当前位置: 首页 > news >正文

网站目录做301招聘类网站该怎么做

网站目录做301,招聘类网站该怎么做,网络营销是什么?,石岩小学网站建设当使用ssl/tls进行加密通信时,必须要有数字证书。若通信只限制在局域网内,可以不向第三方机构申请签发证书,可以通过openssl模拟CA(Certificate Authority),并通过该CA签发证书。下文讲述在Centos7.3上使用openssl工具签发证书的具…

当使用ssl/tls进行加密通信时,必须要有数字证书。若通信只限制在局域网内,可以不向第三方机构申请签发证书,可以通过openssl模拟CA(Certificate Authority),并通过该CA签发证书。下文讲述在Centos7.3上使用openssl工具签发证书的具体步骤。

1 生成模拟CA

1.1 修改配置文件/etc/pki/tls/openssl.cnf

打开openssl的配置文件/etc/pki/tls/openssl.cnf,修改CA机构的默认信息,具体修改内容如下

[ req_distinguished_name ]
countryName         = Country Name (2 letter code)
countryName_default     = CN
countryName_min         = 2
countryName_max         = 2stateOrProvinceName     = State or Province Name (full name)
stateOrProvinceName_default = JangSulocalityName            = Locality Name (eg, city)
localityName_default        = NanJing0.organizationName      = Organization Name (eg, company)
0.organizationName_default  = ZTE# we can do this but it is not needed normally :-)
#1.organizationName     = Second Organization Name (eg, company)
#1.organizationName_default = World Wide Web Pty LtdorganizationalUnitName      = Organizational Unit Name (eg, section)
organizationalUnitName_default  = TechcommonName          = Common Name (eg, your name or your server\'s hostname)
commonName_max          = 64emailAddress            = Email Address
emailAddress_max        = 64
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27

配置项说明:

  • countryName_default 默认的国家名称简写,这里配置为CN;
  • stateOrProvinceName_default,默认的省份名,这里配置为JangS;
  • localityName_default,默认的城市名称,这里配置为NanJing;
  • 0.organizationName_default,默认的组织名称,这里配置为ZTE;
  • organizationalUnitName_default,默认的部门名称,这里配置为Tech;

1.2 生成CA自签证书

生成CA的私钥

(umask 077; openssl genrsa -out private/cakey.pem 2048)
  • 1
[root@localhost CA]# pwd
/etc/pki/CA[root@localhost CA]# (umask 077; openssl genrsa -out private/cakey.pem 2048)
Generating RSA private key, 2048 bit long modulus
.......................................................................................................+++
..........+++
e is 65537 (0x10001)
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

生成自签证书

openssl req -new -x509 -key private/cakey.pem -out cacert.pem 
  • 1
[root@localhost CA]# openssl req -new -x509 -key private/cakey.pem -out cacert.pem 
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [CN]:
State or Province Name (full name) [JangSu]:
Locality Name (eg, city) [NanJing]:
Organization Name (eg, company) [ZTE]:
Organizational Unit Name (eg, section) [Tech]:
Common Name (eg, your name or your server's hostname) []:ca.xiaojie.com
Email Address []:xiaojie@163.com[root@localhost CA]# ls private
cacert.pem  cakey.pem
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • cakey.pem为CA的私钥;
  • cacert.pem为CA的自签证书;

