WU-FTPD 2.6.1 release notes (July 2010)

Verifying - Enter PEM pass phrase:
Enter the passphrase again.
The following message is displayed:
You are about to be asked to enter information
that will be incorporated into your certificate request.
Enter the organization name, location, and your name.
After you answer the questions prompted by the ./CA.pl newca command,
the following files are created:
The ./demoCA/cacert.pem file. This is the CA certificate file you can
exchange with communication partners for TLS authentication or
verification.
The ./demoCA/private/cakey.pem file. This is the private key file of
the CA and is passphrase-protected. You can use this private key to sign
or revoke certificates.
NOTE: Do not exchange the private key file with communication partners.
b. Generate the certificate and the key pair for the FTP server:
$ ./CA.pl newreq
The following output is displayed:
Generating a 1024 bit RSA private key...
+++++..........................++++++
writing new private key to 'newkey.pem'
-----
You are about to be asked to enter information that will
be incorporatedinto your certificate request.
What you are about to enter is what is called a
Distinguished Name or a DN.
There are quite a few fields but you can leave
some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
Enter your organization name, location, and name.
The ./CA.pl newreq command creates the following files:
The private key of the FTP server (./newkey.pem)
The original (unsigned) certificate request (./newreq.pem)
c. Certificate using the CA created in Step a:
$ CA.pl sign
A signed public certificate, ./newcert.pem (with its public key), is created
for the FTP server.
16 WU-FTPD 2.6.1 Release Notes