HTTPS connection set SSL protocol (SSL Protocol) and Encryption Suite (SSL Cipher suite)JustAll rights reservedSSL ( securesockets Layer Secure Sockets Layer) and its successor Transport Layer Security ( transportlayer security tls tls and ssl Linux after installing the OpenSSL in the future, it will generally support SSLv2 (It is unsafe, not recommended), SSLv3 , TLSv1 These secure transport protocols (recommended). Depending on your actual needs, generate a certificate, select the
for the Java 6 client.?2, in order to solve the above problem, we need to use the APR connector to implement HTTPS. Apr is dependent on OpenSSL for HTTPS, and APR connectors are better than Bio/nio/nio2 connectors, not only in terms of performance or functionality. Before you configure the APR connector for Tomcat, you need to install APR and OpenSSL first, see the "Apr issues" subsection.?3. Modify the configuration of the Server.xml Connector (Connector) in Tomcat and reboot Tomcat when set u
#ServerAdmin [email protected]//Comment out #Errorlog "/usr/local/apache2/logs/error_log"//commented out #Transferlog "/usr/local/apache2/logs/access_log"//commented out........... Slightly part of the content ......Sslengine on//encryption enabled engine........... Slightly part of the content ......Sslcertificatefile "/usr/local/apache2/ssl/ httpd. CRT "//Certificate Location........... Slightly part of the content ......Sslcertificatekeyfile "/usr/local/apache2/ssl/Httpd.key"//Secre
. /ca/ca-cert.pem-cakey. /ca/ca-key.pem-cacreateserial-days 36
OpenSSL x509-in Client-cert.pem-noout-text-modulus
4. Export the certificate to a browser-supported. P12 Format:
OpenSSL pkcs12-export-clcerts-in Client-cert.pem-inkey client-key.pem-out client.p12
Password: Changeit
To generate a JKs file from a CA certificate
Keytool-keystore truststore.jks-keypass 123456-storepass 123456-alias ca-import-trustcacerts-file ~/ca/ca-cert.pem
Import Certificate
Import Ca-cert.p12 as a trust
access in sites-available. To facilitate creation, we can CP defaultSSL. Then modifySSL,
ModifySSLPortNamevirtualhost*: 443Then add the SSL authentication information, which should be the simplest configuration. For details, I have not carefully understood it.Sslcertificatefile/etc/apache2/SSL/Apache. pem# Xxx.xxx.com-SSL. CRTSslcertificatekeyfile/etc/apache2/SSL/Apache. pem# Xxx.xxx.com-SSL. KeyBrowsermatch "MSIE [1-4]" nokeepaliveSSL-Unclean-Shutdown# Downgrade-1.0 force-response-1.0 // these
negotiate . # See the MOD_SSL documentation for a complete list. Sslprotocol all# SSL Cipher suite:# List The ciphers that the client was permitted to negotiate.# see the Mod_ssl doc Umentation for a complete list. Sslciphersuite ecdhe-rsa-aes256-sha384:ecdhe-rsa-aes128-sha256:aes128-gcm-sha256:rc4:high:! md5:!anull:! EDH # SSL Honer Cipher Suite order:# forces the order of allowed Cipher suites to the order above.# see the Mod_ssl DocumEntation for
trusty main'sudo apt-get updateSudo apt-get upgrade wiresharksudo apt-get install wireshark
In this case, you can decrypt https in wireshark to view the http content.
4. Notes
1. SometimesDiffie-HellmanYou can try the following CipherSuite.
SSLCipherSuite RC4-SHA
2. Sometimes the session cache will be affected. You can modify the SSLSessionCache In the mod-available/ssl. conf file as follows:
SSLSessionCache none#SSLSessionCacheTimeout 300
3.
-server.csr.
Note that when you execute the second command, the Common Name option should enter the server domain Name. Otherwise, an additional prompt will appear each time you access the server through https.
Use commands
Openssl x509-in mars-server.crt-text-noout
You can view the contents of a mars-server.crt file.
2. configure the Apache server
First, create the/etc/apache2/ssl directory and copy the my-ca.crt, mars-server.key, and mars-server.crt files you just created to this director
letter as soon as possible! will be able to handle the SSL error.Question: Why do I receive a "No shared cipher" error when using the anonymous Diffie-hellman (ADH) algorithm?By default, OpenSSL does not enable the ADH algorithm for security reasons. You can enable this algorithm only if you do understand the side effects of the algorithm.In order to use the anonymous Diffie-hellman (ADH) algorithm, you must use the "-dssl_allow_adh" configuration option when you compile OpenSSL and add "ADH" t
: Why do I receive a "No shared cipher" error when using the anonymous Diffie-hellman (ADH) algorithm?By default, OpenSSL does not enable the ADH algorithm for security reasons. You can enable this algorithm only if you do understand the side effects of the algorithm.In order to use the anonymous Diffie-hellman (ADH) algorithm, you must use the "-dssl_allow_adh" configuration option when you compile OpenSSL and add "ADH" to the sslciphersuite directiv
Ubuntu12.04 use apache to do puppetmaster authentication service premise: aptitude-yinstallpuppetaugeas-toolsaptitude-yinstallpuppetmastersqlite3libsqlite3-rubylibactiverecord-rubygitrakewww.2c ..
