(Connect to the Sendmail network, and ensure security (on) 5. Configure STARTTLS1. generate an authority[Root @ mail ~] # Cd/etc/pki/[Root @ mail pki] # vim tls/openssl. cnf[Root @ mail CA] # pwd/Etc/pki/CA[Root @ mail CA] # mkdir crl certs newcerts[Root @ mail CA] # touch index.txt serial[Root @ mail CA] # echo "01"> serial[Root @ mail CA] # openssl genrsa 1024> private/cakey. pemGenerating RSA private key, 1024 bit long modulus......................
Service, manually turn on registryUpload again[email protected] docker]# Docker push 192.168.122.1:5000/nginxClose and deletesecond, generate self-signed certificateGenerate a self-signed certificate on the server host, create a folder to hold the certificate[Email protected] docker]# pwd/tmp/docker[Email protected] docker]#mkdir certs[Email protected] docker]#OpenSSL req-newkey rsa:4096-nodes-sha256-keyout certs
the introductions on the Internet are incomplete and not fully operable.I currently know about the following types of certificates:1. keytoolCannot create CA certificate2. createcert.exe from Sybase ASAIt seems that you cannot create a PKCS12 Certificate3. OpenSSLThe most powerful function.Therefore, only OpenSSL is introduced here.After installing the OpenSSL-Win32 to d: \ tools, modify the configuration file d: \ tools \ OpenSSL-Win32 \ bin \ openssl. cfgFind:[CA_default]Dir = $ ENV: OPENSSL_
certificate is/etc/pki/CA, store the certificate-related information of the intermediate CA in your own directory. To reflect the transfer logic of the trust chain, you can create a directory under/etc/pki/CA, assume that the certificate directory of the intermediate CA is/etc/pki/CA/intermediate /.
The process of initializing the certificate directory is no different from that when the Root CA is created:
# mkdir /etc/pki/CA/intermediate # cd /etc/pki/CA/intermediate # mkdir
. In this case, we can use the write list field to implement this ~For example, the company Samba server has a shared directory tech. The company requires that only the boss account and the tech group account have full control, and others have only read-only permissions. If only the writable field is used, the instance's requirements cannot be met, because when writable = Yes, all users can write data. When
Docker starts the listening port, uses HTTP, and can remotely manage the Docker host.Such a scenario has drawbacks, the API level is not provide user authentication, Token, such as authentication, anyone can use the address plus port to control Docker host, in order to avoid such a situation, Docker official support HTTPS, but we need to generate certificates ourselves.
The OpenSSL command is used to generate CA certificates, server private keys, client certificates, signatures, and OpenSSL com
Enable uploading of images to the native repository via SSL on the warehouse host nativelyServer side:1. Generate a Certificate[Email protected]:~$ sudo openssl req-x509-nodes-days 365-subj '/cn= ' test.registry.com '-newkey rsa:4096-keyout cer Ts/domain.key-out certs/domain.crt #把证书生成到certs目录下, generate a test.registry.com domain name certificate2. Start the container[Email protected]:~$ Docker run-d-P 500
LocalityName_default = Zhengzhou
O. organizationName_default = MageEdu
OrganizationalUnitName_default = Tech
###### The default information can be customized as needed
3. Generate a self-signed certificate 4. Prepare a directory and documents for the certificate
[Root @ localhost CA] # mkdir certs crl newcerts
[Root @ localhost CA] # touch index.txt
[Root @ localhost CA] # echo 01> serial
5. Ins
GuideLike many linuxjournal readers, I have also lived in today's very popular "tech nomads" life, between networks, from one access point to another, where we are in different parts of the real world and remain connected to the Internet and other networks we use on a daily basis. Recently I have found that more and more network environments are starting to block common ports such as SMTP (port), SSH (Port 22), and so on. When you walk into a café and
Requirements:1. Establish a HTTPD server that requires:provides two name-based virtual hosts:(a) www1.stuX.com, page file directory is/web/vhosts/www1; error logFor/var/log/httpd/www1.err, the access log is/var/log/httpd/www1.access(b) www2.stuX.com, page file directory is/web/vhosts/www2; error logFor/var/log/httpd/www2.err, the access log is/var/log/httpd/www2.access(c) Establish their own home page file/index.html for two virtual hosts, respectively, with their respective host names(d) Output
Remote]type = Imapremotehost = $dav _mail_serverremoteport = 1143remo Teuser = $your _account, no @remotepass = $your _pwdssl = Falsesslcacertfile =/etc/ssl/certs/ Ca-certificates.crtmaxconnections = 1realdelete = noAttention:1. The company mailbox in the custom directory preferably no Chinese name, or bad luck will be error2. To create a local directory ~/mail3. Maxcoinnections can only be set to 1, more than 1 I have encountered an error, can only
1, the first configuration nginx and other plug-ins, this Google, a lot of configuration options.2. Configure the server's certificate. The procedure is as follows:[Email protected] ~]# cd/etc/pki/tls/certs [[email protected] certs]# MakeServer.key umask the ; /usr/bin/openssl genrsa-aes1282048>server.keygenerating RSA private key,2048BitLongModulus ..... ..... ..... ..... ... .. ................-.....-....
1. Environment
1) Ubuntu14.04
2) Docker 1.12.0
2, in the Ubuntu14.04 virtual machine installed Docker 1.12.0, this experiment to create two virtual machines, The IP is 192.168.110.137 and 192.168.110.138, where 192.168.110.138 's hostname is ip-192-168-110-138.ec2.internal, and the hosts in 192.168.110.138 The following records are added to this
192.168.110.138 ip-192-168-110-138 ip-192-168-110-138.ec2.internal
3. Environment configuration
1) Configuration of 192.168.110.138
Add the followin
delete permissions3. ACL policiesGetfacl file view ACL policySetfacl[options] u: User name: Permissions fileSetfacl[option] G: Group name: Permission file- m defines an ACL policy- x deletes the specified ACL policy- b clears all ACL policies that have been set- R recursive settings- D Set default permissions for the directoryI. Basic authority and attributionThe company's technical department has a Linux development server, according to the composition of the project team within the Dep
belongs to insecure in the official eyes of Docker, but this is just a self-signed certificate to illustrate the deployment steps of secure registry.
1, the production of self-signed certificate
If you have a certificate signed by a well-known CA, this step can be ignored directly.
$ openssl req -newkey rsa:2048 -nodes -sha256 -keyout certs/domain.key -x509 -days 365 -out certs/domain.crtGenerating a 2048
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.