ensure the confidentiality and reliability of communication data between two applications, and it can be supported simultaneously on the server side and client side. Current mainstream version SSLV2, SSLV3 (Common).To build a private CA using OpenSSL:1. Generate the private key:2. Generate self-signed certificate:(1) When the private key is used to sign a certificate, it is used to add a digital signature to the certificate;(2) Certificate: Each Communication party imports this certificate to t
system installation disc
# Mount/dev/CDROM/mnt/CDROM/
2. Configure the local Yum Source
# Cd/etc/yum. Repos. d/
# Ls
Four repo files are displayed.
The CentOS-Base.repo is the configuration file for the yum network source
The CentOS-Media.repo is the configuration file of the yum local source
Modify CentOS-Media.repo
# Cat CentOS-Media.repo
# CentOS-Media.repo## This repo is used to mount the default locations for a CDROM / DVD on# CentOS-5. You can use this repo and yum to install items dir
servers to take effect permanently.To cancel the plug-in loading, run the following command;Mysql> uninstall plugin rpl_semi_sync_master;4. ssl-based master-slave ReplicationMaster-slave Replication refers to the transmission of data in plain text on the network. Therefore, it is necessary to set up ssl-based replication for the master-slave service. Here are official documents. You can also use the following configurations.Official documentation: http://dev.mysql.com/doc/refman/5.1/en/replicat
authentication from CentOS A to the current server (CentOS B.
3. Configure the CA Server (CentOS)
3.1 initialize the CA Service and create the required files# Cd/etc/pki/CA/# Touch index.txt // create an index file# Echo 01> serial // create a serial number File
3.2 CA self-signed certificateGenerate Private Key# (Umask 077; openssl genrsa-out/etc/pki/CA/private/cakey. pem2048)Use the private key to genera
-- enable-openssl -- enable-addrblock -- enable-unity \5 -- enable-certexpire -- enable-radattr -- enable-tools -- enable-openssl -- disable-gmp -- enable-kernel-libipsec
4. Compile and install:1 make; make install
If no error is reported after compilation and version information is displayed using the ipsec version command, the installation is successful.Configure Certificate
1. Generate the private key of the CA certificate
1 ipsec pki -- gen -- ou
, each service itself is responsible for Auth_token installation and configuration. In fact, HTTP interceptors, intercept every HTTP request, check the head token information, extract the user, role and other information, if the verification passed, release, otherwise refused the request.Certification processPaste the flow chart can be seen everywhere, to tell the truth, there is a step did not understand, trouble sensible to speakIs the 4th step, endpoint to Keystone process, inside said there
this:
#
# yum --disablerepo=\* --enablerepo=c5-media [command]
[c5-media]
name=CentOS-$releasever - Media
baseurl=file:///media/CentOS/
file:///mnt/cdrom/
file:///media/cdrecorder/
gpgcheck=1
enabled=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-5
Modify the 2nd path to/mnt/cdrom (that is, the CD mount point) in BaseURL
Change Enabled=0 to 1
3. Disable the default Yum network source
R
encryption and decryption tools on Linux:1, GPG realization RPM package signature is more commonly used;2, the implementation of the open source version of OpenSSL SSL, a total of three components:1) Libcrypto Universal Library;2) LIBSSL implementation of SSL and TLS protocol;3) OpenSSL multi-purpose cryptographic components;Here we focus on OpenSSL:OpenSSL is a multi-purpose cryptographic component, a command-line tool that can implement symmetric encryption algorithms, asymmetric encryption a
HTTPS is a security-targeted HTTP channel, the SSL layer is added under HTTP, the security base of HTTPS is SSL, so the detailed content of encryption requires SSL.The following is a summary of the steps to set up HTTPS services under https2.21. Create a private CA:Using the OpenSSL command, details: http://blog.51cto.com/papapa213/20965891) Create the CA's private key:(Umask 077;openssl GENRSA-OUT/ETC/PKI/CA/PRIVATE/CAKEY.PEM 2048)2) generate the sel
Tags: mariadb master-slave replication The master server is configured as CA touch/etc/pki/ca/index.txt echo01 >/etc/pki/ca/serial cd/etc/pki/CA/ ( umask066;opensslgenrsa-out/etc/pki/ca/private/cakey.pem2048) opensslreq-new-x509-key/etc/pki/ca/private/cakey.pem-days730 -o
of the data, and computes an feature value with one-way decryption. If the two values are the same, it indicates that the data is in good condition, and the above process achieves triple verification, which is the basis of e-commerce. A tool that can implement this entire process: opsshgpg, but there are still some problems in these two processes. How does Tom get the blacklist Public Key? Spoofing may also occur when the public key is transmitted. How can this problem be solved? IKE: Internet
trusted certificates in the browser.Second, PKI-public Key InfrastructurePublic key Infrastructure is a general-purpose platform for solving network security problems, which is built on the basis of publicly-used key technology. Its range of services includes public key management, authentication, encryption, integrity, and accountability services.PKI can almost endorse the entire public key technology system standard. Conceptually,
Generate your own ssl certificate through openssl in CentOS EnvironmentIntroduction to generating https certificates using openssl
This article describes how to generate your own ssl certificate through openssl in Linux and enable https with the nginx server. I do not know much about the certificate either. I have collected some information from the Internet and successfully set up an HTTPS server on CentOS. This article is as follows:Preparations
/Etc/pki
a certificateUse format: OpenSSL x509-text-in filename (certificate)7.Req: order to generate a certificate signing request or a self-visaUse format: A. Generate the self-visa book:OpenSSL req-new -x509 -key/path/to/private.key-out/path/to/cacert.pemB. Generating a certificate signing requestOpenSSL REQ-NEW-KEY/PATH/TO/PRIVATE.KEY-OUT/PATH/TO/CACERT.CSR8.ca:certificate Authority command to sign a certificate requestUse format: OpenSSL CA-IN/PATH/TO/CACERT.CSR-OUT/PATH/TO/CACERT.CRTHow to create
-- enable-lbmethod-heartbeat -- enable-slotmem-shm -- enable-slotmem-plain -- enable-watchdog -- with-ssl =/usr/local/openssl
2. Install httpd In the RPM package
Mod_ssl module needs to be installed
# Yum install httpd mod_ssl-y
Iii. Self-signed certificate generated by the CA Server (on the CA Server 192.168.75.131)
# Yum install openssl-y
# Cd/etc/pki/CA/
# (Umask 077; openssl genrsa-out private/cakey. pem 2048) # generate a private key
# Ll privat
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.