SBCE TLS Procedure
SBCE TLS Procedure
2 2
Generate a PKCS12 format keystore Sign the given CSR and generate a
with the Identity certificate containing PEM formatted certificate containing
the values given in the end entity. the values given in the end entity.
Procedure
CN, Common Name: Enter FQDN of SBCE (Required). This should be same
as the one used during CSR generation on SBCE.
Fill the OU, O, L, ST and Country fields same as while generating CSR.
Using Winscp move the pkcs12 file to any linux machine, which has
openssl, or to SBCE
Extract the cert file with below command
openssl pkcs12 –in <filename>.p12 -out <filename>.crt -nokeys –
clcerts
Using Winscp Copy the cert and key file to your desktop
NOTE:
Client Profile – SBC will initiate the connection
Depth – if multiple certificate (Certificate chain), it will look for up to
specified depth to verify certificate.
NOTE:
Server Profile – Accepting connection from other side.
Depth – if multiple certificate (Certificate chain), it will look for up to
specified depth to verify certificate.
Importing the key pair and trust chain into a PKCS#12 keystore
The very first step we must perform is to convert the key pair into a form
readable by the Java key tool. Since the key tool is unable to import
external keys, we will need to work around this.
To generate the PKCS#12 keystore, we can run the following command:
openssl pkcs12 \
-export \
-in {certificate-file-name} \
-inkey {certificate-key-file-name} \
-passin pass:{key-file-password} \
-out {output-file} \
-passout pass:sipera \
-name tomcat \
-certfile {trust-chain-file-name}
/usr/local/tomcat/bin/shutdown.sh
/usr/local/tomcat/bin/startup.sh
Convert a PEM certificate file and a private key to PKCS#12 (.pfx .p12)
openssl pkcs12 -export -out certificate.pfx -inkey privateKey.key -in
certificate.crt -certfile CACert.crt
Check an MD5 hash of the public key to ensure that it matches with what
is in a CSR or private key
openssl x509 -noout -modulus -in certificate.crt | openssl md5
openssl rsa -noout -modulus -in privateKey.key | openssl md5
openssl req -noout -modulus -in CSR.csr | openssl md5
© 2012 Avaya Inc. All rights48
reserved. 48
Common OPENSSL Commands
Generate a new private key and Certificate Signing Request
openssl req -out CSR.csr -new -newkey rsa:2048 -nodes -keyout
privateKey.key
Generate a certificate signing request (CSR) for an existing private key
openssl req -out CSR.csr -key privateKey.key –new
Generate a certificate signing request based on an existing certificate
openssl x509 -x509toreq -in certificate.crt -out CSR.csr -signkey privateKey.key
Remove a passphrase from a private key
openssl rsa -in privateKey.pem -out newPrivateKey.pem
Check an SSL connection. All the certificates (including Intermediates)
should be displayed
openssl s_client -connect www.avaya.com:443