From c3ca5fd4dd4d0e9b755c93d73fe55efd16e82b40 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Juan=20del=20R=C3=ADo=20Pacheco?= Date: Mon, 24 Oct 2022 17:21:13 +0200 Subject: [PATCH] Avoid NET::ERR_CERT_VALIDITY_TOO_LONG error https://stackoverflow.com/questions/64597721/neterr-cert-validity-too-long-the-server-certificate-has-a-validity-period-t --- certify.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/certify.sh b/certify.sh index e8ddb7a..960f3d6 100755 --- a/certify.sh +++ b/certify.sh @@ -19,7 +19,7 @@ fi # Generate Certificate Authority openssl genrsa -out "tmp/${name}CA.key" 2048 &>/dev/null -openssl req -x509 -config utils/ca.conf -new -nodes -key "tmp/${name}CA.key" -sha256 -days 1825 -out "${name}CA.pem" &>/dev/null +openssl req -x509 -config utils/ca.conf -new -nodes -key "tmp/${name}CA.key" -sha256 -days 825 -out "${name}CA.pem" &>/dev/null # This is the part that demands root privileges if [ "$EUID" -eq 0 ] ; then @@ -36,7 +36,7 @@ openssl genrsa -out "${name}.key" 2048 &>/dev/null openssl req -new -config utils/ca.conf -key "${name}.key" -out "tmp/${name}.csr" &>/dev/null # Generate SSL Certificate -openssl x509 -req -in "tmp/${name}.csr" -CA "${name}CA.pem" -CAkey "tmp/${name}CA.key" -CAcreateserial -out "${name}.crt" -days 1825 -sha256 -extfile utils/ssl.conf &>/dev/null +openssl x509 -req -in "tmp/${name}.csr" -CA "${name}CA.pem" -CAkey "tmp/${name}CA.key" -CAcreateserial -out "${name}.crt" -days 825 -sha256 -extfile utils/ssl.conf &>/dev/null # Cleanup files rm servorCA.pem servorCA.srl