Ubuntu 12.04 use apache for puppetmaster authentication service prerequisites: aptitude-y install puppet augeas-toolsaptitude-y install puppetmaster sqlite3 libsqlite3-ruby libactiverecord-ruby git rake www.2cto.com has been installed puppetmaster end 1. install software apt-get install apache2 libapac
that you manually disable SSLv3 support on the client, or disable SSLv3 support on the server, or disable both of them to effectively prevent the impact of the poodle vulnerability on you.
Disable SSLv3 support:
Nginx:
Ssl_protocols tlsv1 tlsv1.1 tlsv1.2;
Ssl_prefer_server_ciphers on;
Ssl_ciphers ECDHE-RSA-AES256-GCM-SHA384: ECDHE-RSA-AES128-GCM-SHA256: ECDHE-RSA-AES256
Sha384: ECDHE-RSA-AES128-SHA256: ECDHE-RSA-RC4-SHA: ECDHE-RSA-AES256-SHA: DHE-RSA-AES256-SHA: DHE
RSA-AES128-SHA: RC4-SHA :!
related to the operating system and installation method), look for the following configuration statement in the configuration file:# Add the SSL protocol support Protocol, remove the insecure protocol Sslprotocol TLSV1 TLSv1.1 tlsv1.2# Modify the encryption suite as follows Sslciphersuite Ecdhe-rsa-aes128-gcm-sha256:ecdhe: ecdh:aes:high:! null:!anull:! md5:! Adh:! rc4# Certificate Public key configuration Sslcertificatefile cert/public.pem# certifica
www.example.comServeralias example.comSslengine onSslprotocol TLSv1 TLSv1.1 TLSv1.2Sslciphersuite high:medium:!anull:! MD5Sslcertificatefile "D:\phpStudy\Apache\cert\public.pem"Sslcertificatekeyfile "D:\phpStudy\Apache\cert\21564852664745.key"Sslcertificatechainfile "D:\phpStudy\Apache\cert\chain.pem"Options +indexes +followsymlinks +execcgiAllowOverride AllOrder Allow,denyAllow from allRequire all grantedNote: The domain name information is replaced with the domain name of the application SSL
/html/index.html
Www.downcc.com
[Root@localhost html]#
4. Configure Apache to support HTTPS access to the www.downcc.com site, edit vim/etc/httpd/conf.d/ssl.conf files, and make www.downcc.com site HTTPS access information. Add the following configuration.
DocumentRoot "/var/www/html/www.kuteatest.net" #//in order to display the effect, the site directory here is not the same, generally a domain name should point to the same directory.
ServerName www.downcc.com:443
ErrorLog Logs/ssl_erro
extension has been mentioned above. Another requirement is that you cannot use cryptographic algorithms in a specific blacklist.
Although the current version of MOD_H[TTP]2 does not enhance these algorithms (which may later), most clients do so. If your browser uses an inappropriate algorithm to open the H2 server, you will see an ambiguous warning inadequate_security that the browser will reject the connection.
A viable Apache SSL configuration is similar:
:# allows all passwords to be used during the initial handshake phase, # to allow the external server to elevate the password group sslciphersuite through the SGC function all:! adh:rc4+rsa:+high:+medium:+low:+sslv2:+exp:+enull
6, create a secure PHP script
There are many programming tips to make PHP scripts run more securely. One of the most important is to use some security common sense. Running PHP is more secure than run
. the virtual host configuration file name is assumed to be svn:
Cp/etc/apache2/sites-available/default/etc/apache2/sites-available/svn
Edit it:
Vim/etc/apache2/sites-available/svn
Make the following modifications and additions:
Namevirtualhost*: 443
SSLEngine
SSLCertificateFile/etc/apache2/ssl/apache. pem
SSLProtocol all
SSLCipherSuite HIGH: MEDIUM
......
5. make the VM take effect:
A2ensite svn
/Etc/init. d/apache2 restart
6. c
caucho-request xtpAddHandler caucho-request vm
2. Modify the ssl configuration file:Vi/usr/local/apache/conf/extra/httpd-ssl.confChange dingl.com to the following format:
Listen 443.
AddType application/x-x509-ca-cert. crtAddType applications/x-pkcs7-crl. crl
SSLPassPhraseDialog builtin
SSLSessionCache "shmcb:/usr/local/apache/logs/ssl_scache (512000 )"SSLSessionCacheTimeout 300
SSLMutex "file:/usr/local/apache/logs/ssl_mutex"
### SSL Virtual Host Context##
# General setup for the virtual hos
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.