亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? readme

?? 可以實現搭建VPN服務器
??
字號:
EASY-RSA Version 2.0-rc1This is a small RSA key management package, based on the opensslcommand line tool, that can be found in the easy-rsa subdirectoryof the OpenVPN distribution.These are reference notes.  For step-by-step instructions, see theHOWTO:http://openvpn.net/howto.htmlThis package is based on the ./pkitool script.  Run ./pkitoolwithout arguments for a detailed help message (which is also pastedbelow).Release Notes for easy-rsa-2.0* Most functionality has been consolidated into the pkitool  script. For compatibility, all previous scripts from 1.0 such  as build-key and build-key-server are provided as stubs  which call pkitool to do the real work.* pkitool has a --batch flag (enabled by default) which generates  keys/certs without needing any interactive input.  pkitool  can still generate certs/keys using interactive prompting by  using the --interact flag.* The inherit-inter script has been provided for creating  a new PKI rooted on an intermediate certificate built within a  higher-level PKI.  See comments in the inherit-inter script  for more info.* The openssl.cnf file has been modified.  pkitool will not  work with the openssl.cnf file included with previous  easy-rsa releases.* The vars file has been modified -- the following extra  variables have been added: EASY_RSA, CA_EXPIRE,  KEY_EXPIRE.* The make-crl and revoke-crt scripts have been removed and  are replaced by the revoke-full script.* The "Organizational Unit" X509 field can be set using  the KEY_OU environmental variable before calling pkitool.* This release only affects the Linux/Unix version of easy-rsa.  The Windows version (written to use the Windows shell) is unchanged.* Use the revoke-full script to revoke a certificate, and generate  (or update) the crl.pem file in the keys directory (as set by the  vars script).  Then use "crl-verify crl.pem" in your OpenVPN server  config file, so that OpenVPN can reject any connections coming from  clients which present a revoked certificate.  Usage for the script is:    revoke-full <common-name>  Note this this procedure is primarily designed to revoke client  certificates. You could theoretically use this method to revoke  server certificates as well, but then you would need to propagate  the crl.pem file to all clients as well, and have them include  "crl-verify crl.pem" in their configuration files.* PKCS#11 support was added.INSTALL easy-rsa1. Edit vars.2. Set KEY_CONFIG to point to the openssl.cnf file   included in this distribution.3. Set KEY_DIR to point to a directory which will   contain all keys, certificates, etc.  This   directory need not exist, and if it does,   it will be deleted with rm -rf, so BE   CAREFUL how you set KEY_DIR.4. (Optional) Edit other fields in vars   per your site data.  You may want to   increase KEY_SIZE to 2048 if you are   paranoid and don't mind slower key   processing, but certainly 1024 is   fine for testing purposes.  KEY_SIZE   must be compatible across both peers   participating in a secure SSL/TLS   connection.5. (Optional) If you intend to use PKCS#11,   install openssl >= 0.9.7, install the    following components from www.opensc.org:   - opensc >= 0.10.0   - engine_pkcs11 >= 0.1.3   Update the openssl.cnf to load the engine:   - Uncomment pkcs11 under engine_section.   - Validate path at dynamic_path under pkcs11_section.6. . vars7. ./clean-all8. As you create certificates, keys, and   certificate signing requests, understand that   only .key files should be kept confidential.   .crt and .csr files can be sent over insecure   channels such as plaintext email.IMPORTANTTo avoid a possible Man-in-the-Middle attack where an authorizedclient tries to connect to another client by impersonating theserver, make sure to enforce some kind of server certificateverification by clients.  There are currently four different waysof accomplishing this, listed in the order of preference:(1) Build your server certificates with specific key usage and    extended key usage. The RFC3280 determine that the following    attributes should be provided for TLS connections:    Mode      Key usage	                         Extended key usage    ---------------------------------------------------------------------------    Client    digitalSignature	                 TLS Web Client Authentication              keyAgreement              digitalSignature, keyAgreement	          Server    digitalSignature, keyEncipherment  TLS Web Server Authentication              digitalSignature, keyAgreement    Now add the following line to your client configuration:          remote-cert-tls server    This will block clients from connecting to any    server which lacks the required extension designation    in its certificate, even if the certificate has been    signed by the CA which is cited in the OpenVPN configuration    file (--ca directive).(3) Use the --tls-remote directive on the client to    accept/reject the server connection based on the common    name of the server certificate.(3) Use a --tls-verify script or plugin to accept/reject the    server connection based on a custom test of the server    certificate's embedded X509 subject details.(4) Sign server certificates with one CA and client certificates    with a different CA.  The client config "ca" directive should    reference the server-signing CA while the server config "ca"    directive should reference the client-signing CA.NOTESShow certificate fields:  openssl x509 -in cert.crt -textPKITOOL documentationpkitool 2.0Usage: pkitool [options...] [common-name]Options:  --batch    : batch mode (default)  --keysize  : Set keysize      size   : size (default=1024)  --interact : interactive mode  --server   : build server cert  --initca   : build root CA  --inter    : build intermediate CA  --pass     : encrypt private key with password  --csr      : only generate a CSR, do not sign  --sign     : sign an existing CSR  --pkcs12   : generate a combined PKCS#12 file  --pkcs11   : generate certificate on PKCS#11 token      lib    : PKCS#11 library      slot   : PKCS#11 slot      id     : PKCS#11 object id (hex string)      label  : PKCS#11 object labelStandalone options:  --pkcs11-slots   : list PKCS#11 slots      lib    : PKCS#11 library  --pkcs11-objects : list PKCS#11 token objects      lib    : PKCS#11 library      slot   : PKCS#11 slot  --pkcs11-init    : initialize PKCS#11 token DANGEROUS!!!      lib    : PKCS#11 library      slot   : PKCS#11 slot      label  : PKCS#11 token labelNotes:  Please edit the vars script to reflect your configuration,  then source it with "source ./vars".  Next, to start with a fresh PKI configuration and to delete any  previous certificates and keys, run "./clean-all".  Finally, you can run this tool (pkitool) to build certificates/keys.  In order to use PKCS#11 interface you must have opensc-0.10.0 or higher.Generated files and corresponding OpenVPN directives:(Files will be placed in the $KEY_DIR directory, defined in ./vars)  ca.crt     -> root certificate (--ca)  ca.key     -> root key, keep secure (not directly used by OpenVPN)  .crt files -> client/server certificates (--cert)  .key files -> private keys, keep secure (--key)  .csr files -> certificate signing request (not directly used by OpenVPN)  dh1024.pem or dh2048.pem -> Diffie Hellman parameters (--dh)Examples:  pkitool --initca          -> Build root certificate  pkitool --initca --pass   -> Build root certificate with password-protected key  pkitool --server server1  -> Build "server1" certificate/key  pkitool client1           -> Build "client1" certificate/key  pkitool --pass client2    -> Build password-protected "client2" certificate/key  pkitool --pkcs12 client3  -> Build "client3" certificate/key in PKCS#12 format  pkitool --csr client4     -> Build "client4" CSR to be signed by another CA  pkitool --sign client4    -> Sign "client4" CSR  pkitool --inter interca   -> Build an intermediate key-signing certificate/key                               Also see ./inherit-inter script.  pkitool --pkcs11 /usr/lib/pkcs11/lib1 0 010203 "client5 id" client5                              -> Build "client5" certificate/key in PKCS#11 tokenTypical usage for initial PKI setup.  Build myserver, client1, and client2 cert/keys.Protect client2 key with a password.  Build DH parms.  Generated files in ./keys :  [edit vars with your site-specific info]  source ./vars  ./clean-all  ./build-dh     -> takes a long time, consider backgrounding  ./pkitool --initca  ./pkitool --server myserver  ./pkitool client1  ./pkitool --pass client2Typical usage for adding client cert to existing PKI:  source ./vars  ./pkitool client-new

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99久久婷婷国产综合精品电影| 国产一区二区三区av电影 | 亚洲天堂精品在线观看| 久久综合久久综合久久综合| 欧美麻豆精品久久久久久| 欧美性极品少妇| 欧美丝袜丝交足nylons| 欧美在线一区二区| 欧美亚洲精品一区| 欧美日韩一区二区三区四区五区| 欧美中文字幕一区二区三区亚洲| 日本道免费精品一区二区三区| 一道本成人在线| 色婷婷综合中文久久一本| 欧美色视频一区| 欧美日韩激情一区二区| 欧美一区二区精品久久911| 欧美电影免费观看高清完整版| 日韩亚洲欧美成人一区| 久久夜色精品国产欧美乱极品| 久久欧美中文字幕| 国产精品免费看片| 亚洲美女精品一区| 天天色图综合网| 久久国产生活片100| 国产福利91精品| 91亚洲男人天堂| 欧美三级视频在线播放| 欧美一二区视频| 国产人妖乱国产精品人妖| 中文字幕一区二区在线观看| 一区二区三区四区乱视频| 亚洲成av人影院| 韩国欧美国产一区| 丁香啪啪综合成人亚洲小说| 色狠狠综合天天综合综合| 欧美理论电影在线| 久久综合色之久久综合| 最新中文字幕一区二区三区 | 不卡高清视频专区| 欧美性xxxxxx少妇| 久久综合九色综合97婷婷 | 成人午夜激情在线| 欧美亚洲日本一区| 久久久www免费人成精品| 一区二区三区中文在线| 麻豆精品视频在线| 色婷婷综合五月| www成人在线观看| 亚洲一区欧美一区| 国产精品一级片在线观看| 91高清视频在线| 亚洲精品一区二区三区蜜桃下载| 中文字幕一区免费在线观看| 免费高清成人在线| 成人高清伦理免费影院在线观看| 欧美性视频一区二区三区| 久久亚洲春色中文字幕久久久| 亚洲另类春色国产| 国产乱理伦片在线观看夜一区| 欧美在线观看你懂的| 中文字幕免费观看一区| 日本在线不卡视频| 色天使色偷偷av一区二区| 国产午夜精品久久久久久免费视 | 国产99久久精品| 欧美日精品一区视频| 欧美高清在线一区| 免费观看成人av| 欧美日韩色一区| 国产精品污网站| 欧美日本在线播放| 亚洲精品欧美激情| 国产精品自拍网站| 久久黄色级2电影| 国产精品亚洲午夜一区二区三区 | 美女www一区二区| 91久久国产最好的精华液| 久久久久久99精品| 日日夜夜精品视频天天综合网| fc2成人免费人成在线观看播放| 日韩一二三区视频| 亚洲午夜电影网| 91香蕉视频mp4| 中文字幕巨乱亚洲| 精品一区二区在线播放| 欧美伦理影视网| 亚洲国产va精品久久久不卡综合| 精品少妇一区二区三区视频免付费| 99riav一区二区三区| 久久久精品中文字幕麻豆发布| 日日骚欧美日韩| 欧美日韩在线播放一区| 亚洲免费成人av| 99久精品国产| 日韩伦理av电影| 成人手机电影网| 国产精品你懂的在线| 国产一区不卡在线| 久久综合久久综合亚洲| 久久99热国产| 久久久美女毛片| 国产精品一二三四区| 欧美精品一区在线观看| 激情综合色综合久久| 日韩女优制服丝袜电影| 九九**精品视频免费播放| 日韩亚洲欧美综合| 精品在线免费视频| 久久综合久久久久88| 国产福利一区二区| 国产精品天干天干在线综合| 成人激情小说乱人伦| 国产精品国产三级国产| www.爱久久.com| 亚洲精品五月天| 欧美亚洲动漫制服丝袜| 亚洲一区二区三区不卡国产欧美| 精品视频一区二区不卡| 五月激情六月综合| 欧美一级日韩不卡播放免费| 美女在线视频一区| www国产精品av| 成人av在线播放网址| 亚洲免费色视频| 欧美亚洲一区二区在线| 日韩电影在线一区二区| 久久夜色精品一区| 成人av免费网站| 一区二区欧美精品| 制服丝袜成人动漫| 精品综合免费视频观看| 国产亚洲一区二区三区在线观看 | 欧美不卡一区二区三区四区| 国内精品第一页| 亚洲欧美另类图片小说| 欧美日韩精品系列| 韩国三级中文字幕hd久久精品| 日本一区二区视频在线观看| 91麻豆123| 免费成人在线网站| 国产精品美女久久久久久久久久久 | 欧美激情中文字幕| 91麻豆swag| 精品一区二区久久| 中文字幕一区二区三区av| 欧美人体做爰大胆视频| 国产一区二区三区不卡在线观看| 久久精品夜色噜噜亚洲aⅴ| 91视频国产资源| 日韩av一级片| 国产精品视频一二三| 韩国女主播一区| 91久久线看在观草草青青| 91久久香蕉国产日韩欧美9色| 欧美丰满少妇xxxbbb| 一区二区三区欧美日韩| 成人av免费在线| 奇米精品一区二区三区四区| 国产欧美日韩精品一区| 欧美综合欧美视频| 国产精品影视网| 午夜精品久久久久久| 亚洲国产成人在线| 日韩美女天天操| 欧美手机在线视频| 国产69精品久久久久毛片| 图片区小说区区亚洲影院| 国产精品午夜久久| 欧美成人三级电影在线| 97久久精品人人澡人人爽| 久久久久久久综合色一本| 国产精品国产三级国产aⅴ原创| 9i看片成人免费高清| 国产成人精品影视| 日韩一区二区在线看| 国产精品视频一二三| 日韩国产一二三区| 欧美久久久久久蜜桃| 久久影音资源网| 亚洲观看高清完整版在线观看| 国产一区二区三区在线观看免费视频| 欧美一区二区三区成人| 天堂av在线一区| 日韩理论片一区二区| 久久―日本道色综合久久 | 欧美一区二区三区白人| 色婷婷久久久亚洲一区二区三区| 国产一区三区三区| 麻豆一区二区在线| 视频一区二区不卡| 亚洲成人av一区二区三区| 亚洲欧洲中文日韩久久av乱码| 国产欧美中文在线| 久久这里只精品最新地址| 日韩欧美二区三区| 日韩欧美一级二级三级久久久| 欧美日韩久久一区| 欧日韩精品视频| 色婷婷亚洲精品|