generate the parameters used to generate the key:OpenSSL dsaparam-out dsaparam. pem 20481.2.2). Generate a key based on the generated parameters:OpenSSL gendsa-des3-out privkey. pem dsaparam. pemSee http://www.openssl.org/docs/HOWTO/keys.txt
2. Use OpenSSL to create a certificate application and a self-signed certificateIn step 2, we have already created the pri
Createovf package with Cert File
1. Environment and necessary tools
Windows 7 32bit
VMware Workstation
Openssl-0.9.8k_WIN32.zip
Ovftool 2.0.1
2. Steps
A. Create a pem file for ovf
I. Extract openssl-0.9.8k_WIN32.zip to c: \ OpenSSL
Ii.
ca. key. pem:SECRETVerifying-Enter pass phrase for ca. key. pem:SECRET# Chmod 400/etc/pki/CA/private/ca. key. pemNext, we use OpenSSL to create a public key certificate for ourselves. Assume that the certificate is saved as ca.
copied before.[Ca_default]default_crl_days= 365Make sure the following 2 lines exist under REQ (default first row is yes, line 2nd is commented)[ req ]distinguished_name = req_distinguished_namereq_extensions = v3_reqExamples of V3_REQ nodes are as follows:[ v3_req ]# 在证书请求中添加扩展# 作为最终证书,不能用此证书作为中间证书 具体表现为在查看证书中"基本约束"为 Subject Type=End EntitybasicConstraints = CA:FALSEkeyUsage = nonRepudiation, digitalSignature, keyEncipherment# 暂且理解用来扩展域名吧,DNS.1建议写服务器域名,否则在做HTTPS网站时就呵呵了(题外话), SANs是超级有用的!subject
directory, CD to the directory, the following all the current path of the command is the directory1. Generate the private key key
1
openssl genrsa -des3 -out server.key 2048
After this step is completed, the Server.key file is generated under the Cert directory2. Generate a certificate
= OptionalCommonName = SuppliedEmailAddress = Optional
......2, according to the configuration file to create the required files
[Root@localhost ~]# Touch/etc/pki/ca/index.txt[Root@localhost ~]# echo >/etc/pki/ca/serial[Root@localhost ~]# ls/etc/pki/ca/Certs CRL Index.txt newcerts private serialNote: The file name should be the same as the name in the configuration file
3. Create CA service on host A an
OpenSSL Toolkit is one of the implementation methods of SSL v2/V3 and TLS v1 protocols on Linux, and provides common encryption and decryption functions.
OpenSSLIt consists of three parts:
1:Libcrypto: an encrypted library mainly used to implement encryption and decryption.
2:Libssl: implements the SSL server-side function session Library
3:OpenSSL command line tool:/usr/bin/
online12. Do the log, often do analysisAnother implementation of the SSH protocol: dropbear(1) dropbearkey-t rsa-f/etc/dropbear/dropbear_rsa_host_key-s 2048Dropbearkey-t dss-f/etc/dropbear/dropbear_dss_host_keydropbear-p [Ip:]port-f-EOpensslThree components:OpenSSL: Multi-purpose command-line tools:Libcrypto: Cryptographic Decryption LibraryImplementation of the LIBSSL:SSL protocolPki:public Key InfrastructureCA: Issuing agencyRA: Registration Author
Tags: des style blog HTTP Io color ar OS sp
Create a Certificate Authority private key (this is your most important key ):
$ openssl req -new -newkey rsa:1024 -nodes -out ca.csr -keyout ca.key
Create your ca self-signed certificate:
$
Vsftpd is one of the FTP server software on Linux. It supports many options, one of which allows OpenSSL to encrypt data, to some extent, this can make up for the defects of the inscription transmitted when ftp transfers the account password information, which can make the FTP account more secure.
1. First, install vsftpd
# yum install vsftpd
2. Create a ca
# Cd/etc/pki/CA # mkdir certs newcerts CRL # Touch
What is OpenSSL?OpenSSL is a well-known open source Cryptography Toolkit for secure communications, including key cryptographic algorithms, common passwords, and certificate encapsulation capabilities.1. OpenSSL websiteOfficial: https://www.openssl.org/source/2. Windows installation methodThe
If you want to create a self-signed certificate that is not valid for one year, or provide additional information about yourself, you can use Open SSL to create a certificate, instead of the standard tool that comes with the SDK: makekeys.
The following command demonstrates how to create a self-Signed key/certificate
* * * full.Here is an example of HTTP, which describes how SSL works, the whole process is as follows:650) this.width=650; "title=" Ssl.png "alt=" wkiol1pvz8udsc6raahgzcg1uv0854.jpg "src=" http://s3.51cto.com/wyfs02/M02 /46/39/wkiol1pvz8udsc6raahgzcg1uv0854.jpg "/>Since SSL is a protocol that you want to implement, I can use the OpenSSL command, OpenSSL is an open source implementation of SSL, and
the upper-level Ca, the complete CA certificate chain must be provided to OpenSSL in the future.
So our work is not complete yet. Next we will construct such a CA certificate chain. In fact, it is very simple to append the Root CA certificate to the intermediate CA certificate. In the production environment, CA certificates at all levels are public. Therefore, you can append the certificates in sequence to generate a file called "CA certificate cha
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.