Blame | Last modification | View Log | RSS feed
Easy-RSA 3 Quickstart README============================This is a quickstart guide to using Easy-RSA version 3. Detailed help on usageand specific commands can be found by running ./easyrsa -h. Additionaldocumentation can be found in the doc/ directory.If you're upgrading from the Easy-RSA 2.x series, there are Upgrade-Notesavailable, also under the doc/ path.Setup and signing the first request-----------------------------------Here is a quick run-though of what needs to happen to start a new PKI and signyour first entity certificate:1. Choose a system to act as your CA and create a new PKI and CA:./easyrsa init-pki./easyrsa build-ca2. On the system that is requesting a certificate, init its own PKI and generatea keypair/request. Note that init-pki is used _only_ when this is done on aseparate system (or at least a separate PKI dir.) This is the recommendedprocedure. If you are not using this recommended procedure, skip the nextimport-req step../easyrsa init-pki./easyrsa gen-req EntityName3. Transport the request (.req file) to the CA system and import it. The namegiven here is arbitrary and only used to name the request file../easyrsa import-req /tmp/path/to/import.req EntityName4. Sign the request as the correct type. This example uses a client type:./easyrsa sign-req client EntityName5. Transport the newly signed certificate to the requesting entity. This entitymay also need the CA cert (ca.crt) unless it had a prior copy.6. The entity now has its own keypair, signed cert, and the CA.Signing subsequent requests---------------------------Follow steps 2-6 above to generate subsequent keypairs and have the CA returnsigned certificates.Revoking certs and creating CRLs--------------------------------This is a CA-specific task.To permanently revoke an issued certificate, provide the short name used duringimport:./easyrsa revoke EntityNameTo create an updated CRL that contains all revoked certs up to that point:./easyrsa gen-crlAfter generation, the CRL will need to be sent to systems that reference it.Generating Diffie-Hellman (DH) params-------------------------------------After initializing a PKI, any entity can create DH params that needs them. Thisis normally only used by a TLS server. While the CA PKI can generate this, itmakes more sense to do it on the server itself to avoid the need to send thefiles to another system after generation.DH params can be generated with:./easyrsa gen-dhShowing details of requests or certs------------------------------------To show the details of a request or certificate by referencing the shortEntityName, use one of the following commands. It is an error to call thesewithout a matching file../easyrsa show-req EntityName./easyrsa show-cert EntityNameChanging private key passphrases--------------------------------RSA and EC private keys can be re-encrypted so a new passphrase can be suppliedwith one of the following commands depending on the key type:./easyrsa set-rsa-pass EntityName./easyrsa set-ec-pass EntityNameOptionally, the passphrase can be removed completely with the 'nopass' flag.Consult the command help for details.