl.cnf file
cp /etc/pki/tls/openssl.cnf /ca
create an index.txt that is like a database of the certification authority
Touch Index.txt
we create the serial file inside the CA folder
Echo ‘01’ > series
EDIT THE OPENSSL FILE. CNF
line 42
/AC
line 81
policy_anything
WE CREATE THE PUBLIC CERTIFICATE FOR THE CERTIFICATION AUTHORITY AND THE ASSOCIATED PRIVATE KEY
openssl req -config openssl.cnf -new -x509 -extensions v3_ca -keyout /ca/private/privadaCA.key -out /ca/certs/certificadoCA.crt
It asks you to “Enter PEM pass phrase”… secret. Although it should be more robust.
We fill in the information requested.
Generate the private key for the client.
openssl genrsa -aes128 -out /ca/private/privateclient1.key 1024
asks us to put a password… secret.
Generate a signature request by the server client.
openssl req -new -key /ca/private/customerprivate1.key -out /ca/csr/customerrequest1.csr -config /ca/openssl.cnf
It asks us for the private key of privadacliente1.key that we put secret
It asks us for the country, state, city, organization, organization name, hosting name and email
It asks us for a challenge password, we leave it blank and an optional company name that we also leave blank.
WE SIGN THE REQUEST GENERATED BY USER ANGEL
openssl ca -in /ca/csr/clientrequest1.csr -out /ca/newcerts/clientcert1.crt -cert /ca/certs/CAcertificate.crt -keyfile /ca/private/privateCA.key -config /ca/openssl.cnf
asks for the password of the private key of the CA: secret
He asks us two questions and both of them AND
notifies us that the database has been updated.
We create a 01.pem inside /ca/newcerts/ with the above command.
CONVERT A PEM FILE AND PRIVATE KEY TO A PFX FILE
openssl pkcs12 -export -out /ca/newcerts/client1.pfx -inkey /ca/private/privateclient1.key -in /ca/newcerts/clientcert1.crt
the graylog manual says that you put the graylog-certificate.pem and graylog-key.pem in the client and it works, and I did that and doesn´t work.
the second choice is make a graylog-certificate.pem and graylog-key to the server and client.crt and client.key to the client but the graylog manual doesn´t say how to do it, so… I have the server in HTTPS mode but I can´t receive inputs from any client.
thanks a lot and sorry to speak in spanish.