apache+mod_ssl
hogeでログイン
cd ~hoge/src
fetch ftp://ftp.ring.gr.jp/pub/net/apache/dist/httpd/apache_1.3.27.tar.gz
fetch http://www.modssl.org/source/mod_ssl-2.8.12-1.3.27.tar.gz
su -

cd /usr/local/src
zcat ~hoge/src/apache_1.3.27.tar.gz | tar -xvf -
cd apache_1.3.27/
setenv OPTIM "-O3 -mpentiumpro -march=pentiumpro"
./configure --enable-module=so

cd /usr/local/src/
zcat ~hoge/src/mod_ssl-2.8.12-1.3.27.tar.gz | tar -xvf -
cd mod_ssl-2.8.12-1.3.27/
./configure --with-apache=../apache_1.3.27 --prefix=/usr/local/apache --enable-shared=ssl --with-ssl=/usr/local/ssl

cd /usr/local/src/apache_1.3.27
make

make certificate

ns# make certificate
SSL Certificate Generation Utility (mkcert.sh)
Copyright (c) 1998-2000 Ralf S. Engelschall, All Rights Reserved.

Generating test certificate signed by Snake Oil CA [TEST]
WARNING: Do not use this for real-life/production systems
______________________________________________________________________

STEP 0: Decide the signature algorithm used for certificate
The generated X.509 CA certificate can contain either
RSA or DSA based ingredients. Select the one you want to use.
Signature Algorithm ((R)SA or (D)SA) [R]:
______________________________________________________________________

STEP 1: Generating RSA private key (1024 bit) [server.key]
3696692 semi-random bytes loaded
Generating RSA private key, 1024 bit long modulus
................++++++
.........++++++
e is 65537 (0x10001)
______________________________________________________________________

STEP 2: Generating X.509 certificate signing request [server.csr]
Using configuration from .mkcert.cfg
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
1. Country Name             (2 letter code) [XY]:JP
2. State or Province Name   (full name)     [Snake Desert]:県
3. Locality Name            (eg, city)      [Snake Town]:市町村
4. Organization Name        (eg, company)   [Snake Oil, Ltd]:団体名
5. Organizational Unit Name (eg, section)   [Webserver Team]:ドメイン名
6. Common Name              (eg, FQDN)      [www.snakeoil.dom]:サーバー名
7. Email Address            (eg, name@FQDN) [[email protected]]:管理者メアド
8. Certificate Validity     (days)          [365]:
______________________________________________________________________

STEP 3: Generating X.509 certificate signed by Snake Oil CA [server.crt]
Certificate Version (1 or 3) [3]:
Signature ok
subject=/C=JP/ST=Tokyo/L=Taito-ku/O=linkup.bz/OU=linkup.bz/CN=www.linkup.bz/[email protected]
Getting CA Private Key
Verify: matching certificate & key modulus
read RSA key
Verify: matching certificate signature
../conf/ssl.crt/server.crt: /C=XY/ST=Snake Desert/L=Snake Town/O=Snake Oil, Ltd/OU=Certificate Authority/CN=Snake Oil CA
/[email protected]
error 10 at 1 depth lookup:certificate has expired
OK
______________________________________________________________________

STEP 4: Enrypting RSA private key with a pass phrase for security [server.key]
The contents of the server.key file (the generated private key) has to be
kept secret. So we strongly recommend you to encrypt the server.key file
with a Triple-DES cipher and a Pass Phrase.
Encrypt the private key now? [Y/n]:
read RSA key
writing RSA key
Enter PEM pass phrase: <----任意(あとで使うので忘れないように)
Verifying password - Enter PEM pass phrase: <----任意(あとで使うので忘れないように)
Fine, you're using an encrypted RSA private key.
______________________________________________________________________

RESULT: Server Certification Files

o  conf/ssl.key/server.key
   The PEM-encoded RSA private key file which you configure
   with the 'SSLCertificateKeyFile' directive (automatically done
   when you install via APACI). KEEP THIS FILE PRIVATE!

o  conf/ssl.crt/server.crt
   The PEM-encoded X.509 certificate file which you configure
   with the 'SSLCertificateFile' directive (automatically done
   when you install via APACI).

o  conf/ssl.csr/server.csr
   The PEM-encoded X.509 certificate signing request file which
   you can send to an official Certificate Authority (CA) in order
   to request a real server certificate (signed by this CA instead
   of our demonstration-only Snake Oil CA) which later can replace
   the conf/ssl.crt/server.crt file.

WARNING: Do not use this for real-life/production systems

make install
cd /usr/local/apache/conf/ssl.key/
cp -p server.key server.key.org
openssl rsa -in server.key.org -out server.key
read RSA key
Enter PEM pass phrase: <---上で入れた奴の任意
writing RSA key
chmod 400 server.key