bl双性强迫侵犯h_国产在线观看人成激情视频_蜜芽188_被诱拐的少孩全彩啪啪漫画

Apache配置SSL實(shí)現(xiàn)https訪問(wèn)

本次壞境:CA和apache為同一臺(tái)主機(jī)

創(chuàng)新互聯(lián)公司技術(shù)團(tuán)隊(duì)十余年來(lái)致力于為客戶提供成都網(wǎng)站建設(shè)、網(wǎng)站制作品牌網(wǎng)站設(shè)計(jì)成都全網(wǎng)營(yíng)銷、搜索引擎SEO優(yōu)化等服務(wù)。經(jīng)過(guò)多年發(fā)展,公司擁有經(jīng)驗(yàn)豐富的技術(shù)團(tuán)隊(duì),先后服務(wù)、推廣了成百上千家網(wǎng)站,包括各類中小企業(yè)、企事單位、高校等機(jī)構(gòu)單位。

先使本機(jī)作為CA服務(wù)端:

[root@localhost~]#yum -y install openssl openssl-devel

[root@localhost~]#vi /etc/pki/tls/openssl.cnf

[ CA_default ]

dir = ../../CA

改為:

[ CA_default ]

dir= /etc/pki/CA

為了減少不必要的重復(fù)操作,可以預(yù)先定義[ req_distinguished_name ]下面的一些內(nèi)容,自定義即可,具體的就不多說(shuō)了

:wq

[root@localhost~]#cd /etc/pki/CA 

[root@localhost CA]# mkdir certs newcerts crl

[root@localhost CA]# touch index.txt

[root@localhost CA]# echo 00 > serial

[root@localhost CA]# (umask 077; openssl genrsa -out private/cakey.pem 2048)  ##生成自簽密鑰

[root@localhost CA]# openssl req -new -x509 -key private/cakey.pem -out cacert.pem -days 3657  ##生成自簽證書

You are about to be asked to enter information that will be incorporated

into your certificate request.

What you are about to enter is what is called a Distinguished Name or a DN.

There are quite a few fields but you can leave some blank

For some fields there will be a default value,

If you enter '.', the field will be left blank.

-----

Country Name (2 letter code) [CN]:

State or Province Name (full name) [BJ]:

Locality Name (eg, city) [HaiDian]:

Organization Name (eg, company) [TEXT]:

Organizational Unit Name (eg, section) [DEV]:

Common Name (eg, your name or your server's hostname) []:ca.text.com

Email Address []:text@text.com

由于openssl.cnf里面定義了部分內(nèi)容,上面一直敲回車,直到Common Name (eg, your name or your server's hostname) []:  (此為CA服務(wù)名稱,可自定義)

最后一個(gè)郵箱也可自定義

都敲完后,我們的CA服務(wù)端就完成了,繼續(xù)往下做

Apache動(dòng)態(tài)編譯安裝:

[root@localhost CA]# tar -xf httpd-2.2.9.tar -C /usr/local/src/

[root@localhost CA]#cd /usr/local/src/httpd-2.2.9/

[root@localhost httpd-2.2.9]# ./configure --prefix=/usr/local/apache2 --sysconfdir=/etc/httpd --with-z=/usr/local/zlib/ --with-included-apr --enable-so --enable-mods-shared=most

[root@localhost httpd-2.2.9]#make;make install

Apache配置ssl:

[root@localhost CA]# rpm -qa |grep mod_ssl

[root@localhost CA]# yum -y install mod_ssl ##如沒(méi)有mod_ssl直接使用yum安裝即可

[root@localhost CA]# rpm -ql mod_ssl  ##查看mod_ssl生成的配置文件位置

[root@localhost CA]# cd /etc/httpd

[root@localhost httpd]# mkdir ssl

[root@localhost httpd]# cd ssl

[root@localhost ssl]# (umask 077; openssl genrsa -out httpd.key 2048)  ##生成密鑰

[root@localhost ssl]#openssl req -new -key httpd.key -out httpd.csr  ##生成證書簽署請(qǐng)求

You are about to be asked to enter information that will be incorporated

into your certificate request.

