certificates with the same subject can be created simultaneously.New_certs_dir = $ DIR/newcerts # Set the default location for storing newly issued certificatesCertificate = $ DIR/cacert. pem # specify the CA certificateSerial = $ DIR/serial # specify the file to store the current serial numberCRL = $ DIR/CRl. pem # current CRLPrivate_key = $ DIR/private/cakey. pem # private key of CARandfile = $ DIR/private/. Rand # specifies a seed file used for re
certificate to your users. Of course, if both parties use the same CA, you only need to install a root certificate.If your server certificate is issued to you by yourself, copy the cacert. pem file generated by the previous ca. pl script to the Postfix configuration directory:CP/usr/local/SSL/democa/cacert. PEM/etc/PostfixIf your server or any client certificate is issued by a third-party ca, you must try
ininitialized
Into your certificate request.
What you are about to enter is what is called a distinguished name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country name (2 letter code) [au]: US
State or province name (full name) [some-State]: Texas
Locality name (eg, city) []: Austin
Organization Name (eg, company) [Internet widgits Pty Ltd]:
(2 letter code) [au]:CNState or province name (full name) [some-State]:ZJLocality name (eg, city) []:HzOrganization Name (eg, company) [Internet widgits Pty Ltd]:Some Ltd. Corp.Organizational unit name (eg, section) []:Some UnitCommon name (eg, your name) []:SomeoneEmail Address []:Some@email.com
Please enter the following 'extra 'attributesTo be sent with your certificate requestA challenge password []:An optional company name []:
Sign CA certificate requests
In practical applications, you ca
', master_log_pos = 182; mysql> start slave; mysql> show slave status \ G Slave_IO_Running: Yes Slave_ SQL _Running: Yes Seconds_Behind_Master: 0
.
1) Use node1 as the CA Server
[Root @ node1 log] # cd/etc/pki/CA/[root @ node1 CA] # (umask 077; openssl genrsa-out private/cakey. pem 2048) [root @ node1 CA] # openssl req-new-x509-key private/cakey. pem-out cacert. pem-days 365You are about to be asked to enter information that will be inemediatedinto y
= # Preferred Permissions:root:root 0400Ssl_key = This is good, other advanced options you do not use, unless you really do for the Enterprise Mailbox server, have this need to go to see Dovecot's official Internet cafes. Reboot the Dovecot and test for success.
Service Dovecot Restart
OpenSSL S_client-connect Mail.noisyguy.com:imaps
#如果出现下边的信息, it means success.CONNECTED (00000003)Depth=2/o=root Ca/ou=http://www.cacert.org/cn=ca Cert Signing authority/emailaddress=support@cacert.orgVerify E
need to implement Nsurlsessiondatadelegate in the URLSession:didReceiveChallenge:completionHandler: method to verify the certificate, the code is as follows:
-(void) Urlsession: (Nsurlsession *) session Didreceivechallenge: (Nsurlauthenticationchallenge *) challengeCompletionhandler: (void (^) (nsurlsessionauthchallengedisposition disposition, nsurlcredential * _Nullable credential )) Completionhandler {NSLog (@ "certificate Authentication");if ([[[[Challenge Protectionspace] authentication
copy the Certificate file to the postfix configuration directory:
Cp/usr/local/ssl/mailkey. pem/etc/postfix
Cp/usr/local/ssl/mail_signet_cert.pem/etc/postfix
The mailkey. pem file contains the server key. mail_signed_cert.pem is a public certificate signed by the ca. Because postfix cannot use a sealed private key file, you should use the strictest permission mode to protect the private key file:
Chown root/etc/postfix/mailkey. pem
Chmod 400/etc/postfix/mailkey. pem
The above command grants the
then use these three certificates to deploy the SSL server.1. Create an SSL under/usr/local/Apache/CONF. CRT directory, set ca. copy the sh file to/usr/local/Apache/CONF/SSL. CRT/directory
[Root @ win SSL] # cp/usr/local/OpenSSL/SSL/MISC/CA. sh/usr/local/Apache/CONF/SSL. CRT/CA. Sh
Copy code2. Run ca. Sh-newca. It will find a private key and password file of the CA you want. If this file does not exist? Press enter to automatically create the file. Enter the password to protect th
create the file. Enter the password to protect the file. In the future, you will need a company information to make the ca. CRT file. At last, an additional one is added to the current directory. /democa directory .. /democa/private/cakey. PEM is the key file of CA ,. /democa/cacert. PEM is the CRT file of CA.
Code: [copy to clipboard] [root @ win SSL. CRT] #./CA. Sh-newcaEnter the following information:
Quote:Country name (2 letter code) [GB]: C
certificate issuing information.
# Unique_subject = No # setting it to 'no' indicates that multiple certificates with the same subject can be created simultaneously.
New_certs_dir = $ DIR/newcerts # Set the default location for storing newly issued certificates
Certificate = $ DIR/cacert. pem # specify the CA certificate
Serial = $ DIR/serial # specify the file to store the current serial number
CRL = $ DIR/CRl. pem # current CRL
Private_key = $ DIR/
based on ssl Transmission①. Modify the configuration fileNode1:Server_id = 10Log_bin = mysql-binSync_binlog = 1 Write the binary file to the disk immediately after the transaction is committed, no longer cache and then writeNode2:Read_only = 1② Prepare the certificate and Private KeyI. Create a word visa ServerNode1:Vim/etc/pki/tls/openssl. cnfDir =/etc/pki/CA(Umask 077; openssl genrsa 2048> private/cakey. pem)Openssl req-new-x509-key private/cakey. pem-out
the following configurations.Official documentation: http://dev.mysql.com/doc/refman/5.1/en/replication-solutions-ssl.htmlThe following configuration must be performed on the basis of the master-slave replication, so only the ssl configuration options are added. For other options, refer to the master-slave replication configuration.First, apply for the certificate from the master (the certificate application process is skipped)Master (172.16.21.1 ):CA certificate:/etc/pki/CA/
subject.New_certs_dir = $ dir/newcerts # default place for new certs.Certificate = $ dir/cacert. pem # The CA certificateSerial = $ dir/serial # The current serial numberCrlnumber = $ dir/crlnumber # the current crl number# Must be commented out to leave a V1 CRLCrl = $ dir/crl. pem # The current CRLPrivate_key = $ dir/private/cakey. pem # The private keyRANDFILE = $ dir/private/. rand # private random number file...Default_days = 3650 # how long to
---
> 0. organizationName_default = Default Company Ltd
148c148
---
> # OrganizationalUnitName_default =
# Vim ../tls/openssl. cnf # ensure that the dir is in the/etc/pki/CA directory.
[CA_default]
Dir =/etc/pki/CA # Where everything is kept
# Openssl req-new-x509-key private/cakey. pem-out cacert. pem-days 3665 # generate a self-signed certificate for yourself based on the private key. This certificate can be used by the user
You are about to be a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.