|
Bugzilla – Full Text Bug Listing |
| Summary: | YaST module - CA Manager | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 10.3 | Reporter: | Andreas Pedersen <alofflambas> |
| Component: | YaST2 | Assignee: | Michael Calmer <mc> |
| Status: | RESOLVED WONTFIX | QA Contact: | Jiri Srain <jsrain> |
| Severity: | Enhancement | ||
| Priority: | P5 - None | ||
| Version: | Final | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Andreas Pedersen
2007-10-24 00:03:47 UTC
Well ... No :-) The idea: yast2 ca-management manages certificates inside a repository. Inside this repository all keys are encrypted. If you click on a certificate and select "Export as file" in the combobox, you get an dialog which asks for the export format. There is an option to export the key not encrypted. If you want to export a certificate for this local server there is a special item in the combobox "export common server certificate" which put the selected certificate and key to /etc/ssl/servercerts/servercert.[pem|key] . The key is not encrypted in this case. Or you export as PKCS12 format and go with this (e.g. on an USB Stick) to a different host and start "yast2 common_cert" module. This reads the PKCS12 file and put the certificate and key (not encrypted) to /etc/ssl/servercerts/... too. There is one thing I might to add later. Encrypt all keys with the CA password. I am sure the most people will do this by hand now. This is in our Feature list. I hope this concept is acceptable. |