What you are about to enter is what is called a Distinguished Name or a DN.

There are quite a few fields but you can leave some blank

For some fields there will be a default value,

If you enter '.', the field will be left blank.

-----

Country Name (2 letter code) [CN]:

State or Province Name (full name) [BJ]:

Locality Name (eg, city) [HaiDian]:

Organization Name (eg, company) [TEXT]:

Organizational Unit Name (eg, section) [DEV]:

## 上面五條一定要和CA服務(wù)器設(shè)置一致,本次實(shí)驗(yàn)都是在一臺(tái)主機(jī)上,所以直接敲回車即可

Common Name (eg, your name or your server's hostname) []:text.bj.com  ##一定要是客戶端訪問(wèn)的地址,而不是上面CA設(shè)置的地址

Email Address []:httpd@text.com  ##自定義

[root@localhost ssl]#openssl ca -in httpd.csr -out httpd.crt -days 3657  ## ca簽署命令,敲兩次y和回車即可(由于都在一臺(tái)機(jī)器上,直接簽署就可以了,如果在不同機(jī)器上,把http的證書簽署請(qǐng)求文件拷貝到CA服務(wù)端簽署后拷貝回來(lái)就可以了)

[root@localhost ssl]#vi /etc/httpd/conf.d/ssl.conf

默認(rèn)443端口不變

查看下面兩句是否存在,不存在加上

AddType application/x-x509-ca-cert .crt

AddType application/x-pkcs7-crl .crl

<VirtualHost _ default_443>

改為:

<VirtualHost 192.168.1.99:443>  ##web服務(wù)器或web虛擬主機(jī)IP地址

添加下面兩句

ServerName text.bj.com  ##上面定義的地址

DocumentRoot "/var/www/html"  ##網(wǎng)站目錄位置,如設(shè)置的虛擬主機(jī),此位置需和apache配置文件里虛擬主機(jī)定義的位置一致

SSLEngine on  ##確保開(kāi)啟

SSLCertificateFile /etc/httpd/ssl/httpd.crt  ## 證書存放位置

SSLCertificateKeyFile /etc/httpd/ssl/httpd.key  ##密鑰存放位置

:wq

[root@localhost ssl]#echo text.bj.com > /var/www/html/index.html

[root@localhost ssl]#/etc/init.d/httpd start

[root@localhost ssl]#netstat –tnlp  ##查看443端口是否開(kāi)啟

訪問(wèn)https://text.bj.com  

提示“該網(wǎng)站的安全證書不受信任”

解決:

拷貝/etc/pki/CA/cacert.pem到客戶端上安裝即可(winPC后綴改為.crt后雙擊安裝)

文章名稱:Apache配置SSL實(shí)現(xiàn)https訪問(wèn)
文章網(wǎng)址:http://vcdvsql.cn/article10/ggppdo.html

成都網(wǎng)站建設(shè)公司_創(chuàng)新互聯(lián),為您提供手機(jī)網(wǎng)站建設(shè)服務(wù)器托管網(wǎng)站改版企業(yè)網(wǎng)站制作做網(wǎng)站標(biāo)簽優(yōu)化

廣告

聲明:本網(wǎng)站發(fā)布的內(nèi)容(圖片、視頻和文字)以用戶投稿、用戶轉(zhuǎn)載內(nèi)容為主,如果涉及侵權(quán)請(qǐng)盡快告知,我們將會(huì)在第一時(shí)間刪除。文章觀點(diǎn)不代表本網(wǎng)站立場(chǎng),如需處理請(qǐng)聯(lián)系客服。電話:028-86922220;郵箱:631063699@qq.com。內(nèi)容未經(jīng)允許不得轉(zhuǎn)載,或轉(zhuǎn)載時(shí)需注明來(lái)源: 創(chuàng)新互聯(lián)

成都網(wǎng)站建設(shè)公司