################# SSL Certificate Warning ################
Certificate for hostname 'myserver.example.com', in file:
/etc/pki/tls/certs/myserver.example.com.cert
The certificate needs to be renewed; this can be done
using the 'genkey' program.
Browsers will not be able to correctly connect to this
web site using SSL until the certificate is renewed.
##########################################################
Generated by certwatch(1)
which leads me to believe my certificate has expired. I logged into my site and sure enough, it expired 30-days after I created it. I don't think I have ever had a certificate with such a short life.
It looks like the genkey program for CentOS (and probably other distributions) has a default creation length of 30-days:
Usage: genkey [options] servername
--test Test mode, skip random data creation, overwrite existing key
--genreq Just generate a CSR from an existing key
--makeca Generate a private CA key instead
--days Days until expiry of self-signed certificate (default 30)
Also note the lack of a renew option, something you would expect to see since the message states it needs to be renewed. After searching forums and archives and getting a smattering of RTFM responses and dead ends, I dug into it.
- Delete the old certificate pair in /etc/pki/tls/certs/ and /etc/pki/tls/private/. One ends in cert, one ends in key.
Run "genkey example.com --days 1825" (if you want a 5-year certificate).
- Restart apache (service httpd restart)
That's it. Truthfully, there is no renew anywhere, certificates aren't really renewable, you just have to generate new ones each time.
I hope this helps those who received the cryptic message, you can finish your cereal and not be late to work today.
No comments:
Post a Comment