|
|
|
|||||||
|
ICT-Hotlist TopicOnline CSR generator.Generate a Certificate Signing RequestWith this website, you can generate a new CSR and private key when your equipment cannot offer it in the desired format.WarningThe web site provides following, justified warning:This site makes it as easy as possible to generate a Certificate Signing Request in a secure manner. All data is transferred over an end-to-end TLS connection with forward secrecy (on modern browsers). Further, for your privacy and security, none of the information used on this site is stored with the exception of metadata from Google Analytics and the webserver access logs. However, there are some inherent concerns with generating a private key on a remote server and transferring it over the internet. More specifically, a malicious attacker could potentially store your RSA private key as it is generated or transmitted to your computer and use that information to impersonate your website with HTTPS. This is not specific to this site; any key generation occurring on a remote host is subject to these potential vulnerabilities. With that in mind, if you have some concerns about the security of this site or your connection, we encourage you to generate a Certificate Signing Request locally on a secure computer which you own. Using for example openssl
$ openssl req -nodes -newkey rsa:2048 -sha256 -keyout example.key -out example.csr
LinkWhen you have read and understood the warning above, you can find the CSR generator here
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation. |