command is as follows:
Pvk2pfx-PVK mykey. PVK-SPC mykey. SPC-pfx mykey. pfx-Pi password-F
This article from csdn blog: http://blog.csdn.net/kevingao/archive/2009/04/06/4052082.aspx
Common digital certificate formats and file extensions
PKCS stands for public-key cryptography standards. It is a series of standards developed by the RSA lab and other security system developers to Promote the Development of public key cryptography. PKCS has published 15 standards. Commonly used:PKC
=" Wkiol1tbff7zqz9zaax4jhipcow634.jpg "/>4. Generating a CSR certificate file must be signed by the CA authority to form a certificate. Here make your own CA generate a key file Ca.key and a root certificate ca.crt650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/59/AD/wKiom1TbE_uCAzZhAAZmWNfyxGw424.jpg "title=" Ssl6.png "alt=" Wkiom1tbe_ucazzhaazmwnfyxgw424.jpg "/>5. Create a openssl.conf generated configuration file#根据openssl. CNF build Profile touch/etc/
In a recent project, the establishment of the PKI system has not been completed before, so it was confused at the beginning. I slowly found out some results and shared them with you. I hope you can correct the incorrect information.
At present, the PKI system has become the key point of information security in an enterprise and is the pillar of information security. My project is based on Microsoft technolo
generates the homepage
Issue a certificate to the web server:
Mkdir/etc/httpd/certs: create a directory for storing web certificates and keys
Cd/etc/httpd/certs switch directory
Openssl genrsa 1024> httpd. key generates a private key for the web server
Chmod 600 httpd. key: Modify the permission value of the Private key
Openssl req-new-key httpd. key-out httpd. req: request file for certificate generation
Openssl ca-in httpd. req-out httpd. cert CA
the number 01 to the serial file. After these preparations are complete, you can implement the CA Server:
We use openssl to generate a private key for the CA. The private key name is cakey. pem is stored in the/etc/pki/CA/private/directory. To ensure the security of the private key, you must modify the cakey. the pem permission is 600:
To serve other people, the CA server must be an institution trusted by others and must issue a certificate to the C
-text-in CA.CRTStep Two: Create the server certificate signing request below.#openssl Genrsa-des3-out Server.key 1024(Use OpenSSL genrsa-out server.key 1024) under ditto windowsPass phrase also be set here.Generates the Server.key file and changes the file property to 400.#chmod Server.keyYou can use the following command to view its contents,#openssl Rsa-noout-text-inserver.keyUse Server.key to generate certificate signing request CSR.#openssl Req-new-key server.key-out SERVER.CSREnter some inf
public-key cryptography standards. It is a series of standards developed by the RSA lab and other security system developers to Promote the Development of public key cryptography. PKCS has published 15 standards. Commonly used:PKCS #7 cryptographic message syntax StandardPKCS #10 certification request StandardPKCS #12 Personal Information Exchange syntax Standard
X.509 is a common certificate format. All certificates comply with international ITU-TX509 Standards for Public Key Infrastructure (
on IP address, so only one HTTPS virtual host can be used on a single IP hostTwo: Configure HTTPD to support HTTPS(1) Apply for a digital certificate for the server;Testing: Issuing a certificate through a privately built CA(a) creating a private CA(b) Create a certificate signing request on the server(c) CA Visa(2) Configure HTTPD to support the use of SSL, and the use of certificates;# yum-y Install Mod_sslConfiguration file:/etc/httpd/conf.d/ssl.confDocumentRootServerNameSslcertificatefileSs
Crlnumber = $dir/crlnumber #证书吊销列表的工作号
CRL = $dir/crl.pem # file for certificate revocation List
#证书吊销列表保存着曾经发出的证书, but not expired, but not used for some reason (security mechanism)
Private_key = $dir/private/cakey.pem # private key file
