I’ve been doing a lot of work recently re-creating SSL certificates for customers who have SHA-1 or who want stronger certificates, mostly because so many sites are now failing validation in standard browsers because of SHA-1. IBM have published several pieces of documentation on how to do this but I wanted to share my bullet list on the quickest and simplest way I have found . It’s not hard there are just lots of new steps.
Firstly you need to know that SHA-2 support only really started with 9.0.1 FP3. That means the Domino Admin client you are going to use to do this work must be at that level (yes there are hotfixes for FP2 but go with the latest Fix Pack on your client).
You also need to know that NO Domino 8.5x server will be able to use the keyfile you create, it simply doesn’t have the cryptographic understanding to decode SHA-2.
Finally if you use the CA process to generate internet certificates you will need to upgrade the server running that process to 9.0.1 FP3 too.
Oh and you’re also not going to be using the Domino Server Certificate database to do this at all.
- Download 9.0.1 and FP3 for Domino Administrator and upgrade your client. Fix pack 3 is in Fix Central and 9.0.1 is on the IBM download site (CIQ91EN)
- Download the latest “lite” version of OpenSSL from here and install it on your Windows machine where you have Domino Administrator running. I installed it in c:\openssl for example
- Download the kyrtool from here and copy the executable to your Notes program directory
- Set the environment variable for OpenSSL by typing in a command prompt
Set OpenSSL_Conf=c:\openssl\bin\openssl.cfg (or whatever your path is)
- Now we create our keypair using OpenSSL. From C:\OpenSSL\bin directory type
“openssl genrsa -out server.key 4096”
obviously you can use any name if you don’t want to use server.key and you don’t have to create a 4096 strength keypair. When finished you should have a file in that directory called server.key
- Now you have your keypair you need to create a CSR to send to the certificate authority
openssl req -new -sha256 -key server.key -out server.csr
the server.key name must match what you created in step 5 so if you used a different name there you need to use that name here. Similarly your server.csr filename can be anything you like. When you enter this command be prepared to answer all the questions about the certificate you want generated including the common name etc. The CSR this generates will be uploaded to your CA (Verisign, GoDaddy, Thawte, whoever) and your SSL certificate created based on the answers you give to those questions.
- Now we need to create a keyring file ready to add to certificate into when the CA sends it back. Go to your Notes program directory and run the kyrtool
kyrtool create -k c:\notes\data\keyring.kyr -p <passwordyouwanttouse>
again the keyring.kyr file can be called anything you like. Once run you should have both a keyring.kyr and keyring.sth files in your data directory
- By now your CA should have sent you your certificate as well as some trusted and intermediate root certificates for their issuer. We are going to create a single text file that contains the server.key we generated in step 5, the SSL certificate the CA just sent us (usually a .crt or .pem file) and any intermediate or root certificates the CA needs us to use. Doing this is very simple. Go to your c:\openssl\bin directory (the one where your server.key file was created) and enter
type server.key server.crt intermediate.crt root.crt >server.txt
note all the filenames will be specific to whatever you were sent by your CA. If you were sent a single bundle then you would use server.key bundlename.crt for instance
- To verify your server.txt is created successfully your can validate it using the kyrtool. Go back to your c:\notes program directory and type
kyrtool verify <path to server.txt>
- Now we import our server.txt will all the certificates into our newly created keyring file we created in step 7
kyrtool import all -k c:\notes\data\keyring.kyr -i c:\openssl\bin\server.txt
again your filenames and paths may vary depending on what you chose
And that’s it. You now have a keyring (kyr) file and stashed password file (sth) you can copy to you Domino 9.x servers and use. If you want to validate the keys are correctly in the file then you can again use the kyrtool
kyrtool show keys -k c:\notes\data\keyring.kyr AND
kyrtool show certs -k c:\notes\data\keyring.kyr
IBM’s documentation on the process and the supported platforms is here and here