-
-
Save kevinadi/96090f6f9973ff8c2d019bbe0d9a0f70 to your computer and use it in GitHub Desktop.
#!/bin/sh | |
# Generate self signed root CA cert | |
openssl req -nodes -x509 -newkey rsa:2048 -keyout ca.key -out ca.crt -subj "/C=AU/ST=NSW/L=Sydney/O=MongoDB/OU=root/CN=`hostname -f`/[email protected]" | |
# Generate server cert to be signed | |
openssl req -nodes -newkey rsa:2048 -keyout server.key -out server.csr -subj "/C=AU/ST=NSW/L=Sydney/O=MongoDB/OU=server/CN=`hostname -f`/[email protected]" | |
# Sign the server cert | |
openssl x509 -req -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt | |
# Create server PEM file | |
cat server.key server.crt > server.pem | |
# Generate client cert to be signed | |
openssl req -nodes -newkey rsa:2048 -keyout client.key -out client.csr -subj "/C=AU/ST=NSW/L=Sydney/O=MongoDB/OU=client/CN=`hostname -f`/[email protected]" | |
# Sign the client cert | |
openssl x509 -req -in client.csr -CA ca.crt -CAkey ca.key -CAserial ca.srl -out client.crt | |
# Create client PEM file | |
cat client.key client.crt > client.pem | |
# Create clientPFX file (for Java, C#, etc) | |
# openssl pkcs12 -inkey client.key -in client.crt -export -out client.pfx | |
# Start mongod with SSL | |
# mkdir -p data/db | |
# mongod --sslMode requireSSL --sslPEMKeyFile server.pem --sslCAFile ca.crt --dbpath data/db --logpath data/mongod.log --fork | |
# Connect to mongod with SSL | |
# mongo --ssl --sslCAFile ca.crt --sslPEMKeyFile client.pem --host `hostname -f` |
@MrMMorris yes it's supposed to be server.pem
. Thanks for noticing this. I have updated the gist.
do you need to create the client file from where you want the client to connect from (i.e., app server)? or does it need to be created on the mongod server itself and copied over to the app server? What is the proper way for remote clients to connect?
Also - how would this work for a replica set?
do you need to create the client file from where you want the client to connect from (i.e., app server)? or does it need to be created on the mongod server itself and copied over to the app server? What is the proper way for remote clients to connect?
Also - how would this work for a replica set?
It's up to you since this is for testing purposes only and the script only serves to illustrate how you can test MongoDB using SSL and how those mongod
parameters are used. I don't recommend using the certificates here for actual production deployment without consulting a security expert.
For replica set, it's a separate thing altogether. See Use x.509 Certificate for Membership Authentication.
BIG THANKS! you're the man!!!
Can we Implement this if we the client is having dynamic IP's? is it possible to create Certificate based on username instead of client machine IP?
or is there is any other solution to establish secure connection for client which have dynamic IP's?
where does the
cert.pem
come from in--sslPEMKeyFile cert.pem
? Is it supposed to beserver.pem
?