So we need to create the private key file in the/etc/pki/ca/directory, the CA certificate, cert, CRL, Newcerts directory, create serial and Index.txt files.The C
, city) [Newbury]: HDOrganization Name (eg, company) [My Company Ltd]: UPLOOKINGOrganizational Unit Name (eg, section) []: IT-------------------------------------------------------------------------------Common Name (eg, your name or your server's hostname) []: www.uplooking.comEmail Address []: www@uplooking.comPlease enter the following 'extra 'attributes to be sent with your certificate requestA challenge password []:An optional company name []:Send the certificate request to the CA[Root @ ww
) = 87a7ef2d0d130d58b96905377ae3637d2de15260
Sha1(winxp_2-disk1.vmdk.gz) = 597f3effb12b77898f9dc2e92b836211c30b95b1
Sha1(winxp_2-file1.iso.gz) = d59d519da9663c7245678efe08c21aa86cf96655
3). Cert File
A. Detailed introduction
From the analysis of MF files, we know that MF files are mainly used to verify whether configurations of various virtual machines are maliciously tampered with. But how can we ensure the legitimacy of MF files? Therefore, we need
/ssl/httpd.key-days 365-OUT/ETC/HTTPD/SSL/HTTPD.CSR(2) Transfer the request file to the CA;# SCP HTTPD.CSR [email Protected]:/path(c) CA Visa# OpenSSL Ca-in/tmp/httpd.csr-out/etc/pki/ca/certs/httpd.crt-days 365(2) Configure HTTPD to support the use of SSL, and the use of certificates;# yum-y Install Mod_sslConfiguration file:/etc/httpd/conf.d/ssl.confDocumentRootServerNameSslcertificatefileSslcertificatekeyfile(3) The test is based on HTTPS access to
xxxx.pem-out XXXX.CSR4. Signing with a CA# OpenSSL Ca-policy policy_anything-days 3650-cert ca.crt-keyfile ca.key-in xxxx.csr-out xxxx.crtWhere the policy parameter allows signed CAs and web site certificates to have different countries, place names and other information, the days parameter is the signature time limit.At the time of signature, it's likely to come acrossI am Unable to access the/etc/pki/ca/
/ssl/Chown-r Mysql:mysql/var/lib/mysql/ssl-----------------------------------------------3. Prepare the private key and application certificate for MySQL on slaveCreate a location to hold the certificateMkdir/var/lib/mysql/sslCd/var/lib/mysql/sslCreate the required certificates(Umask 077;openssl genrsa > Master2.key)OpenSSL Req-new-key master2.key-out MASTER2.CSRSCP./MASTER2.CSR 192.168.1.10:/root/Issue a certificate for Master2 on Master1OpenSSL ca-in master2.csr-out master2.crtSCP Master2.crt/
# CA custom path
87 [policy_match]
88 countryName = optional
89 stateOrProvinceName = optional
90 organizationName = optional
Create related directories and files based on the configuration file, and set the private key to cakey. pem, and the root certificate to cacer. pem.
# Cd/etc/pki/CA
# Mkdir crl certs newcerts
# Touch index.txt serial
# Echo "01"> serial
# Openssl genrsa 1024> private/cakey. pem
# Chmod 600 private /*
Openssl req-new-key privat
ObjectiveI read a lot of information, only to write this article, if there are errors, please put forward the reader in time.In general, when you use Remote Desktop to connect to Windows Server, there is always a warning prompt, 1Figure 1This warning occurs because the certificate is a self-signed certificate for the server and our client is not recognized, so I think about how to use the certificate to secure the use of Remote Desktop (RDP).Workaround:
Using WindowsServer's "AD Certifi
You need to enter country, region, organization, email in turn. Most importantly there is a common name , you can write your name or domain name. If for https request, this must match the domain name, otherwise it will cause browser alert. The generated CSR file is passed to ca signature and forms the service-side's own certificate. 3, sign the SERVER.CSR or CLIENT.CSR file that you just generated with the certificate of the generated CA openssl ca-keyfile ca.key-
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.