Label: style blog http io color ar OSIn cryptography, CA (Certificate Authority) refers to an organization trusted by multiple users, which can create and assign public key certificates.For the sake of standardization, we will first introduce the terms that may be involved in this article,Asypolicric cryptography: asymmetric cryptography (or public key encryption and public key encryption). A key involves a key pair consisting of a public key and a pr
Self-built CA Based on OpenSSL and SSL certificate issuance
For details about SSL/TLS, see the SSL/TLS principles.For more information about Certificate Authority (CA) and digital certificate, see OpenSSL and SSL digital certificate concepts.
Openssl is a suite of open-source programs. It consists of three parts: one islibcryto, This is a general function of the encryption library, which implements a large
This article mainly draws on and references the following 2 address content, then carries on the test and the execution on own machine, and has made the following record.RefHttp://blog.chinaunix.net/uid-26760055-id-3128132.htmlhttp://www.111cn.net/sys/linux/61591.htmCreate a Test CatalogMkdir/tmp/create_key/caCD /tmp/create_key/ certificate file generation:one. Server-side1. Generate the server-side private key (key file);OpenSSL genrsa-des3-out server.key 1024x768The runtime prompts for a passw
I. Theoretical knowledge
What is ca?
Ca is short for Certificate Authority. It is usually translated into an authentication authority or a certification center. It is mainly used to issue digital certificates to users. This digital certificate contains part of the user's identity information and the public key held by the user. At the same time, the private key of the
enter the following ' extra ' attributesTo is sent with your certificate requestA Challenge Password []: An optional company name []: #scp/ROOT/WEB.CSR S2:/root---CA Certification Body------> Sign the S1 signature request WEB.CSR issue generation WEB.CRTS2 is not a CA certification authority nowNeed to first deploy S2 as CA certification AuthorityDeploying
Objective
The CA is the issuing authority for the certificate, which is the core of the PKI. CA is the authority responsible for issuing certificates, certifying certificates, and administering issued certificates.It is to develop policies and specific steps to verify, identify, and sign user certificates to ensure that the identity of the certificate holder andOwnership of the public key.The
Windows 2003 AD Upgrade to Windows-Ad CA Server MigrationIn the previous blog post we showed you how to upgrade Windows 2003 AD to Windows AD and the migration of the upgraded DHCP server, and today we will continue to introduce you to Windows 2003 AD upgrade to Windows 2012 After the ad, the CA server is migrated. Okay, nonsense, we're starting to experiment:The original
Create a private CA server in LinuxWhat is a certificate?
It is used to prove that something is indeed something. In general, certificates are like official seals. The official seal proves that the relevant documents are indeed issued by the corresponding company.
In theory, everyone can find a certificate tool and create a certificate by themselves.What is CA?
CA
sender is actually Bob, which completes the authentication (the characteristic value of a string of data is obtained after decryption)The fourth step: using the same single encryption algorithm to extract the eigenvalues of this data, if the same as the third step of the eigenvalues, the data is complete, this completes the data integrity of the checksumAnother question is how Bob and Alice get the other's public key, or how to prove that the public key they get is the other. This requires the
Transferred from:
Http://rhythm-zju.blog.163.com/blog/static/310042008015115718637/
All rights reserved. If you need to reprint it, please indicate the source
I have studied SSL/TLS some time ago and read the English version of Eric rescorla's SSL and TLS-designing and building secure systems (for the severity of the Chinese version, I wrote a previous articleBlog has been severely criticized ). The author of this book follows the idea of Steven s in his role of TCP/IP authentication strated: us
, authenticity and storage control security issues, PKI system contains a certificate authority (CA), registration Center (RA), policy Management, key and certificate management, key backup and recovery, revocation system and other functional modules combined.650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/73/70/wKiom1X-C36wj_nxAAKck48VE3w837.jpg "title=" Qq20150920090711.png "alt=" Wkiom1x-c36wj_nxaakck48ve3w837.jpg "/>Third, SSLSecure Soc
In HTTPS learning note two, the concept of digital certificates has been clarified, composed and how the client validates the server-side certificate during the HTTPS connection process. This chapter describes how to use the OpenSSL library to create a key file, and to generate a root CA and issue a child certificate. Learn the main reference Official document: https://www.feistyduck.com/library/openssl-cookbook/online/ch-openssl.html#I. Introduction
: There is a security risk in the middle of a person is impersonating, while impersonating AB, then the middleman will be AB's information to read all over. To solve this problem, we have a third-party CA4.3 One-way encryption: Extract data Fingerprint (signature), can only encrypt, cannot decryptCharacteristics: fixed-length output, avalanche effect (small changes in initial results will result in a dramatic change in results)Function: Realize the integrity check of dataAlgorithm: Md5:message d
In a recent project, the establishment of the PKI system has not been completed before, so it was confused at the beginning. I slowly found out some results and shared them with you. I hope you can correct the incorrect information.
At present, the PKI system has become the key point of information security in an enterprise and is the pillar of information security. My project is based on Microsoft technology. The CA Certificate Server is a self-built
symmetric key with the public key of the receiver, attaches it to the tail of the cipher, and sends it; Decryption process: 1. The receiving party decrypts the encrypted symmetric password with its own private key; 2. The receiving Party uses the password to decrypt the text; 3, the receiver uses the sender's public key to decrypt the sender's private key encryption signature; 4, the receiver uses the same one-way encryption algorithm to calculate the original data signature; 5, the receiver co
ensure the privacy of the data ;3 . Decrypt the signature of the original data with the public key provided by Alice and verify the identity of the data sender Alice;4, using the same one-way encryption algorithm to calculate the original data signature and the decrypted signature to compare, ensure data integrity. In the process of data transmission, it is necessary for both parties to obtain the other's public key, that is, the key exchange, the public key in the network transmission process
Experimental environment:
Virtual machine: Vmware®workstation ProHost A:ip to 10.1.255.55/16, create CA and provide CA service to other hostsHost B: For httpd server, IP for 10.1.249.115/161, view the OpenSSL profile/etc/pki/tls/openssl.cnf
[Root@localhost ~]# cat/etc/pki/tls/openssl.cnf (View the contents of the CA portion of the configuration file)
......
[
First, the HTTPS service must be built with an HTTPS certificate. This certificate can be viewed as an application-level certificate. The reason for this is that the HTTPS certificate is generated based on the CA certificate. For official websites, CA certificates require a qualified third-party certification authority to apply for access. For some of our self-built small projects, you can use your own serv
Objectivewith the rapid development of Internet, network communication has become the main way to transmit information. While the communication of data transmission is mostly Ming wen Transmission, in the network of this insecure environment, if there is no set of data encryption mechanism, will lead to sensitive information and important data leakage, causing immeasurable loss. and OpenSSL just made up for this shortcoming, what is OpenSSL? OpenSSL is a powerful set of cryptographic components
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.