Created on 04-17-2018 10:31 PM - edited 09-16-2022 06:06 AM
i did not mentioned any passphrase while generating the TLS Private key and the Certificates has been issued by the CA Team
As the document states to set client_keypw_file with the password of Private key.
what steps do i need to take in this case ?
Reference Link
https://www.cloudera.com/documentation/enterprise/5-8-x/topics/cm_sg_config_tls_agent_auth.html#conc...
Created 04-18-2018 02:42 AM
You can add a password into your private key file.
Suppose that you private key file is test.pem. Its contents should be like:
-----BEGIN PRIVATE KEY-----
.
.
.
-----END PRIVATE KEY-----
or
-----BEGIN RSA PRIVATE KEY-----
.
.
.
-----END RSA PRIVATE KEY-----
Run the following command
$ openssl rsa -des3 -in test.pem -out test1.pem -passout pass:test
This command will create the test1.pem file which is protected by password. Its contents will be similar to :
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,3716DAF995B742A4
.
.
.
-----END RSA PRIVATE KEY-----
Created 04-18-2018 02:42 AM
You can add a password into your private key file.
Suppose that you private key file is test.pem. Its contents should be like:
-----BEGIN PRIVATE KEY-----
.
.
.
-----END PRIVATE KEY-----
or
-----BEGIN RSA PRIVATE KEY-----
.
.
.
-----END RSA PRIVATE KEY-----
Run the following command
$ openssl rsa -des3 -in test.pem -out test1.pem -passout pass:test
This command will create the test1.pem file which is protected by password. Its contents will be similar to :
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,3716DAF995B742A4
.
.
.
-----END RSA PRIVATE KEY-----
Created on 04-18-2018 06:04 AM - edited 04-18-2018 06:05 AM
But woudn't this would have an impact on the certificate already being generated from CA Team ?
As the private key changes .crt file would also change right ? in that case Cloudera TLS/SSL -level 3 configuration may not work
It's just an thought process , please clarify
Created 04-18-2018 06:11 AM
Created 04-18-2018 07:57 AM