If you have it, your steps are dumb-simple (but require root/sudo): The update-ca-trust command was added in Fedora 19 and RHEL6 via RHEA-2013-1596. If the cert is signed by some other CA, you can't run with the above instead, you will need to find the appropriate CA cert and download that. Note that you should only do this in the case of a self-signed cert (as mentioned in the original question). You can download a self-signed cert directly from a site quickly with: openssl s_client -connect server:443 <<<'' | openssl x509 -out /path/file Warning though: you're also going to be trusting any sites that are signed by that cert. I don't know of a way to import a specific site-cert into OpenSSL's trust db (I wish I did!), but since you're talking about a self-signed cert we can approach it by importing your cert as new trusted CA cert. Next I will have to put it in the /etc/pki/tls/certs directory and apply some openssl secert sauce I don't know about. The certificate is between "BEGIN CERTIFICATE and END CERTIFICATE" I do not know what kind of certificate this is. I can get the SSL certificate from the server using: But I am at a loss what actions I should perform to make wget function without complaining. I have found out the certificates reside in /etc/pki/tls. To make this work I will have to add the self-signed certificate of the server to my RedHat box. For example using wget, without having to use the -no-check-certificate option. I want to connect to a server that makes use of a self-signed certificate. ![]() ![]() Having said that, what I would like to do should not be rocket science (In windows I can do this with a few clicks in my browser) I'm not an expert with respect to certificates and find it difficult to find the right answer through googling, since I don't know the difference between a. How can I import a self-signed certificate in Red-Hat Linux.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |