Sendmail 8.13.3 Securing Mailing Solution

writing new private key to
'./demoCA/private/cakey.pem'
Enter PEM pass phrase:
Enter the passphrase.
NOTE: Select a unique passphrase so that no one can abuse your CA and sign
a certificate.
The following message displays:
Verifying - Enter PEM pass phrase:
Enter the passphrase again.
The following message displays:
You are about to be asked to enter information
that will be incorporated into your certificate request.
Enter the organization name, location, and your name.
After you answer the questions prompted by the ./CA.pl newca command,
the following files are created:
The ./demoCA/cacert.pem file. This is the CA certificate file that you
can exchange with communication partners for TLS authentication or
verification.
The ./demoCA/private/cakey.pem file. This is the private key file of
the CA and is passphrase-protected. You can use this private key to sign
or revoke certificates.
NOTE: Do not exchange the private key file with communication partners.
b. To generate the certificate and the key pair for the Sendmail 8.13.3 server, enter
the following command:
$ ./CA.pl newreq
The following output displays:
Generating a 1024 bit RSA private key...
+++++..........................++++++
writing new private key to 'newkey.pem'
-----
You are about to be asked to enter information that will
be incorporatedinto your certificate request.
What you are about to enter is what is called a
Distinguished Name or a DN.
There are quite a few fields but you can leave
some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
Enter the your organization name, location, and name.
16