OpenVPN Zertifikate erstllen mit EasyRSA

11. Oktober 2021 0 Von inside

joe vars

set_var EASYRSA „$PWD“
set_var EASYRSA_PKI „$EASYRSA/pki“
set_var EASYRSA_DN „cn_only“
set_var EASYRSA_REQ_COUNTRY „XX“
set_var EASYRSA_REQ_PROVINCE „Area51“
set_var EASYRSA_REQ_CITY „Area51“
set_var EASYRSA_REQ_ORG “ Area51 CERTIFICATE AUTHORITY“
set_var EASYRSA_REQ_EMAIL “ Area51@Area51.Area51″
set_var EASYRSA_REQ_OU „Area51 EASY CA“
set_var EASYRSA_KEY_SIZE 4096
set_var EASYRSA_ALGO rsa
set_var EASYRSA_CA_EXPIRE 7500
set_var EASYRSA_CERT_EXPIRE 3650
set_var EASYRSA_NS_SUPPORT „no“
set_var EASYRSA_NS_COMMENT “ Area51 CERTIFICATE AUTHORITY“
set_var EASYRSA_EXT_DIR „$EASYRSA/x509-types“
set_var EASYRSA_SSL_CONF „$EASYRSA/openssl-easyrsa.cnf“
set_var EASYRSA_DIGEST „sha512“

chmod +x vars

./easyrsa init-pki

./easyrsa build-ca

./easyrsa gen-req area51-server nopass

./easyrsa sign-req server area51-server

./easyrsa gen-req client01 nopass

./easyrsa sign-req client client01

./easyrsa gen-dh

./easyrsa gen-crl
./easyrsa revoke client..

auf den server:

  • private/server.key
  • issued/server.crt
  • crl.pem
  • ca.crt
  • dh.pem

auf den client:

  • issued/client1.crt
  • private/client1.key
  • ca.crt