SSL protocol and digital certificate principles
1st Floor
Handshake and communication over the SSL protocolTo better understand and understand the SSL protocol, we will introduce the handshake protocol of the SSL protocol. SS
To ensure secure connections from Web browsers to servers, HTTPS is almost the only choice. HTTPS is actually HTTP over SSL, that is, making the HTTP connection established on the SSL secure connection.SSL uses certificates to create secure connections. There are two verification modes:Only the client verifies the server certificate, and the client does not provi
Handshake and communication over the SSL protocol
To better understand and understand the SSL protocol, we will introduce the handshake protocol of the SSL protocol. SSL uses both public key encryption and symmetric encryption. Although symmetric encryption is faster than public key encryption, public key encryption pr
650) this.width=650; "src=" http://image109.360doc.com/DownloadImg/2017/09/2116/111549118_1_20170921045242505 "alt = "HTTP will exit the historical stage GDCA free SSL certificate push HTTPS" style= "border:none;margin:10px auto;padding:0px;"/>An SSL certificate is a mandatory configuration for the HTTPS security proto
In the past, I heard people say that an IP address can be used to generate a certificate. Today, the example shows that IP addresses cannot be used.Scenario 1:
The name specified when the certificate is generated is IP Address
The example is an example of single-point logon. The configuration in Web. XML is as follows:
If the HTTPS protocol is specified in the above configuration and the name specified d
If our site projects are not important business sites, such as personal sites, blogs or simple projects need to use the SSL security certificate, in fact, the Internet currently provides a free SSL certificate enough for us to choose and use. In previous posts, Chiang has mentioned the perpetual free Let's Encrypt, Sta
At present, there are various types of websites. When we enter personal information on some websites, especially online banking transactions, how can we ensure that the websites you are facing are credible? By using the SSL Certificate of the website ID card, we can clearly understand whether the website is secure and trustworthy. Generally, the browser determines the security of these certificates. If we c
1. After OpenSSL is installed, find OpenSSL. CnF in the/usr/lib/SSL directory (for Ubuntu system, use whereis to check the SSL directory) and copy it to the working directory.
2. Create a New democafolder under the Work directory, create the new files index.txt and serial in the folder, and then create a newcerts folder. Add the character 01 to serial.
Mkdir democa
CD democa
Touch./{serial, index.txt}
Add 0
Use SSL Certificate for connection in HAProxy
I. Environment Introduction
I was notified that the website should be changed from http to https. The current front-end architecture of my website is shown in:
Suppose we have two physical machines with many tomcat containers on each physical machine. The front end uses the http layer Load Balancing conducted by haproxy, And then we use LVS load balancing on th
Free SSL certificate, https://www.startssl.com/Installing to IIS differs from Nginx. Original http://blog.newnaw.com/?p=1232------------Transferred from http://blog.newnaw.com/?p=1232-----------------------Key part RedIf a Web site needs to provide HTTPS encrypted access, you must have a valid SSL certificate to prove
650) this.width=650; "title=" Symantec EV SSL Certificate "src=" Http://www.evtrust.com/symantec/images/symantec.png "alt=" Symantec.png "/> request EV SSL Certificate , will accept the most stringent authentication enterprise domain name ownership and enterprise identity information, belongs to the highest trust level
1. Get the server certificatePaste the server certificate contents (including "-----Begin CERTIFICATE-----" and "-----End CERTIFICATE-----") from begin to end in the certificate issuance message into a text editor such as Notepad, and modify the file name extension , Save as Server.cer file2. Get the CA certificatePast
650) this.width=650; "title=" Symantec Secure Site Pro SSL Certificate "src=" Http://www.evtrust.com/symantec/images/symantec.png "alt=" Symantec.png "/> Pro SSL certificate , verifying Enterprise Domain name ownership and enterprise identity information, using SGC (server gating) technology to enforce 128-bit to 256-b
About SSL certificates
SSL certificates are used to encrypt site information and create a safer connection. In addition, the certificate can display the VPs identity information to site visitors. The Certificate Authority issues an SSL
A complete SSL certificate is divided into four parts:
CA root certificate (Root CA)
Intermediate certificate (Intermediate Certificate)
Domain name Certificate
Certificat
unit Name (eg, section) []:zhangc.com
Common name (eg, your name or your server ' s hostname) []:www.zhangc.com
Email Address []:vipzhangchao@yeah.net
[ROOT@ZHANGC server]# mkdir/etc/vsftpd/certs "Create certificate store Directory"
[ROOT@ZHANGC server]# cd/etc/vsftpd/certs/
[ROOT@ZHANGC certs]# OpenSSL genrsa 1024 gt;vsftpd.key ' Create key '
[ROOT@ZHANGC certs]# OpenSSL req-new-key vsftpd.key-out VSFTPD.CSR "Generate
"authentication has been added to KeyStore" instead of the "authentication reply installed in KeyStore".Certificate Import complete, run the Keystool command to view the contents of the KeyStore file againKeytool-list-keystore C:\keystore.jks-storepass PasswordThird, install the server certificate1. Import the Keysotre KeyStoreLogin WebLogic ConsoleSelect "Lock Edit" To unlock the configuration and enter "Servers"Select the server for which you want
MQTT serves as the push message pushing protocol for Android clients. The Android client needs to connect to the MQTT Proxy server via SSL/TLS for encrypted transmission of messages. Implementing this process requires two support, one for the MQTT protocol client and the other for the MQTT proxy server. There are many open-source Mqtt proxy servers, and I choose to use Mosquitto Broker.
Mosquitto install to Windows, I use Windows as the Mosquitto Prox
Practical application of Let's Encrypt permanent free SSL certificate process tutorial and FAQs, encryptssl
The emergence of Let's Encrypt free SSL certificates will also be a great blow to Traditional merchants that provide paid SSL Certificate Services. So far, Let's Encry
Install let ' s Encrypt client
For CentOS distributions There are currently two ways to install let's Encrypt clients, one of which is a direct yum installation from the upstream Epel source, one that is downloaded from the Encrypt source of let ' s GitHub. Waterscape One page uses the following second method, downloaded from the GitHub.
Two ways of installingSimple comparison:
YUM installation follows the system update to update the installation package, but there is no Apache automatic inst
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.