is as follows:
cd/etc/pki/ca/
OpenSSL genrsa-out Private/cakey.pem 2048
# Generate Root Certificate
The code is as follows:
OpenSSL Req-new-x509-key private/cakey.pem-out Cacert.pem
Country Name (2 letter code) [AU]:CN
State or province Name (full name) [some-state]:brijing
Locality Name (eg, city) []:chaoyang
Organization Name (eg, company) [Internet widgits Pty LTD]:
Organizational unit Name (eg, section) []:
Common name (e.g. server FQD
applications can easily use OpenSSL to encrypt plaintext communication. The cooperation between OpenLDAP and OpenSSL is the main content of this article, including the SSL/TLS configuration of the OpenLDAP server and the SSL/TLS configuration of the OpenLDAP client.All the content and commands described in this article apply to Redhat Enterprise Linux 6.3. The Linux versions of other releases may be slightly different.ConfigurationOpenLDAPUseSSL/TLSEncrypted data communicationSSL/TLSIntroductio
Foreign Yum sources are very slow, and there are good sources in China, so it is best to set up the source in China, the best in China are beiyou, Tsinghua, and Shanghai Jiaotong University.
The procedure is as follows:
First, install the Yum-fastestmirror plug-in and select the fastest source automatically.
# Yum install Yum-fastestmirror-y
Second:
Under/etc/yum. Repos. D, the content of the new file sjtuedu. repo is as follows:
[Sjtuedu]
Name = fedora $ releasever-$ basearch-Updates
Baseurl =
Phppki encryption technology (openssl. Copy the code as follows :? Phppki encryption to use pki encryption requires openssl extension php. iniextensionphp_openssl.dll extension * pki mode is * public key encryption, private key decryption;
The code is as follows:
// Pki encryption// Openssl extension must be enabled for p
default value is 0.
4. Configure the local yum Source
1. Mount the system installation disc
# Mount/dev/cdrom/mnt/cdrom/
2. Configure the local yum Source
# Cd/etc/yum. repos. d/
# Ls
Four repo files are displayed.
The CentOS-Base.repo is the configuration file for the yum network source
The CentOS-Media.repo is the configuration file of the yum local source
Modify CentOS-Media.repo
# Cat CentOS-Media.repo
#CentOS-Media.repo##ThisrepoisusedtomountthedefaultlocationsforaCDROM/DVDon#CentOS-5.Yo
change of application software sales model, software users may not need to buy software to install and run on local computers in the future, instead, the data to be processed is uploaded to the application server that runs the software service over the network for processing, and the data processing result is obtained through the network. The software developer charges the software fee by providing the application service. At this time, software vendors are no longer faced with how to prevent l
(PKI) and authorization management infrastructure (PMI) has made breakthroughs in Intelligent trust and authorization technology, and has been widely applied in e-government and e-commerce systems.
Therefore, this article will discuss how to use smart trust and authorization technology based on PKI/PMI to establish a trusted environment for IP Broadband man, how to Apply digital certificate authentication,
configuration file for Yum Local sourceModify Centos-media.repo# Cat Centos-media.repo# centos-media.repo## This repo are used to mount the default locations for a Cdrom/dvd on# CentOS-5. You can use the this repo and the Yum to install items directly off the# DVD ISO then we release.## to use this repo, put in Y Our DVDs and use it with the other repos too:# yum--enablerepo=c5-media [command]# # or for only the media repo, D o this:## yum--disablerepo=\*--enablerepo=c5-media [command] [c
-media]name=centos-$releasever -Mediabaseurl=file:///media/CentOS/ file:///mnt/cdrom/ File:///media/cdrecorder/gpgchecK=1enabled=1gpgkey=file:///etc/pki/rpm-gpg/rpm-gpg-key-centos-5 650) this.width=650; "src="/img/fz.gif "alt=" Copy Code "/>Modify the 2nd path to/mnt/cdrom (that is, the CD mount point) in BaseURLChange Enabled=0 to 13. Disable the default Yum network sourceRename the Yum network source profile to Centos-base.repo.bak, otherwise the ap
online12. Do the log, often do analysisAnother implementation of the SSH protocol: dropbear(1) dropbearkey-t rsa-f/etc/dropbear/dropbear_rsa_host_key-s 2048Dropbearkey-t dss-f/etc/dropbear/dropbear_dss_host_keydropbear-p [Ip:]port-f-EOpensslThree components:OpenSSL: Multi-purpose command-line tools:Libcrypto: Cryptographic Decryption LibraryImplementation of the LIBSSL:SSL protocolPki:public Key InfrastructureCA: Issuing agencyRA: Registration AuthorityCRL: Certificate Revocation ListCertificat
Implement simple RSA key generation and encryption/decryption (Java), rsajava
Recently I have been studying PKI and have come into contact with some encryption algorithms. I focused on RSA and wrote a simple Demo to implement the RSA algorithm, including public and private key generation and encryption and decryption. Although relatively simple, it also covers the core ideas and processes of RSA encryption and decryption. Here we will share it with yo
certification authority. These certificates cost money, but they add to the reputation of the network service provider.
Get readyIn this document, we will use a self-signed certificate. Assume that CentOS has an Apache Web server installed. We need to generate a self-signed certificate using OpenSSL. If OpenSSL is not already installed, it can be installed using Yum.# yum Install mod_ssl OpenSSLGenerate a self-signed certificateThe following command can be used to generate a self-signed ce
####################In a Linux system, the correct output number is 1, the error output number is 2Use the normal user "student" in the system to execute the following command:Find/etc-name passwdBecause the "student" user rights issue has the following output:Find: '/etc/pki/ca/private ': Permission denied # #权力受限, errorFind: '/etc/pki/rsyslog ': Permission deniedFind: '/etc/audit ': Permission denied/ETC
encryption signature is appended to the end of the data, and the CA is divided into two categories: public CA and private CA Pki: Public key Infrastructure is the core framework for the realization of modern Internet e-commerce, it is only a standard, its core Is the CA, as well as the key verification and password exchange mechanism to ensure that the verification process is reliable. SSL (Secure Socket Layer) Secure sockets layers; Iv. Linux encryp
DEFAULT-CA (the first time you must set up).1. View the OpenSSL configuration file:OpenSSL version-Aopenssl1.0.1e-fips -Nov .built On:fri Nov - -: -: atCst .Platform:linux-X86_64options:bn ( -, -) MD2 (int) RC4 (16x,int) des (Idx,cisc, -,int) Idea (int) Blowfish (idx) COMPILER:GCC-fpic-dopenssl_pic-dzlib-dopenssl_threads-d_reentrant-ddso_dlfcn-dhave_dlfcn_h-dkrb5_mit-m64-dl_endian-dtermio -wall-o2-g-pipe-wall-wp,-d_fortify_source=2-fexceptions-fstack-protector--param=ssp-buffer-size=4-m64-mtun
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.