Hi,
After upgraded openssl version from 0.9.8zc to 0.9.8zd, how to verify apache is now using the latest openssl version?
Thanks in advance.
yum install ca-certificates update-ca-trust enable cp cacert.pem /etc/pki/ca-trust/source/anchors/ update-ca-trust extract
openssl s_client -showcerts -connect ...:636
openssl verify cacert.pem cacert.pem: OK
openssl version -d OPENSSLDIR: "/etc/pki/tls"
rpm -qa|grep openssl openssl-1.0.1e-30.el6_6.5.x86_64 openssl-devel-1.0.1e-30.el6_6.5.x86_64
yum list php Loaded plugins: downloadonly, fastestmirror, presto Determining fastest mirrors base | 3.7 kB 00:00 epel | 4.4 kB 00:00 epel/primary_db | 6.4 MB 00:00 extras | 3.4 kB 00:00 panopta | 951 B 00:00 updates | 3.4 kB 00:00 updates/primary_db | 2.1 MB 00:00 Available Packages php.x86_64 5.3.3-40.el6_6 updates
[next02admin@NEXT02VMD02 ~]$ /usr/bin/openssl version OpenSSL 1.0.1e-fips 11 Feb 2013 (the default one) [next02admin@NEXT02VMD02 ~]$ /usr/local/bin/openssl version OpenSSL 0.9.8e 23 Feb 2007 (the compiled one) [next02admin@NEXT02VMD02 ~]$ php -v PHP 5.2.10 (cli) (built: Jul 1 2014 00:39:27) Copyright (c) 1997-2009 The PHP Group Zend Engine v2.2.0, Copyright (c) 1998-2009 Zend Technologies [next02admin@NEXT02VMD02 ~]$ rpm -qa|grep httpd httpd-tools-2.2.15-39.el6.centos.x86_64 httpd-2.2.15-39.el6.centos.x86_64 httpd-devel-2.2.15-39.el6.centos.x86_64
# generate mysite.coms's RSA keypair with 3072 bits and encrypt it openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:3072 -aes-128-cbc -out mysite_key.pem # generate a certificate signing request. Used FQDN of server (i.e. mysite.com). Use email with dot to prevent spam. Didn't include an "extra" password openssl req -new -key mysite_key.pem -sha256 -days 365 -out mysite_csr.pem # Remove pass-phrase from the key cp mysite_key.pem mysite_key.pem.tmp openssl rsa -in mysite_key.pem.tmp -out mysite_key.pem rm -f mysite_key.pem.tmp # sign the certificate with the key itself. Skip this step if using a CA openssl x509 -req -in mysite_csr.pem -signkey mysite_key.pem -sha256 -days 365 -out mysite_crt.pem # Copy the files to the correct locations (don't move since it will cause problems with selinux). Be sure to keep at read only by root cp mysite_key.pem /etc/pki/tls/private/mysite_key.pem cp mysite_csr.pem /etc/pki/tls/private/mysite_csr.pem cp mysite_crt.pem /etc/pki/tls/certs/mysite_crt.pem rm -f mysite_key.pem rm -f mysite_csr.pem rm -f mysite_crt.pem # update /etc/httpd/conf.d/ssl.conf as follows: # SSLCertificateFile /etc/pki/tls/certs/mysite_crt.pem # SSLCertificateKeyFile /etc/pki/tls/private/mysite_key.pem /etc/init.d/httpd restart