From 46f132a3d5b3a6bebb8479168593e288032e85c5 Mon Sep 17 00:00:00 2001 From: kurokobo <2920259+kurokobo@users.noreply.github.com> Date: Tue, 26 Sep 2023 20:44:00 +0900 Subject: [PATCH] docs: correct openssl command --- tips/trust-custom-ca.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tips/trust-custom-ca.md b/tips/trust-custom-ca.md index cb89ca8..2f23a25 100644 --- a/tips/trust-custom-ca.md +++ b/tips/trust-custom-ca.md @@ -154,7 +154,7 @@ First of all, you should ensure your CA certificate is mounted and has PEM forma bash-5.1$ openssl x509 -in /etc/openldap/certs/ldap-ca.crt -text # The secret bundle_cacert_secret is mounted as /etc/pki/ca-trust/source/anchors/bundle-ca.crt -bash-5.1$ openssl x509 -in /etc/pki/ca-trust/source/anchors/bundle-ca.crt +bash-5.1$ openssl x509 -in /etc/pki/ca-trust/source/anchors/bundle-ca.crt -text ``` Note that your certificate file should contain both intermediate CA and root CA, if your server certificate is signed by intermediate CA. @@ -178,7 +178,7 @@ Now you can test SSL connection. ```bash # This is an example to test connection to LDAP server over SSL using /etc/openldap/certs/ldap-ca.crt -bash-5.1$ openssl s_client -connect ldap.example.com:636 -no-CAfile -CAfile /etc/openldap/certs/ldap-ca.crt +bash-5.1$ echo | openssl s_client -connect ldap.example.com:636 -no-CAfile -CAfile /etc/openldap/certs/ldap-ca.crt CONNECTED(00000003) depth=2 C = JP, ST = Example State, O = EXAMPLE.COM, CN = rca.example.com verify return:1