This time research operation and maintenance automation, the study to the SALT-API part encountered a lot of pits, here record, the front of the successive replenishment.1, the process of the topic, the beginning of steps:cd/etc/yum.repos.d/wgethttp://dl.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch.rpmrpm-ivhepel-release-6-8.noarch.rpmyum-yinstallkernel-firmwarekernel-headersperfe2fsprogsrpm-ivhlibyaml-0.1.3-1.4.el6.x86_64.rpmrpm-ivhPyYAML-3.10-3.1.el6.x86_64.rpmyum-yinstallsalt-m
modify
[Email protected] ca]# VIM/ETC/PKI/TLS/OPENSSL.CNFCountry Name_default = CNStateorprovincename_default = BeijingLocatityname_default = Shangdi0.organizationname_default = M19organizationunitname = Jishu
Generate a self-visa certificate (Root CA)
[email protected] ca]# OpenSSL req-new-x509/etc/pki/ca/private/cakey.pem-days 3650-out/etc/pki/ca/cacert.pemCommon name (eg, your name or your server ' s hostname) []:haizei.zou.com need to define its own host
modify
[Email protected] ca]# VIM/ETC/PKI/TLS/OPENSSL.CNFCountry Name_default = CNStateorprovincename_default = BeijingLocatityname_default = Shangdi0.organizationname_default = M19organizationunitname = Jishu
Generate a self-visa certificate (Root CA)
[email protected] ca]# OpenSSL req-new-x509/etc/pki/ca/private/cakey.pem-days 3650-out/etc/pki/ca/cacert.pemCommon name (eg, your name or your server ' s hostname) []:haizei.zou.com need to define its own host
Name (eg, city) [Default city]:beijingPrompt input: Organization Name (eg, company) [Default company ltd]:mageeduPrompt input: Organizational Unit Name (eg, section) []:opsPrompt input: Common name (eg, your name or your server ' s hostname) []:ca.magedu.comIf it is a personal communication for its own name, if the server is the server host name;Prompt input: Email Address []:[email protected]]# ls/etc/pki/ca/View the 3 directories that you want to have cer
First use the following file gitlab_run.sh to generate the Letsencrypt certificate.Source:Https://github.com/flasheryu/docker-letsencrypt-nginx-proxy-companion-examples#!/bin/bash# This example would run a basic nginx server provisionned with an index.htmlfile# Make sure to replace"site.example.com"With a public accessible domain poiting to the server you'll run this on.# this nginx container would get a Configur Ation generated by the Docker-gen instance and act as a reverse-ProxyEcho "starting
Charles Proxy, like Fiddler under Windows, can view HTTPS traffic, but when you check HTTPS requests using the CA certificate provided by Charles, the following error occurs on Firefox 35 Web page:Twitter.com uses a invalid security certificate. The certificate is not trusted because the issuer certificate has. (Error code:sec_error_expired_issuer_certificate)The reason is said to be this:
The more recent versions's Firefox only allow certs with star
Salt naturally also provides the API, the use of the API for Automation is very helpful, we use the rest-style API, of course, everyone knows that the salt is written by Python, then naturally provided the corresponding API, but not recommended, because the call Python API's program must be running on master, and this API is not friendly to Python31[Email protected] ~]#Yum InstallPyopenssl salt-Api–y2[Email protected] ~]# Salt-call--Local Tls.create_self_signed_cert3 Local:4Created Private Key:"
will be named by the certificate serial number.The following is a detailed example of certificate generation.Use OpenSSL to generate certificates in Linux1. First, we need to create a basic ca directory structure.Create the newcerts, cert, private, and CRL directories under the CA directory specified in the OpenSSL. CNF file. (The CA root directory specified here is/etc/SSL/democa)$ Sudo mkdir certs$ Sudo mkdir private$ Sudo mkdir CRL$ Sudo mkdir new
Use CA to sign the certificate and CA to sign the certificate
This article original from the http://blog.csdn.net/voipmaker reprint indicate the source.
This series of articles is divided into three parts. It mainly introduces how to build your own certificate issuing service, generate certificate requests, and sign the generated certificate request through the self-built CA and finally apply it to the service.
This article is the last one. In combination with the previous two articles, you
Build your own CA to sign the certificate and build a ca certificate
This article original from the http://blog.csdn.net/voipmaker reprint indicate the source.
This series of articles is divided into three parts: build your own certificate issuing service, generate a certificate request, and sign the generated certificate request through the self-built CA and finally apply it to the service,
This article describes how to use the CA Service in the previous article to sign the certificate.
Thi
) []:HeNan
Locality Name (eg, city) [Default City]:ZhengZhou
Organization Name (eg, company) [Default Company Ltd]:ZZU
Organizational Unit Name (eg, section) []:tec
Common Name (eg, your name or your server's
hostname
) []:rootca.net.org
Email Address []:
# mkdir -pv /etc/httpd/certs
# cd /etc/httpd/certs/
# openssl genrsa 1024 >httpd.key
Generating RSA private key, 1024 bit long modulus
.......+
encrypt the data sent to the server to complete the key exchange;(5) The service uses this key to encrypt the resource requested by the user, responding to the client;Iv. process of establishing a private CABoth the CA and the application certificate are on the same machine.1, CA-side operation processOperation Steps:1, generate the private key file;2, generate self-signed certificate;3. Related Supporting documentsTouch/etc/pki/ca/index.txtEcho01 >/etc/pki/ca/serialNote:(1) When the private ke
/ca/{certs,crl,newcerts}[[email protected] ~]# Touch/etc/pki/ca/{serial,ind Ex.txt}[[email protected] ~]# echo >/etc/pki/ca/serialTo use a certificate for secure communication with a server, you need to request a certificate from the CA:Step: (Take httpd as an example)(1) Use the certificate of the host to generate the private key;[Email protected] ~]# MKDIR/ETC/HTTPD/SSL [[email protected] ~]# Cd/etc/httpd/ssl[[email protected] ~]# (Umask 077; OpenSS
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.