查看签发证书中的内容

openssl x509 -text -in cacert.pem 
  • 1
[root@localhost CA]# openssl x509 -text -in cacert.pem 
Certificate:
Data:Version: 3 (0x2)Serial Number: 13441978108521887108 (0xba8b7fdefd063584)
Signature Algorithm: sha256WithRSAEncryptionIssuer: C=CN, ST=JS, L=NanJing, O=ZTE, OU=Tech, CN=ca.xiaojie.com/emailAddress=caxiaojie@163.comValidityNot Before: Jun  2 03:30:22 2018 GMTNot After : Jun  2 03:30:22 2019 GMTSubject: C=CN, ST=JS, L=NanJing, O=Ztesoft, OU=Tech, CN=ca.xiaojie.com/emailAddress=caxiaojie@163.comSubject Public Key Info:Public Key Algorithm: rsaEncryptionPublic-Key: (1024 bit)Modulus:00:d2:ce:94:8e:26:52:bd:6e:7d:54:31:02:20:57:01:81:1b:fc:24:3b:b1:e8:f1:4c:5d:e2:49:d8:5f:5c:5e:02:89:76:29:f5:8d:33:17:98:06:80:06:ee:37:dd:87:47:0d:f1:56:f0:cb:5e:5a:30:dc:31:46:5a:cb:74:4c:76:8c:58:0b:bd:85:ff:15:16:67:64:99:dd:53:3b:d0:6b:23:e3:35:3d:56:4a:ea:5d:89:ab:f3:dc:75:ee:b6:5e:71:c6:f9:f6:ae:53:72:ba:41:b4:06:0d:4f:80:1c:83:ab:5b:68:4f:78:eb:aa:c0:f2:af:c4:b5:ac:f2:e8:f5Exponent: 65537 (0x10001)X509v3 extensions:X509v3 Subject Key Identifier: 3E:E1:CC:F3:0D:53:2C:E3:DC:42:16:1D:DF:7B:A6:64:0F:E7:85:0BX509v3 Authority Key Identifier: keyid:3E:E1:CC:F3:0D:53:2C:E3:DC:42:16:1D:DF:7B:A6:64:0F:E7:85:0BX509v3 Basic Constraints: CA:TRUE
Signature Algorithm: sha256WithRSAEncryptionbe:5a:44:22:98:bb:cc:8a:15:32:ef:7c:ef:cb:2d:0f:6e:95:42:f4:1f:54:23:40:02:63:7e:52:e3:97:2d:e2:77:fb:20:3b:b3:b4:9f:b5:d7:01:05:5f:c2:9d:a9:2d:e8:93:48:33:ed:4c:8a:3c:e2:a0:f1:d3:9e:b0:37:af:4a:75:aa:4a:42:3c:4e:a6:c7:07:dc:98:75:84:3a:fe:8a:65:ab:4b:39:29:02:57:5b:30:eb:1f:26:13:cc:65:39:65:83:47:cc:e6:da:89:9d:61:3c:57:65:66:1d:c6:06:cb:b5:da:ae:4c:22:d0:f0:4d:ed:4c:4e:f9:ea:d8
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42

创建公共目录

[root@localhost CA]# mkdir certs  crl  newcerts  private
[root@localhost CA]# touch index.txt
[root@localhost CA]# touch serial
[root@localhost CA]# echo 01 > serial
[root@localhost CA]# ls
certs  crl  index.txt  newcerts  private  serial
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • private,CA的私钥;
  • newcerts, 保存CA新签发的证书;
  • crl , 被吊销的证书列表;
  • index.txt,保存签发的证书信息;
  • serial,保存证书签发的序列号;

2. 机构A请求CA签发证书

生成机构A的私钥

(umask 077; openssl genrsa -out httpd.key 1024)
  • 1

生成证书签发请求

openssl req -new -key httpd.key -out httpd.csr
  • 1
[root@localhost ssl]# openssl req -new -key httpd.key -out httpd.csr
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [CN]:
State or Province Name (full name) [JangSu]:
Locality Name (eg, city) [NanJing]:
Organization Name (eg, company) [ZTE]:
Organizational Unit Name (eg, section) [Tech]:
Common Name (eg, your name or your server's hostname) []:www.xiaojie.com
Email Address []:xiaojie@123.comPlease enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
[root@localhost ssl]# ls
httpd.csr  httpd.key
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22

