understand a few concepts before doing a specific switching operation:Ssl/tslAbout SSL/TSL, Nanyi's two blog posts are a good introduction:
Overview of the operating mechanism of SSL/TLS protocol
Graphical SSL/TLS protocol
Simply put, SSL/TSL through four handshake, the main exchange of three information:
Digital Certificate : The certificate contains information such as the public key, which is usually sent to the client by the server, and the receiver verifies wheth
This article describes how to build a Web server certificate and personal digital certificate using the HTTPS feature of Tomcat, and a CA that you create yourself, and eventually build an HTTPS two-way authentication environment that can be used for testing purposes. The business process of building HTTPS two-way authentication in this article is as follows:1. Create a Web server public key key and generate a server certificate request.2. Use a self-b
installation and basic management of SQL Server database on server 2008r2 (i)Select the image file for the SQL database650) this.width=650; "src=" Https://s5.51cto.com/wyfs02/M01/95/CA/wKioL1kZqsSj1vpyAACWa-gx-YQ165.png "style=" float : none; "title=" 1.png "alt=" Wkiol1kzqssj1vpyaacwa-gx-yq165.png "/>Double-click Setup.ext to execute the Setup program650) this.width=650; "src=" https://s5.51cto.com/wyfs02/M02/95/
Original from: http://liujy1111.blog.163.com/blog/static/49739712008842372293/
However, I follow the steps above, the HTTPS service does not start, always prompts the certificate file does not exist or the format is illegal. It's been a long time, finally, here's a summary.
Environmental information:
Software Version Installation path
Tomcat apache-tomcat-7.0.11 d:/tomcat/apache-tomcat-7.0.11
OpenSSL OpenSSL 0.9.8k 2009 D:/openssl
JDK Jdk1.6.0_12 D:/program Files/java/jdk1.6.0_12
Description
Summarize the setup of OpenSSL and Tomcat HTTPSThe first part: First, look at the pointers of OpenSSL:Steps to create a certificate:(1) Generate private key(2) generate a certificate to be signed(3) Generate X509 certificate, sign with CA private key(4) P12 format certificate supported by the browserOne: Generate CA CertificateCa1. Create the private key:OpenSSL genrsa-out
First, prepare the environmentBuild platform: linux+apache-tomcat-7.0.35.tar.gzIi. Generating CA certificatesTo create a directory:#mkdir CA Client ServerCurrently does not use a third-party authoritative CA to authenticate itself as a CA role.2.1 Creating a private key#openssl Genrsa-out
not yet been created. The next step is to create these files
V. Creating a CA (Certificate authority)
This CA, also known as "Root certificate"
The server has made a certificate, but this is no legal effect, who can do their own certificates, it is not to achieve the goal of security. So there will be an organization responsible for confirming the identity of the server and then issuing a unified cer
, update, delete on *. * To EJBCA @ "%"
Identified by "123456"; // log on to any database on any machine.Grant all on EJBCA. * to admin @ localhost identified by "123456" with grant option
5. Go to the decompressed directory of EJBCA for execution.E: \ EJBCA> ant replaceds press ENTERBuildfile: Build. xml
Replaceds:[Input] type of database:
(Oracle, MSSQL, MySQL, ipvs, ipvs8, sapdb, HSQLDB, Sybase)MySQL press ENTER[Input] Data Source (default Java:/defaultds, recommended Java:/ejbcads ):Java:/ej
From: http://liujy1111.blog.163.com/blog/static/49739712008842372293/
However, when I follow the steps above, the HTTPS service will not start, and the certificate file will always be prompted that it does not exist or the format is invalid. After a long time, I finally got it done. Here I will summarize it.
Environment Information:
Software Version installation path
Tomcat APACHE-Tomcat-7.0.11 D:/tomcat/Apache-Tomcat-7.0.11
OpenSSL 0.9.8k 25 Mar 2009 D:/OpenSSL
JDK jdk1.6.0 _ 12 d:/program f
JDK1.7, tomcat 7.0.39, and openssl installation 0.9.8
Operating System win7
Command line:
1. Generate the CA private key and self-Signed root certificate
① Generate the CA private key
Openssl genrsa-out F: \ CA \ ca-key.pem 1024
② Generate the root certificate to be signed
Openssl req-new-x509-keyout F: \
From: http://blog.csdn.net/aking21alinjuju/article/details/7654097
I. Generate a CA certificate
Currently, the CA of a third-party authority is not used for authentication and serves as the CA.
