Operation Manual

is established. Data integrity is ensured and client and server are able to authenticate
each other.
For this purpose, the server sends an SSL certicate that holds information proving the
server's valid identity before any request to a URL is answered. In turn, this guarantees
that the server is the uniquely correct end point for the communication. Additionally,
the certicate generates an encrypted connection between client and server that can
transport information without the risk of exposing sensitive, plain-text content.
mod_ssl does not implement the SSL/TSL protocols itself, but acts as an interface
between Apache and an SSL library. In openSUSE, the OpenSSL library is used.
OpenSSL is automatically installed with Apache.
The most visible effect of using mod_ssl with Apache is that URLs are prexed with
https:// instead of http://.
TIP: Example Certicate
An example certicate for a hypothetical company “Snake Oil” is available when
installing the package apache2-example-certificates.
30.6.1 Creating an SSL Certicate
In order to use SSL/TSL with the Web server, you need to create an SSL certicate.
This certicate is needed for the authorization between Web server and client, so that
each party can clearly identify the other party. To ensure the integrity of the certicate,
it must be signed by a party every user trusts.
There are three types of certicates you can create: a “dummy” certicate for testing
purposes only, a self-signed certicate for a dened circle of users that trust you, and
a certicate signed by an independent, publicly-known certicate authority (CA).
Creating a certicate is basically a two step process. First, a private key for the certicate
authority is generated then the server certicate is signed with this key.
522 Reference