; ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP; ssl_prefer_server_ciphers on; location / { root /usr/share/nginx/html; index index.html index.htm; } }
The above is a simple configuration, and the following is the work of issuing certificates.
Issue certificate
Create the configuration file/etc/nginx/ca/conf/openssl. conf
[ ca ]default_ca = foo # The default ca section [ foo ]dir
belongs to insecure in the official eyes of Docker, but this is just a self-signed certificate to illustrate the deployment steps of secure registry.
1, the production of self-signed certificate
If you have a certificate signed by a well-known CA, this step can be ignored directly.
$ openssl req -newkey rsa:2048 -nodes -sha256 -keyout certs/domain.key -x509 -days 365 -out certs/domain.crtGenerating a 2048
template example can be used to generate reverse proxy configurations for docker containers. This template uses golang. The groupby template function is used to group running containers. groups are based on VIRTUAL_HOST environment variables. This method simplifies the traversal of containers to generate the server load balancer backend and supports deployment with zero downtime.
{Range
Containers: = groupBy "Env. VIRTUAL_HOST "}}Upstream {{
Host }}{
{Range
Value: = containers }}{
Address:
, region, organization, and email in sequence. # The most important thing is to have a common name, which can be your name or domain name. If you apply for https (do not use your own certificate, apply to CA), this must match the domain name; otherwise, a browser alarm will be triggered. After the generated csr file is signed by the CA, the server certificate sudo openssl req-new-key testcert is formed. key-out testcert. csr # generate keysudo openssl rsa-in testcert without a password. key-out
"Disableuploadtimeout= "true"enablelookups= "true"KeepAliveTimeout= "30000"Keystorefile= "D:\https\apache-tomcat-7.0.78\conf\ssl\tomcat.jks"Keystorepass= "Cert_test"MaxIdleTime= "60000"maxsparethreads= "+"MaxThreads= " the"minsparethreads= "+"Port= "8443"Scheme= "https"Secure= "true"Sslprotocol= "TLS"Truststorefile= "D:\https\apache-tomcat-7.0.78\conf\ssl\truststore.jks"Truststorepass= "Cert_test"/>The path in this article is as follows, fill in the actual path: Tomcat.jks path: D:\https\apache-
1, the first configuration nginx and other plug-ins, this Google, a lot of configuration options.2. Configure the server's certificate. The procedure is as follows:[Email protected] ~]# cd/etc/pki/tls/certs [[email protected] certs]# MakeServer.key umask the ; /usr/bin/openssl genrsa-aes1282048>server.keygenerating RSA private key,2048BitLongModulus ..... ..... ..... ..... ... .. ................-.....-....
1. Environment
1) Ubuntu14.04
2) Docker 1.12.0
2, in the Ubuntu14.04 virtual machine installed Docker 1.12.0, this experiment to create two virtual machines, The IP is 192.168.110.137 and 192.168.110.138, where 192.168.110.138 's hostname is ip-192-168-110-138.ec2.internal, and the hosts in 192.168.110.138 The following records are added to this
192.168.110.138 ip-192-168-110-138 ip-192-168-110-138.ec2.internal
3. Environment configuration
1) Configuration of 192.168.110.138
Add the followin
several SSL:mosquitto_pub -h mqtt.example.com -t test -m "hello again" -p 8883 --capath /etc/ssl/certs/ -u "sammy" -P "password"Note that the full hostname is used this time, not localhost. Because SSL certificates are issued to mqtt.example.com, if we try to localhost create a secure link, we will receive a message that the current hostname and the certificate's hostname are inconsistent. Even if they all point to the same Mosquitto server.--capath
PHP, C #, and JAVARSA signatures and signatures are found on the Internet. To make a contribution, we must repost and express our gratitude to Zhuo Ermei for her selfless dedication. 1) the signature algorithm uses SHA1withRSA. 2) the signed data bit base64 encoded ciphertext string. 3) the formats of private keys signed in the three environments are different. openssl is required for conversion. ----------------------------------- PHP, C # and JAVARSA signatures and signatures
This feature h
= Server
cd/etc/pki/ca
# Generate key
OpenSSL genrsa-out Private/myca.key 1024
# generating a self-signed certificate
OpenSSL Req-new-x509-key private/myca.key-out certs/myca.crt
By importing this CRT into the client browser, the certificate warning will not be displayed. 2 server Certificate
Cd/etc/pki/tls
OpenSSL genrsa-out private/sv.key
# Build request
OpenSSL Req-new-key private/sv.key-out Priva TE/SV.CSR
# Use root certificate to sign
OpenS
CentOS under Configuration Php,phpmyadmin
Original articles, reproduced please specify the source: http://www.aj2ee.com
It took some time today to configure the PHP environment on your VPS and configure the phpMyAdmin to manage the MySQL database.Previously wrote several Linux under the Apache,jdk,tomcat,svn,vsftpd,yum configuration. Apache has integrated well with TOMCAT,SVN.To use phpMyAdmin to manage the MySQL database, you have to configure the PHP environment, I still use yum to install PH
MySQL: SSL remote login bitsCN.com
MySQL: SSL remote loginEnvironment: linux mint 15Install openssl:1Sudo apt-get install opensslCheck whether mysql ssl is enabled (in the mysql command line ):1Show variables like '% ssl % ';If not, the values of the 'have _ openssl 'and 'Have _ ssl' options are DISABLED.Generate a certificate (under the mysql server host ):We recommend that you create the certs directory in/etc/mysql:1# Cd/etc/mysql/2# Mkdir certs3#
Experimental environment:
Virtual machine: Vmware®workstation ProHost A:ip to 10.1.255.55/16, create CA and provide CA service to other hostsHost B: For httpd server, IP for 10.1.249.115/161, view the OpenSSL profile/etc/pki/tls/openssl.cnf
[Root@localhost ~]# cat/etc/pki/tls/openssl.cnf (View the contents of the CA portion of the configuration file)
......
[CA]Default_ca = ca_default # The default CA section
####################################################################[Ca_default]
/secret-t 127.0.0.1:6082 # Login Admin command lineVcl.list # List all the configurationsVcl.load TEST1/ETC/VARNISH/DEFAULT.VCL # Load compiled new configuration, test1 is the configuration name, TEST.VCL is the configuration fileVcl.use Test1 # Use configuration, specify the configuration name, the current configuration to use the last vcl.use to prevailVcl.show test1 # Show configuration content, specify configuration name##############################4. Configure Nginx SSL AccessConfiguring C
{Code ...} I wrote a Python version using pyopenssl, as follows: {code ...} the problem mainly lies in x509data. How can I get the data in x509data? In Python, this is an object.
function getCertId($cert_path) { $pkcs12certdata = file_get_contents ( $cert_path ); openssl_pkcs12_read ( $pkcs12certdata, $certs, SDK_SIGN_CERT_PWD ); $x509data = $certs ['cert']; openssl_x509_read ( $x509data ); $
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.