certificate is/etc/pki/CA, store the certificate-related information of the intermediate CA in your own directory. To reflect the transfer logic of the trust chain, you can create a directory under/etc/pki/CA, assume that the certificate directory of the intermediate CA is/etc/pki/CA/intermediate /.
The process of initializing the certificate directory is no d
compiling the entire Android codeThe following is an enumeration of the compiler directives for some modules:
Module make command MMM commandinit make init mmm system/core/initZygote make app_process mmm frameworks/base/cmds/app_processSystem_server Make Services mmm frameworks/base/servicesJava framework make framework MMM frameworks/baseFramework resources make Framework-res MMM frameworks/base/core/resJNI framework make Libandroid_runtime mmm Frameworks/base/core/jniBinder make Libbinder mm
Centos6.5 create a private docker RepositoryDocker private Registry Installation Guide under centos 6.x
Note:
docker.yy.comThis is the domain name of the docker registry server, that is, the host address of your company's docker private server. Assume that the ip address is192.168.2.114Because the https SSL certificate cannot use an IP address, I can name it.
registryThe server acts as the upstream server to process the final upload and download of docker images, using an official image.
ngi
OpenSSL configuration file:/etc/pki/tls/openssl.cnfThree strategies: matching, support, and optional. Match: The information required to fill in the request must be consistent with the CA setup information; Support: means the application information must be filled in; optional: means dispensable.Experimental environment: Requires two hosts, I here with Host a (centos6:ip for 172.17.250.83) to create a CA and to other hosts to provide CA services; host
CA IntroductionBuild the CA server (data encryption transfer for Web services)CA Server (172.40.55.10)First step: Configure the CA signing environmentStep two: Generate the private key for the CA serverStep three: Create a root certificate for the CA serverFourth step: Publish the root certificate fileFirst step: Configure the CA signing environment[Email protected] ~]# RPM-QF/ETC/PKI/TLS/OPENSSL.CNFOpenssl-1.0.1e-42.el6.x86_64[Email protected] ~]#Vim
Building a private CAWe use the OpenSSL software to achieveSo first, let's look at the configuration file for the software.Implementing the Environment CentOS 7.2[[email protected] ~]# RPM-QC OpenSSL//can see that the command does not have any output, we can think of the package there are other support packages [[email protected] ~]# Rpm-qa |grep "OpenSSL"//sure enough we can see the existence of the Libs pack Openssl-libs-1.0.1e-42.el7.9.x86_64openssl-1.0.1e-42.el7.9.x86_64[[email Protected] ~]
Download the official OpenStack document for installation (Icehouse Juno Kilo), according to the official documentation, download two RPM packages, for example, I want to build OpenStack Icehouse on centos6.5, need two installation packages, EPEL-RELEASE-6.8-NOARCH.RPM source package, in one is rdo-release--icehouse-4-src.rpm opened under window. Check the configuration profile inside, there are Foreman.repo Puppetlabs.repo Rdo-release.repo find their corresponding, there is a epel-release-6.8-n
) Encrypt the digest and the original data using a symmetric secret key;4) Then use Bob's public key to encrypt the symmetric secret key;5) Ciphertext data transmission ———— >Bob:1) 2) Use Bob's private key to decrypt the symmetric secret key;3) Decrypt the original data and the encrypted digest using the symmetric secret key;4) Decrypt the digest using Alice's public key;5) Calculates the hash summary of the original data and compares it with the decrypted digest to determine the integrity of t
classified into public and private keys.Public Key: extracted and generated from the private key; can be made public to everyone;Private Key: It is created using tools and kept by the user. The private key must be kept confidential;
Features: data encrypted with the public key can only be decrypted using the private key of the matching child; and vice versa;Purpose:Digital Signature: allows the recipient to confirm the sender's identity;Key Exchange: the sender encrypts a symmetric key with the
;function: completeness;Algorithm:Md5:message Digest 5, 128bitsSha1:secure Hash algorithm 1, 160bitssha224, sha256, sha384, sha512Key exchange: IKE (Internet key Exchange)Public Key CryptographyDH (Deffie-hellman)A:p, GB:p, GA:x-P^x%g ==> BA: (p^y%g) ^x=p^yx%g B:y-P^y%g ==> AB: (p^x%g) ^y=p^xy%gSecond, the PKIPKI is the initial acronym of Public Key Infrastructure, which is the key infrastructure; PKI is a standard technology and specification to use
provide the necessary directory-level files and text-level files for the CA;Directory-level files:/etc/pki/ca/certs/etc/pki/ca/crl/etc/pki/ca/newcertsText-level files:/etc/pki/ca/serial: Save certificate serial number, general initial serial number AH is 01;/etc/pki/ca/inde
What's Token?Popularly speaking, token is a user's credential, need to take the correct user name/password to Keystone application to get. If users use username/password to access OpenStack API each time, it is easy to disclose user information, which poses a security risk. So OpenStack requires users to access their APIs before they need to get tokens, and then use token as their user credentials to access the OpenStack API.
The origins of the four tokensD version, only the UUID type Toke
connecting clients
Authenticate using a username andPassword. By default, passwords for both protocols are passed over
Network unencrypted.To configure SSL on Dovecot:? Edit the Dovecot configuration file/etc/pki/Dovecot-
OpenSSL. conf as you prefer.However in a typical installation, this file does not require
Modification.
Rename, move or delete the files/etc/pki/Dovecot/certs/Dovecot. pem
And/etc/
Filter
AngularJS has built-in some common filters. Let's take a look at them one by one.
CurrencyFilter (currency ):
Purpose: format the currency.
Method prototype:
The Code is as follows:
Function (amount, currencySymbol, fractionSize)
Usage:
{{| Currency }}
{. | Currency: '¥ '}}
{. | Currency: 'chy ¥ ':}}
{. | Currency: undefined: 0 }}
DateFilter (date ):
Purpose: format the date.
Method prototype:
The Code is as follows:
Function (date, format, timezone)
Usage:
{'1970-05-20T03:
Certificate. on the screen, you will be prompted to enter the required personal information (such as Country, province, city, company, etc.) according to the prompts ).
Ii. Client
1. Generate the client private key (key file );
Openssl genrsa-des3-out client. key 1024 2. Generate the client certificate signature request file (csr file );
Openssl req-new-key client. key-out client. csr
Cd/tmp/create_key/ca
3. Generate the CA certificate file
# The server. csr and client. csr files must have a
How to configure a secure http service to make the service more secure. You can also learn how ca works. 650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/055P4N91-0.gif "alt =" j_0003.gif "/>
HTTP + SSL = HTTPS
Configure the CA Server
========================================================== ======================
1. Configure CA 172.16.1.2 to generate the CA's own public key and private key CA to self-sign the certificate (generated by script)
CA Server Configura
Add fedora yum source in China ~ All ~ Accelerate your download speed-general Linux technology-Linux technology and application information. For more information, see the following. Foreign yum sources are very slow, and there are good sources in China, so it is best to set up the source in China, the best in China are beiyou, Tsinghua, and Shanghai Jiaotong University.
The procedure is as follows:
First, install the yum-fastestmirror plug-in and select the fastest source automatically.
# Yum in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.