#!/bin/bash # Script Name: cert_ecdsa_server.sh # Author: GJS (homelab-alpha) # Date: 2025-02-20T16:09:00+01:00 # Version: 2.5.3 # Description: # This script automates the creation of an ECDSA server certificate. It # generates the private key, creates a Certificate Signing Request (CSR), # and issues the final certificate. The script also creates an extension # file for certificate attributes, bundles the certificate with an # intermediate CA chain, and performs several verification steps. It also # prepares a certificate bundle for use with HAProxy and converts the # certificate into multiple formats for various applications. # Usage: ./cert_ecdsa_server.sh # Notes: # - Requires OpenSSL to be installed on the system. # - Certificates will be stored in directories under the HOME/ssl folder. # - The script will prompt for the Fully Qualified Domain Name (FQDN) and # IPv4 address of the certificate. # Stop script on error set -e # Function to print text in cyan color print_cyan() { echo -e "\e[36m$1\e[0m" } # Function to generate a random hex value generate_random_hex() { openssl rand -hex 16 || return 1 } # Function to print section headers. print_section_header() { echo print_cyan "=== $1 ===" } # Function to check command success check_success() { if [ $? -ne 0 ]; then echo "[ERROR] $1" >&2 exit 1 fi } # Certificate information read -r -p "$(print_cyan "Enter the FQDN name of the new certificate: ")" fqdn read -r -p "$(print_cyan "Enter the IPv4 address of the new certificate (syntax: , IP:192.168.x.x): ")" ipv4 # Define directory paths print_section_header "Define directory paths" base_dir="$HOME/ssl" certs_dir="$base_dir/certs" csr_dir="$base_dir/csr" extfile_dir="$base_dir/extfiles" private_dir="$base_dir/private" db_dir="$base_dir/db" openssl_conf_dir="$base_dir/openssl.cnf" # Set directories for various components certs_intermediate_dir="$certs_dir/intermediate" certs_certificates_dir="$certs_dir/certificates" private_certificates_dir="$private_dir/certificates" # Renew db numbers (serial and CRL) print_section_header "Renew db numbers (serial and CRL)" for type in "serial" "crlnumber"; do for dir in $db_dir; do generate_random_hex >"$dir/$type" || check_success "Failed to generate $type for $dir" done done # Check if unique_subject is enabled and if CN exists unique_subject="no" if grep -q "^unique_subject\s*=\s*yes" "$db_dir/index.txt.attr" 2>/dev/null; then unique_subject="yes" fi cn_exists=false if grep -q "CN=${fqdn}" "$db_dir/index.txt" 2>/dev/null; then cn_exists=true fi # If unique_subject is enabled and Certificate exists, display an error and exit if [[ "$unique_subject" == "yes" && "$cn_exists" == "true" ]]; then echo "[ERROR] unique_subject is enabled and CSR with Common Name ${fqdn} already exists in index.txt" >&2 exit 1 fi # Generate ECDSA key print_section_header "Generate ECDSA key" openssl ecparam -name secp384r1 -genkey -out "$private_certificates_dir/${fqdn}.pem" check_success "Failed to generate ECDSA key" # Generate Certificate Signing Request (CSR) print_section_header "Generate Certificate Signing Request" openssl req -new -sha384 -config "$openssl_conf_dir/cert.cnf" -key "$private_certificates_dir/${fqdn}.pem" -out "$csr_dir/${fqdn}.pem" check_success "Failed to generate Certificate Signing Request" # Create an extfile with all the alternative names print_section_header "Create an extfile with all the alternative names" { echo "subjectAltName = DNS:${fqdn}, DNS:www.${fqdn}${ipv4}" echo "basicConstraints = critical, CA:FALSE" echo "keyUsage = critical, digitalSignature" echo "extendedKeyUsage = serverAuth" echo "nsCertType = server" echo "nsComment = OpenSSL Generated Server Certificate" } >"$extfile_dir/${fqdn}.cnf" # Generate Certificate print_section_header "Generate Certificate" openssl ca -config "$openssl_conf_dir/cert.cnf" -notext -batch -in "$csr_dir/${fqdn}.pem" -out "$certs_certificates_dir/${fqdn}.pem" -extfile "$extfile_dir/${fqdn}.cnf" check_success "Failed to generate Certificate" # Create Certificate Chain Bundle print_section_header "Create Certificate Chain Bundle" cat "$certs_certificates_dir/${fqdn}.pem" "$certs_intermediate_dir/ca_chain_bundle.pem" >"$certs_certificates_dir/${fqdn}_chain_bundle.pem" check_success "Failed to create Certificate Chain Bundle" # Create Certificate Chain Bundle for HAProxy print_section_header "Create Certificate Chain Bundle for HAProxy" cat "$certs_certificates_dir/${fqdn}_chain_bundle.pem" "$private_certificates_dir/${fqdn}.pem" >"$certs_certificates_dir/${fqdn}_haproxy.pem" chmod 600 "$certs_certificates_dir/${fqdn}_haproxy.pem" check_success "Failed to create Certificate Chain Bundle for HAProxy" # Perform certificate verifications print_section_header "Verify Certificates" verify_certificate() { openssl verify -CAfile "$1" "$2" check_success "Verification failed for $2" } # Perform certificate verifications verify_certificate "$certs_certificates_dir/${fqdn}_chain_bundle.pem" "$certs_certificates_dir/${fqdn}.pem" verify_certificate "$certs_intermediate_dir/ca_chain_bundle.pem" "$certs_certificates_dir/${fqdn}.pem" verify_certificate "$certs_intermediate_dir/ca_chain_bundle.pem" "$certs_certificates_dir/${fqdn}_chain_bundle.pem" verify_certificate "$certs_intermediate_dir/ca_chain_bundle.pem" "$certs_certificates_dir/${fqdn}_haproxy.pem" # Convert Certificate from .pem to .crt and .key print_section_header "Convert Certificate from .pem to .crt and .key" cp "$certs_certificates_dir/${fqdn}.pem" "$certs_certificates_dir/${fqdn}.crt" cp "$certs_certificates_dir/${fqdn}_chain_bundle.pem" "$certs_certificates_dir/${fqdn}_chain_bundle.crt" cp "$private_certificates_dir/${fqdn}.pem" "$private_certificates_dir/${fqdn}.key" chmod 600 "$private_certificates_dir/${fqdn}.key" echo print_cyan "--> ${fqdn}.crt" print_cyan "--> ${fqdn}_chain_bundle.crt" print_cyan "--> ${fqdn}.key" # Script completion message echo print_cyan "Certificate process successfully completed." exit 0