Learn about how to generate ssl certificate in linux, we have the largest and most updated how to generate ssl certificate in linux information on alibabacloud.com
protocol.
Therefore, the relationship between the three is clear: HTTPS relies on a way of implementation, the current common is SSL, digital certificate is to support this secure communication files. There is also SSL-derived TLS and WTLS, the former is Ieft SSL standardization (TSL1.0), and the
relies on a way of implementation, the current common is SSL, digital certificate is to support this secure communication files. There is also SSL-derived TLS and WTLS, the former is Ieft SSL standardization (TSL1.0), and the SSL difference is very small, the latter is used
OpenSSL self-built certificate SSL + Apache
I have prepared it. Well, the following is my note. For details, enter the author name: wingger.In this article, we will test the certificate on Linux9 + apache2.0.52, tomcat5.5.6, j2se1.5, and openssl0.97.The purpose of this article is to communicate. If any errors occur, please advise.Reprinted, please indica
First, you need to understand some basic concepts before installing
1. Certificates used by SSL can be self-generated or signed by a commercial ca such as Verisign or thawte.
2. Certificate concept: First, you must have a root certificate, and then use the root certificate to issue the server
:
12345
Using configuration from /usr/lib/ssl/openssl.cnfCheck that the request matches the signatureSignature okThe stateOrProvinceName field needed to be the same in theCA certificate (GuangDong) and the request (GuangDong)
touch index.txt serial:Create two initial files in the CA directory:
12
# touch index.txt serial# echo 01 > serial
1.2
SSL is a commonly used WEB Service encryption channel. Its full name is Secure Socket Layer, which is also known as the Secure sockets interface. It uses digital certificates to ensure its security mechanism. The main function is encryption and authentication to protect the security of network transmission. It is in the middle of the HTTP and TCP layers.
SSL encryption and authentication use public keys and
(AbstractPooledConnAdapter.java:146)11-26 15:35:01.920: W/System.err(353): at org.apache.http.impl.client.DefaultRequestDirector.establishRoute(DefaultRequestDirector.java:654)11-26 15:35:01.920: W/System.err(353): at org.apache.http.impl.client.DefaultRequestDirector.execute(DefaultRequestDirector.java:370)11-26 15:35:01.920: W/System.err(353): at org.apache.http.impl.client.AbstractHttpClient.execute(AbstractHttpClient.java:555)11-26 15:35:01.920: W/System.err(353): at org.apache.http.impl
derived from SSL. The former is generated after Ieft standardizes SSL (tsl1.0), which is slightly different from SSL and the latter is used in TSL in wireless environments.
How to encrypt
Common EncryptionAlgorithm
Symmetric cryptographic algorithms: the same key is used for encryption and decryption. Typical cryptographic algorithms include des, R
holder of the certificate, the public key of the holder, and the signature of the signer, among others
Note: In cryptography, the number is a standard, the specification of public key authentication, certificate revocation list, authorization credentials, credential path verification algorithm.
Steps to create a self-signed certificate
Turn from: HTTPS Unidirectional authentication Instructions _ digital certificate, digital signature, SSL (TLS), SASLBecause TLS + SASL is used in the project to do the security authentication layer. So read some online information, here to do a summary.1. First recommend several articles:Digital certificate: http://www.cnblogs.com/hyddd/archive/2009/01/07/137129
file and private key generation completed. "
echo "starts signing a server certificate with a CA root certificate signing file ..."## sign server certificate, generate SERVER.CRT file# See http://www.faqs.org/docs/securing/chap24sec195.html# sign.sh START## Sign a SSL
balancer to the Tomcat server, which means that the application server loses the ability to acquire the x-forwarded-* header, which contains the client IP address, port, and protocol used.
There are two combinations of strategies, that is, the third, the SSL connection terminates at the load balancer, adjusts on demand, and then proxies to the backend server as a new SSL connection. This may provide ma
(also the TCP client) sends a Clienth*llo after the TCP link is established, which contains the list of algorithms that it can implement and some other required messages.2. The server side of SSL responds to a Serverh*llo, which determines the algorithm required for this communication, and then sends its own certificate (which contains the identity and its own public key).3. When the client receives this m
certificate is to support this secure communication files. There is also SSL-derived TLS and WTLS, the former is Ieft SSL standardization (TSL1.0), and the SSL difference is very small, the latter is used in the wireless environment of the TSL.How to encryptCommon encryption Algorithms
Symmetric cipher algori
://www.wosign.com/support/images/My_account/My_ Account_user_guide_freessl_clip_image002_0001.png "/>3. Generate OrderAfter completing the application information, click "Submit Request" to automatically jump to "my Orders" page, click "Verify Domain Name" To verify the domain name, complete the domain verification to enter the next step.650) this.width=650; "height=" 253 "alt=" Free SSL
server requires the customer's identity authentication, the server must check the validity of the customer's certificate and signature random number. The specific validity verification process includes: whether the customer's certificate is valid on the date of use, whether the CA that provides the certificate is reliable, whether the public key of the CA can pr
must check the validity of the customer's certificate and signature random number. The specific validity verification process includes: whether the customer's certificate is valid on the date of use, whether the CA that provides the certificate is reliable, whether the public key of the CA can properly unbind the digital signature of the CA that issues the
Recently to do an SSL application, two-way authentication with SSL means that when the client connects to the server, both sides of the link have to authenticate each other's digital certificate to ensure that it is authorized to be able to connect. When we link general SSL with one-way authentication, the client only
don't have to bother to go straight to the chase.Ii. using OpenSSL to generate SSL Key and CSRBecause only the browser or the system trusted CA can let all visitors unobstructed access to your encrypted site, rather than a certificate error prompts. So we skip the steps from the visa book and start signing up for a third-party trusted
start with "Https; 2. A small yellow lock must appear on the IE browser's status bar.
How to apply for an SSL Certificate
Generally, the SSL server certificate application process is roughly as follows: the website administrator runs the certificate application package Ge
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.