Author: BIBI
Whenever we think of hackers, hackers tend to be such a portrait: A lonely person, sneaking into someone else's server to sabotage or steal other people's secret information. Perhaps he will change our homepage, who will steal the customer's credit card number and password. In addition, hackers will attack customers who visit our site. At the same time, our server has become his accomplice. Microsoft called the attack a "Cross-site script" attack. Most of these attacks occur when th
file and private key generation completed. "
echo "starts signing a server certificate with a CA root certificate signing file ..."## sign server certificate, generate SERVER.CRT file# See http://www.faqs.org/docs/securing/chap24sec195.html# sign.sh START## Sign a SSL certificate Request (CSR)# Copyright (c) 1998-1999 Ralf S. Engelschall, all Rights Reserved.#
Csr=server.csr
Case $CSR in*.CSR) cert= "' Echo $CSR | Sed-e ' s/\.csr/.crt/' ";;*
OpenSSL docs, implies-Ssl ).-Ssl-capath = name CA directory (check OpenSSL docs, implies-ssl ).-Ssl-cert = name X509 cert in PEM format (implies-ssl ).-Ssl-cipher = name SSL cipher to use (implies-ssl ).-Ssl-key = name X509 key in PEM format (implies-ssl ).-Ssl-verify-server-certVerify server's "Common Name" in its cert againstHostname used when connecting. This
certificate ----" and the suffix "---- end certificate ----". DER files are binary encoded and not readable.
When exporting a certificate from Windows, you can select three formats: DER, PEM, and P12. However, it is not clear which one is used.
Many network devices require certificates and keys to be imported in PEM format, but the Windows MMC Certificate Management Unit only allows private keys to be exported in P12 format. This is only half the success, because you also need to extract the
", "immediates", or "infinity ") -q [- -Quiet]: do not print information, or just print profile information -- diff3-cmd ARG: Use ARG as the merge command -- force: force operation run -- ignore-externals: ignore external project -- changelist ARG: only the [aliases: -- cl] -- editor-cmd ARG: Use ARG as the external editor -- accept ARG: Specifies the automatic conflict resolution action ('postone ', 'base', 'Mine-conflict ', 'theirs-conflict', 'Mine-full', 'theirs-full', 'edit', 'launch') Globa
top2.example.com
Info: Certificate Request fingerprint (SHA256 ):
5C: 72: 77: D8: 27: DF: 5A: DF: 34: EF: 25: 97: 5A: CF: 25: 29: 9F: 58: 83: A2: 61: 57: D9: 20: 7B: 1E: C0: 36: 75: 9D:
FB: FC
The client sends a certificate verification request to the master and waits for the master to sign and return the certificate.
Parameter -- server specifies the name or address of the puppet master to be connected. By default, the host named "puppet" is connected.
To modify the default host connection, yo
(only servers)Proto recv-q send-q Local address Foreign address State Pid/program NameTCP 0 0 0.0.0.0:8140 0.0.0.0:* LISTEN 5167/rubyClient:[[Email protected] ~]# puppet agent--test--verboseInfo:creating a new SSL key for CobblerInfo:caching Certificate for CAInfo:creating a new SSL certificate request for CobblerInfo:certificate Request Fingerprint (SHA256): 14:3e:29:3e:88:83:fe:20:93:03:0a:03:6b:f5:b6:98:2b:07:0c:d3:32:a7: a9:d7:a5:80:d9:d8:30:e0:a8:57Exiting; No certificate found and Waitfor
server in No-daemonize mode so that you can see the operation information (server side) in the console:$ puppet Master--no-daemonize--3.6. 2 #启动成功, you'll see this information.To edit the client puppet.conf, add the server configuration entry (agent side):cat /etc/puppet/puppet.conf[agent] ... = Master.localdomainStart agent (agent side):$ puppet Agent--testinfo:creating A new SSL key foragent1.localdomainInfo:Caching Certificate forcainfo:csr_attributesfileLoading from/etc/puppe
1. The meaning of the signatureIn order to guarantee the legal ID of each application developer, to prevent some of the open vendors from possibly confusing the installed program by using the same package name, we need to uniquely sign our released APK file to ensure consistency for each release we publish ( such as Automatic Updates will not be installed because of inconsistent versions).2. Procedure for signingA. Creating a keyB. Sign the APK using the key generated in step a3. Specific operat
,errormessage());
}
}
Fragment III,
function Curl_post_ssl ($url, $vars, $second= , $aHeader = Array ()){
$ch = Curl_init ();
Timeout period
curl_setopt ($ch,curlopt_timeout,$second);
curl_setopt ($ch,curlopt_returntransfer,1);
Set the agent here, if any.