Prerequisites: Download www.openssl.org from the OpenSSL official website to install OpenSSL [Windows and Linux are different]
Start generating certificates and keys
If no
After sorting out a Windows batch file, 8 steps are required.
Echo off REM reference: http://book.51cto.com/art/201004/192440.htm pushd "E: \ OpenSSL Certificate Management \" Echo. echo 1. creates a random number. rndopenssl rand-out. RND 1000: the meaning of each parameter is as follows: Rand random number command. :-Out output file path. Here, the random number file. RND is output to the current directory.: 1000 indicates the number of pseudo-random numbers. Echo. echo 2. build the root cert
After two days of configuration, I finally came up with it. In combination with many blog posts on the internet, I would like to summarize it!
Configuration environment:
Ubuntu 11.04
PCRE 8.31
OpenSSL 2.0.2
Nginx 1.2.5
To make sure that you can use regular expressions in nginx for more flexible configuration, You need to determine whether the PCRE (Perl Compatible Regular Expressions) package is installed in the system before installation. Can go to ftp://ftp.csx.cam.ac.uk/pub/software/programmi
Using OpenSSL generation under Windows | Procedures for CA certificatesOne: Generate CA CertificateCurrently does not use a third-party authoritative CA to authenticate itself as a CA role.Download a OpenSSL software online1. Create the private key:C:\openssl\bin>openssl Genrsa-out
Deploy a globally trusted PKI
John Morello's column contains prerelease information that may change.
The Public Key Infrastructure (or PKI) is a basic element for building trust between different applications, operating systems, and identity recognition fields. It is built on a hierarchical trust model. In this model, the final entity trusts the highest root level public key, so it implicitly trusts any other key signed by the root.
In view of this structure, it is easy to expand the well-desig
public key, which is usually sent to the client by the server, and the receiver verifies whether the certificate is trusted by a trusted CA or is relative to the local certificate, and if two-way authentication is required, Both the server and the client need to send a digital certificate to the other party for verification;
three random numbers : These three random numbers form the " conversation key "that is used to decrypt the data for symmetr
HTTPS provides secure web trafficPrinciple part: http://stlong.blog.51cto.com/5144113/17307711) Configure the domain name support CA:[Email protected] ~]# Vim/var/named/chroot/var/named/sggfu.com.zone # #添加ca主机记录CA in A 192.18.100.151: Wq[Email protected] ~]#/etc/init.d/named Restart # #重启服务[email protected] ~]# nslookup> Server 192.168.100.100Default server:192.
See if SSL is supported
First, execute the following command on MySQL to query whether MySQL supports SSL:
Mysql> show VARIABLES like ' Have_ssl ';
+---------------+-------+
| variable_name | Value |
+---------------+-------+
| Have_ssl | YES |
+---------------+-------+
1 row in Set (0.02 sec)
When Have_ssl is YES, it means that the MySQL service already supports SSL. If it is desable, you will need to enable the SSL feature when you start the MySQL service.
Using OpenSSL to c
See if SSL is supported
First, execute the following command on MySQL to query whether MySQL supports SSL:
Mysql> show VARIABLES like ' Have_ssl ';+---------------+-------+| variable_name | Value |+---------------+-------+| Have_ssl | YES |+---------------+-------+1 row in Set (0.02 sec)
When Have_ssl is YES, it means that the MySQL service already supports SSL. If it is desable, you will need to enable the SSL feature when you start the MySQL service.
using OpenSSL t
applying for a CA for a network device:
3.170 describes the process of applying for a certificate from a vro to a CA:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131227/063RWS0-0.png "title =" 1.png"/>
Step 1:First, you must configure a network device. For example, the vro supports CA, and router R1 generates a public/private key pair l
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.