OpenSSL allows you to create, modify, and view certificates and private keys. You can use it to generate Self Signed SSL Certificates.

General OpenSSL Commands[edit]

These commands allow you to generate CSRs, Certificates, Private Keys and do other miscellaneous tasks.

Generate a new private key

# openssl req -out CSR.csr -new -newkey rsa:2048 -nodes -keyout privateKey.key

Generate a new private key and Certificate Signing Request

# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout privateKey.key -out certificate.crt

Generate a certificate signing request (CSR) for an existing private key

# openssl req -out CSR.csr -key privateKey.key -new

Generate a certificate signing request based on an existing certificate

# openssl x509 -x509toreq -in certificate.crt -out CSR.csr -signkey privateKey.key

Remove a passphrase from a private key

# openssl rsa -in privateKey.pem -out newPrivateKey.pem

To view a PEM certificate

# openssl x509 -in certificate.crt -text

Checking & Verifying[edit]

If you need to check the information within a Certificate, CSR or Private Key, use these commands. You can also check CSRs and check certificates using our online tools.

Check a Certificate Signing Request (CSR)

# openssl req -text -noout -verify -in CSR.csr

Check a private key

# openssl rsa -in privateKey.key -check

Check a certificate

# openssl x509 -in certificate.crt -text -noout

Check a PKCS#12 file (.pfx or .p12)

# openssl pkcs12 -info -in keyStore.p12

If you are receiving an error that the private doesn't match the certificate or that a certificate that you installed to a site is not trusted, try one of these commands. It might be a good idea to use an online SSL checker service as well to determine what issues that are with the installed certificate.

The public key should match your private key and must be used in your certificate and certificate signing request. You can verify this by running:

# openssl x509 -noout -modulus -in certificate.crt

Remote Server Certificate[edit]

All the certificates (including Intermediates) should be displayed when using s_client.

SNI allows virtual hosting of multiple domains on the same IP address. It is a mechanism that allows the web server to know which domain is being accessed in order to use the proper certificate when establishing a connection to the client. For websites that have been assigned a dedicated IP address, using SNI is not required.

If the server is not using SNI:

# openssl s_client -showcerts -connect

If the server is using SNI, you will need to provide the hostname:

# openssl s_client -showcerts -servername -connect

The x509 certificate can be retrieved in either case by piping the output through openssl x509 -text.

# openssl s_client -showcerts -connect

Certificate and Key Conversion[edit]

These commands allow you to convert certificates and keys to different formats to make them compatible with specific types of servers or software. For example, you can convert a normal PEM file that would work with Apache to a PFX (PKCS#12) file and use it with Tomcat or IIS. Use our SSL Converter to convert certificates without messing with OpenSSL.

Convert a DER file (.crt .cer .der) to PEM

# openssl x509 -inform der -in certificate.cer -out certificate.pem

Convert a PEM file to DER

# openssl x509 -outform der -in certificate.pem -out certificate.der

Convert a PKCS#12 file (.pfx .p12) containing a private key and certificates to PEM

# openssl pkcs12 -in keyStore.pfx -out keyStore.pem -nodes

You can add -nocerts to only output the private key or add -nokeys to only output the certificates.

Convert a PEM certificate file and a private key to PKCS#12 (.pfx .p12)

# openssl pkcs12 -export -out certificate.pfx -inkey privateKey.key -in certificate.crt -certfile CACert.crt

See Also[edit]