curl_setopt ($ch,curlopt_url,$url);
curl_setopt ($ch,curlopt_ssl_verifypeer,false);
curl_setopt ($ch,curlopt_ssl_verifyhost,false);
Cert and key belong to two. Pem f
-days 3650-config./OpenSSL. CNFWill generate1. Private/cakey. pem CA private key2. cacert. pem CA Public Key, that is, the CA certificate. Public servers and clients.
6. Generate a certificate requestCertificate Signing Request (CSR ).OpenSSL req-New-nodes-out Req. pem-config./OpenSSL. CNFWill generate1. Key. pem Private Key2. Req. pem public key used to generate a certificate
7. Generate a certificateUse the "CA private key" to sign Req. pem.OpenSSL ca-out
Posted from teched INSTRUCTOR: Niu Ke
Basic concepts:
Service master key at the first layer
Backup Service master keyBackup service master key to file = 'C:/smk. Bak'Encryption by password = 'P @ ssw0rd'Restore service master key from file = 'C:/smk. Bak'Decryption by password = 'P @ ssw0rd'Layer 2 database master key1) You must create a database master key on the database before using it.Create master key encryption by password = 'P @ ssw0rd'2) use the database master key-If the database master
= (x509certinfo) cimp2.get (x509certimpl. Name
+ "." + X509certimpl. info );
} Catch (exception e ){
System. Out. println (E. getmessage ());
}
Return certinfo;
}
// Modify the validity period
Private void updatevalidity (x509certinfo Cinfo, int days ){
// Obtain the current time
Date d1 = new date ();
// The validity period is extended by N days after the current date
Date D2 = new date (d1.gettime () + days * 24*60*60 * 1000l );
// Create a validity period object
Certificatevalidity CV = ne
1. Generate a key and save it as a certificate file
Keytool-genkey-alias bogus-keysize 512-validity 3650-keyalg RSA-dname "cn = bogus.com, ou = xxx ca, O = bogus Inc, L = Stockholm, S = Stockholm, C = Se "-keypass boguspw-storepass boguspw-keystore Sean. CERT
2. Generate a keyD: \> keytool-genkey-alias Wenger-keysize 1024-keypass abcdef-keystore mykeysTore-storepass abcdef-dname "cn = Chen Sr, ou = tanglab, O = lab, L = GZ, St = Gd, c = cn"
3. Expo
During development, we often use the built-in JDK keytool to create a self-issued certificate and save it to the keystore file. If you want to import a keystore to another keystore (such as installing it on another machine without overwriting files), what should you do?
For example, we import the content with the alias Tomcat from AAA. jks to BBB. jks. The illusion is that the certificate is first exported from AAA. jks and then imported to BBB. jks.
To illustrate the error, we start from sc
In the past two days, the company needs to use digital certificates to retrieve and paste the code N years ago.
Package COM. jinhill. util; import Java. io. *; import Java. security. *; import Java. security. cert. certificateexception; import Java. security. cert. certificatefactory; import Java. security. cert. x509certificate; import Java. util. properties; p
authentication stored in the file
In this way, a self-signed certificate mycert. CRT is obtained. Note that the RFC protocol outputs the certificate in the format defined in rfc1421 and encoded in base64.
Read Certificate
Java provides a wide range of APIS for secure applications. JSSE (javatm Secure Socket Extension) of j2sdk1.4 includes the javax. Security. Certificate package and provides operation methods for certificates. Only java. Security.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.