diff --git a/docs/sources/articles/certificates.md b/docs/sources/articles/certificates.md index ebd606f385..9c6e00fcb9 100644 --- a/docs/sources/articles/certificates.md +++ b/docs/sources/articles/certificates.md @@ -47,7 +47,7 @@ Our example is set up like this: You will use OpenSSL's `genrsa` and `req` commands to first generate an RSA key and then use the key to create the certificate. - $ openssl genrsa -out client.key 1024 + $ openssl genrsa -out client.key 4096 $ openssl req -new -x509 -text -key client.key -out client.cert > **Warning:**: diff --git a/docs/sources/articles/https.md b/docs/sources/articles/https.md index d6689bbf13..6a237eb3d5 100644 --- a/docs/sources/articles/https.md +++ b/docs/sources/articles/https.md @@ -31,10 +31,10 @@ it will only connect to servers with a certificate signed by that CA. First generate CA private and public keys: - $ openssl genrsa -aes256 -out ca-key.pem 2048 - Generating RSA private key, 2048 bit long modulus - ......+++ - ...............+++ + $ openssl genrsa -aes256 -out ca-key.pem 4096 + Generating RSA private key, 4096 bit long modulus + ............................................................................................................................................................................................++ + ........++ e is 65537 (0x10001) Enter pass phrase for ca-key.pem: Verifying - Enter pass phrase for ca-key.pem: @@ -62,12 +62,12 @@ name) matches the hostname you will use to connect to Docker: > **Note**: replace all instances of `$HOST` in the following example with the > DNS name of your Docker daemon's host. - $ openssl genrsa -out server-key.pem 2048 - Generating RSA private key, 2048 bit long modulus - ......................................................+++ - ............................................+++ + $ openssl genrsa -out server-key.pem 4096 + Generating RSA private key, 4096 bit long modulus + .....................................................................++ + .................................................................................................++ e is 65537 (0x10001) - $ openssl req -subj "/CN=$HOST" -new -key server-key.pem -out server.csr + $ openssl req -subj "/CN=$HOST" -sha256 -new -key server-key.pem -out server.csr Next, we're going to sign the public key with our CA: @@ -77,7 +77,7 @@ using `10.10.10.20` and `127.0.0.1`: $ echo subjectAltName = IP:10.10.10.20,IP:127.0.0.1 > extfile.cnf - $ openssl x509 -req -days 365 -in server.csr -CA ca.pem -CAkey ca-key.pem \ + $ openssl x509 -req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem \ -CAcreateserial -out server-cert.pem -extfile extfile.cnf Signature ok subject=/CN=your.host.com @@ -87,10 +87,10 @@ using `10.10.10.20` and `127.0.0.1`: For client authentication, create a client key and certificate signing request: - $ openssl genrsa -out key.pem 2048 - Generating RSA private key, 2048 bit long modulus - ...............................................+++ - ...............................................................+++ + $ openssl genrsa -out key.pem 4096 + Generating RSA private key, 4096 bit long modulus + .........................................................++ + ................++ e is 65537 (0x10001) $ openssl req -subj '/CN=client' -new -key key.pem -out client.csr @@ -101,7 +101,7 @@ config file: Now sign the public key: - $ openssl x509 -req -days 365 -in client.csr -CA ca.pem -CAkey ca-key.pem \ + $ openssl x509 -req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem \ -CAcreateserial -out cert.pem -extfile extfile.cnf Signature ok subject=/CN=client