最简证书

openssl  genrsa -des3 -out server.key 1024  #生成私钥(key),设置密码
openssl req -new -key server.key -out server.csr   # 生成request
cp server.key  server.key.ori
openssl rsa -in server.key.ori  -out server.key  #去除私钥密码(否则启动nginx等也需要输入密码)
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt #自签名公钥

nginx配置

server {
        listen 443;
        server_name www.abc.com;
        root /var/www/;
        autoindex on;
        ssl on;
        ssl_certificate     /etc/nginx/sslkey/server.crt;
        ssl_certificate_key /etc/nginx/sslkey/server.key;
        #access_log /var/log/nginx/www.abc.com-access.log main;
        #error_log /var/log/nginx/www.abc.com-error.log warn;

}

自建ca,签名,单向签名(不限客户端,验证服务端)

cat /etc/ssl/openssl.cnf 修改democa为openssl工作目录 工作目录下

touch index.txt serial
chmod 666 index.txt serial
echo 01 >  serial
mkdir -p newcerts private

ca

openssl genrsa -des3 -out ./private/ca.key 2048    #自建ca key
openssl req -x509 -new -days 3650 -key ./private/ca.key  -out ca.crt  # ca信息与证书

server

openssl genrsa -out ./server/server.key 1024
openssl req -new -key ./server/server.key  -out ./server/server.csr
openssl ca -in ./server/server.csr -cert ./ca.crt -keyfile ./private/ca.key -out ./server/server.crt -days 3650  #用ca签名

[二] 不关联目录,签名 openssl x509 -req -sha256 -CA ca.crt -CAkey ca.key -CAcreateserial -in server.csr -out server.crt