When you are dealing with lots of different SSL Certificates, it is quite easy to forget which certificate goes with which Private Key.
Or, for example, which CSR has been generated using which Private Key.
From the Linux command line, you can easily check whether an SSL Certificate or a CSR match a Private Key using the OpenSSL utility.
To make sure that the files are compatible, you can print and compare the values of the SSL Certificate modulus, the Private Key modulus and the CSR modulus.
Cool Tip: Check the expiration date of the SSL Certificate from the Linux command line! The fastest way! Read more →
OpenSSL stores the modulus in the Private Key, as well as in the CSR and therefore in the SSL Certificate itself.
If you are using either the incorrect Private Key or the SSL Certificate – you will receive an error as follows: [error] Unable to configure RSA server Private Key [error] SSL Library Error: x509 certificate routines:X509_check_private_key:key values mismatch.
So if you got the similar error – it is time to check whatever your Private Key matches the SSL Certificate by comparing their modulus.
[Error] … key values mismatch: Your Private Key and SSL Certificate must contain the same modulus, otherwise the web-server won’t start.
Let’s print the values of the modulus of the Private Key, the SSL Certificate and the CSR with the conversion of them to md5 hashes to make the comparison more convenient.
Print the md5 hash of the SSL Certificate modulus:
$ openssl x509 -noout -modulus -in CERTIFICATE.crt | openssl md5
Print the md5 hash of the CSR modulus:
$ openssl req -noout -modulus -in CSR.csr | openssl md5
Print the md5 hash of the Private Key modulus:
$ openssl rsa -noout -modulus -in PRIVATEKEY.key | openssl md5
Cool Tip: Check the quality of your SSL certificate! Find out its Key length from the Linux command line! Read more →
If the md5 hashes are the same, then the files (SSL Certificate, Private Key and CSR) are compatible.
2 Replies to “OpenSSL: Check If Private Key Matches SSL Certificate & CSR”
What if private key is tpm key? So you have only pointer to that and have to setup openssl enginge? In this case you can’t just get private key printed.
If you have an elliptic curve key like me do this variation of the above:
openssl ec -in YOURDOMAIN.key -text
openssl x509 -in YOURDOMAIN.crt -text
Then eyeball the two public keys and make sure they match. Could also md5 them like above and there’s less data to eyeball.