将httpd.csr发送给CA,CA根据httpd.csr签发证书

openssl ca -in httpd.csr -out httpd.crt -days 365
  • 1
  • -in,指定证书签发请求文件;
  • -out, 指定生成的证书文件;
  • -days, 指定证书的有效期;
[root@localhost ssl]# openssl ca -in httpd.csr -out httpd.crt -days 365
Using configuration from /etc/pki/tls/openssl.cnf
Check that the request matches the signature
Signature ok
Certificate Details:Serial Number: 1 (0x1)ValidityNot Before: Jun  2 04:07:48 2018 GMTNot After : Jun  2 04:07:48 2019 GMTSubject:countryName               = CNstateOrProvinceName       = JangSuorganizationName          = ZtesoftorganizationalUnitName    = TechcommonName                = www.xiaojie.comemailAddress              = xiaojie@123.comX509v3 extensions:X509v3 Basic Constraints: CA:FALSENetscape Comment: OpenSSL Generated CertificateX509v3 Subject Key Identifier: 3F:8F:5F:80:F1:C4:77:0A:2E:4D:9C:75:16:FC:8B:6E:77:EF:6A:35X509v3 Authority Key Identifier: keyid:75:D5:93:C0:53:3F:B1:DE:90:E0:9A:CC:92:BE:EF:F0:38:F4:20:C8Certificate is to be certified until Jun  2 04:07:48 2019 GMT (365 days)
Sign the certificate? [y/n]:y1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33

httpd.crt 就是签发的证书,可以直接使用httpd.crt证书了。

3. 在httpd中使用证书

安装mod_ssl模块

yum install mod_ssl
  • 1

配置/etc/httpd/conf.d/ssl.conf

  • 修改DocumentRoot ,DocumentRoot “/work/www/html”【网站的目录】;
  • 修改ServerName, ServerName www.YOUR_DOMAIN:443【域名+443端口】;
  • 配置SSLCertificateFile ,即CA证书文件httpd.crt,SSLCertificateFile /etc/ssl/certs/httpd.crt;
  • 配置SSLCertificateKeyFile, 即私钥文件httpd.key, SSLCertificateKeyFile /etc/ssl/private/httpd.key;
  • 配置 SSLCertificateChainFile,证书信任链,也就是根证书, 这里配置的就是CA的证书。SSLCertificateChainFile /etc/ssl/certs/cacert.pem;

参考

  • Centos7.3 使httpd支持https
  • 对称加密、单向加密和非对称加密
http://www.yayakq.cn/news/268291/

相关文章:

  • 博客建站程序wordpress建站百科
  • 大型网站建设地址网站建设哪个公司好
  • 集团网站群建设方案营销型网站建设设计6
  • 网站备案授权码长春市城乡建设部网站
  • 做网站的用多少钱帝国cms做企业网站
  • 学校网站如何做3d建模软件免费下载
  • 贵州省住房与城乡建设厅门户网站做网站一年能赚多少钱
  • 调用别人网站的数据库自己做网站赚钱案例
  • 购物网站建设公司网站建设j基本步骤
  • 周至做网站的公司三台县城乡建设网网站
  • 网站的空间什么意思自主研发app大概要多少钱
  • 网站模板素材下载什么是网络营销?网络营销的目的有哪些内容?
  • 网站哪家公司好网页设计与网站建设是干嘛的
  • 建设企业网站e路护航热门行业排行榜
  • 深圳市西特塔网站建设工作室网站开发人员的水平
  • 北京企业网站模板建站开发如何自己搭建微信小程序
  • 做电子商务网站的总结网站建网站
  • 如何建设好企业的网站维护动漫制作专业认识
  • 无锡网站推广经理给个网站免费的
  • 开鲁网站seo站长工具鞍山网站建设公司
  • 网站域名费怎么查询展厅设计案例100例
  • 免费做长图网站深圳有几个区哪个区最富裕
  • wap 2.0的网站做影视网站怎么
  • 相机网站建设规划书网站违规关键词
  • 建立个人网站流程深圳比较好的建站公司
  • 在线设计网站免费公众号版面设计创意
  • 缙云 网站建设比较好的搜索引擎
  • 网站页面效果图怎么做的新媒体营销的概念是什么
  • 多语言网站怎么实现网站开发php岗位职责
  • 苏州互联网企业排名湛江市企业网站seo点击软件