From 7c3f2230f7b88e91f24c90f5ea980e5cdb96df1f Mon Sep 17 00:00:00 2001
From: bax1489 <fabian.gallenkamp@uni-hamburg.de>
Date: Thu, 26 Sep 2019 12:57:08 +0200
Subject: [PATCH] Fixed typo

---
 README.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/README.md b/README.md
index 5be8589..60627da 100644
--- a/README.md
+++ b/README.md
@@ -9,9 +9,9 @@
 4. Verify your ``certrequest.pem`` with ``openssl req -in certrequest.pem -text``
 5. Make a request with the certificate request file at your responsible office.
 6. Unencrypt your private key with: ``openssl rsa -in domain.key.pem.enc -out domain.key.pem``.
-7. Move your unencrypted private key file with ``sudo mv /opt/otree/temp/private-key.pem /etc/ssh/private/domain.key.pem.enc``. (Note: Verify permissions! 0600)
+7. Move your unencrypted private key file with ``sudo mv /opt/otree/temp/private-key.pem /etc/ssl/private/domain.key.pem.enc``. (Note: Verify permissions! 0600)
 8. Upload the obtained certificate and the certificate chain onto your server into ``/opt/otree/temp`` and append the chain (PA-Cert) to the certificate with ``cat pa-chain.pem >> cert-myserver.pem``.
-9. Lastly move the certificate to the correct location: ``sudo mv /opt/tree/temp/cert-myserver.pem /etc/ssh/certs/domain.crt.pem`` (Note: Verify permissions! 0644)
+9. Lastly move the certificate to the correct location: ``sudo mv /opt/tree/temp/cert-myserver.pem /etc/ssl/certs/domain.crt.pem`` (Note: Verify permissions! 0644)
 
 ### place ssl/tls certificate and key-file (unfortunately not scriptable due to security best-practices)
 1. Use ``scp mycert.crt user@host:/home/user/`` and ``scp mycert.key user@host:/home/user/`` or use [WinSCP](https://de.wikipedia.org/wiki/WinSCP) to copy over the certificate files.
-- 
GitLab