nginx ssl 인증서 생 성
openssl req -new -x509 -keyout server.key -out server.crt -days 365 -nodes
Home
Start off in your home directory and create a temporary folder so we can work from one place and not have files scattered all over the shop:
mkdir /home/demo/temp
...
cd /home/demo/temp
Key
First we need to create a private key. Note that this process will require a passphrase for the key - don't worry, we'll remove it later to make things easier:
openssl genrsa -des3 -out myssl.key 1024
As said, this will require you to enter a passphrase.
CSR
Now we need to create a CSR (Certificate Signing Request):
openssl req -new -key myssl.key -out myssl.csr
The process will ask for various details for the certificate. I entered the following for each question:
Country Name: GB
State or Province Name: Nottinghamshire
Locality Name: Nottingham
Organization Name: PickledOnion Ltd
Organizational Unit Name: Web Development
Common Name: admin.domain.com
Email Address: [email protected]
For the 'extra' attributes I simply pressed 'return' (i.e. I left them blank).
Note: For the Common Name I entered the domain name I want to associate with the certificate. In this case I want it for my administration area so I entered 'admin.domain.com'.
You are not restricted to using the certificate with just that domain but it will produce extra warnings if the Common Name does not match the URI.
Remove Passphrase
When we generated the myssl.key file, we had to enter a passphrase. One disadvantage of this is the need to enter the passphrase if the Slice is rebooted.
This is especially problematic if an unexpected reboot occurs as the boot sequence will simply stop until you enter the console via the SliceManager and enter it.
So unless you see a particular need to keep the passphrase, let's remove it:
cp myssl.key myssl.key.org
openssl rsa -in myssl.key.org -out myssl.key
You will be asked for the passphrase one last time to confirm it is a genuine request.
Now we have three files in the temp folder:
ls
...
myssl.csr myssl.key myssl.key.org
CRT
The last file we need generate is the actual ssl certificate:
openssl x509 -req -days 365 -in myssl.csr -signkey myssl.key -out myssl.crt
Good. Now we have the final piece in place as that generated our myssl.crt file.
주소http://articles.slicehost.com/2007/12/19/ubuntu-gutsy-self-signed-ssl-certificates-and-nginx
이 내용에 흥미가 있습니까?
현재 기사가 여러분의 문제를 해결하지 못하는 경우 AI 엔진은 머신러닝 분석(스마트 모델이 방금 만들어져 부정확한 경우가 있을 수 있음)을 통해 가장 유사한 기사를 추천합니다:
Fortinet FortiWeb Web Application Firewall Policy BypassFrom: Geffrey Velasquez Date: Wed, 2 May 2012 20:33:23 -0500...
텍스트를 자유롭게 공유하거나 복사할 수 있습니다.하지만 이 문서의 URL은 참조 URL로 남겨 두십시오.
CC BY-SA 2.5, CC BY-SA 3.0 및 CC BY-SA 4.0에 따라 라이센스가 부여됩니다.