SSL encryption applies two keys named Public key and Private Key to encrypt connection. Both keys are similar in nature but their usage is different. Even these keys length may vary in terms of bits. The more the key is lengthy; it is hard to break it. The receiver uses public key to encode the …
An invalid SSL certificate can be one of the worst things for our business. With its scary warning messages showing in the browser, it can make people run away from our site like nothing else. Therefore, we should fix it at the earliest. And hopefully, we will not have any trouble fixing it now when …
We can quickly solve TLS or SSL certificate issues by checking the certificate’s expiration from the openssl command line. Today, let us see how to check certificate’s expiration date in 2 ways. The first one is to check the certificate on remote server side. The second is to check the certificate by PEM files. Check …
There are two major encoding schemes for X.509 certificates and keys: PEM (Base64 ASCII), and DER (binary). DER (Distinguished Encoding Rules) is a data object encoding schema that can be used to encode certificate objects into binary files. PEM (Privacy Enhanced Mail) is an encrypted email encoding schema that can be borrowed to encode certificate …
A self-signed SSL certificate is a security certificate that is not signed by a certificate authority (CA). These certificates are easy to make and do not cost money. The Self-signed SSL certificate is mainly used for non-production applications or other experiments. Generate private key and self signed SSL certificate Run the following OpenSSL command to …
PKCS#12 files are commonly used to import and export certificates and private keys on Windows and macOS computers, and usually have the filename extensions .p12 or .pfx. OpenSSL on Linux If we are using Linux, we can install OpenSSL with the following YUM console command: > yum install openssl If our distribution is based on …
Two way SSL, also known as mutual SSL certificates, are SSL certificate where the server and the client, authenticates each other for a more robust security. Steps for a 2 way SSL handshake process In Two-Way SSL authentication, the client and server need to authenticate and validate each others identities. The authentication message exchange between …
An SSL/TLS handshake is a negotiation between two parties on a network – such as a browser and web server – to establish the details of their connection. The main purpose of an SSL handshake is to provide privacy and data integrity for communication between a server and a client. During a TLS handshake, the …
OpenSSL includes tonnes of features covering a broad range of use cases, and it’s difficult to remember its syntax for all of them and quite easy to get lost. We will share how to use OpenSSL RSA to create public and private keys in this post. Understanding Public Key and Private Key The public …
OpenSSL is the true Swiss Army knife of certificate management, and just like with the real McCoy, we spend more time extracting the nail file when what we really want is the inflatable hacksaw. We will find an overview of the most commonly used commands below. Certificate requests and key generation with OpenSSL Typically, when …