亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ssl_faq.html.en

?? Apache_2.0.59-Openssl_0.9 配置tomcat. Apache_2.0.59-Openssl_0.9 配置tomcat.
?? EN
?? 第 1 頁 / 共 4 頁
字號:
<li><a href="#passphrase">How can I change the pass-phrase on my private 
key file?</a></li>
<li><a href="#removepassphrase">How can I get rid of the pass-phrase 
dialog at Apache startup time?</a></li>
<li><a href="#verify">How do I verify that a private key matches its 
Certificate?</a></li>
<li><a href="#badcert">Why do connections fail with an "alert bad 
certificate" error?</a></li>
<li><a href="#keysize">Why does my 2048-bit private key not work?</a></li>
<li><a href="#hashsymlinks">Why is client authentication broken after 
upgrading from SSLeay version 0.8 to 0.9?</a></li>
<li><a href="#pemder">How can I convert a certificate from PEM to DER 
format?</a></li>
<li><a href="#verisign">Why can't I find the
<code>getca</code> or <code>getverisign</code> programs mentioned by
Verisign, for installing my Verisign certificate?</a></li>
<li><a href="#sgc">Can I use the Server Gated Cryptography (SGC)
facility (aka Verisign Global ID) with mod_ssl?</a></li>
<li><a href="#gid">Why do browsers complain that they cannot
verify my Verisign Global ID server certificate?</a></li>
</ul>

<h3><a name="keyscerts" id="keyscerts">What are RSA Private Keys, CSRs and Certificates?</a></h3>
<p>An RSA private key file is a digital file that you can use to decrypt
    messages sent to you. It has a public component which you distribute (via
    your Certificate file) which allows people to encrypt those messages to
    you.</p>
    <p>A Certificate Signing Request (CSR) is a digital file which contains
    your public key and your name. You send the CSR to a Certifying Authority
    (CA), who will convert it into a real Certificate, by signing it.</p> 
    <p>A Certificate contains your
    RSA public key, your name, the name of the CA, and is digitally signed by
    the CA. Browsers that know the CA can verify the signature on that
    Certificate, thereby obtaining your RSA public key. That enables them to
    send messages which only you can decrypt.</p>
    <p>See the <a href="ssl_intro.html">Introduction</a> chapter for a general
    description of the SSL protocol.</p>


<h3><a name="startup" id="startup">Is there a difference on startup between 
    the original Apache and an SSL-aware Apache?</a></h3>
<p>Yes. In general, starting Apache with 
    <code class="module"><a href="../mod/mod_ssl.html">mod_ssl</a></code> built-in is just like starting Apache 
    without it. However, if you have a passphrase on your SSL private 
    key file, a startup dialog will pop up which asks you to enter the 
    pass phrase.</p>
    
    <p>Having to manually enter the passphrase when starting the server 
    can be problematic - for example, when starting the server from the 
    system boot scripts. In this case, you can follow the steps
    <a href="#removepassphrase">below</a> to remove the passphrase from
    your private key.</p>


<h3><a name="selfcert" id="selfcert">How do I create a self-signed SSL 
Certificate for testing purposes?</a></h3>
    <ol>
    <li>Make sure OpenSSL is installed and in your <code>PATH</code>.<br />
    <br />
    </li>
    <li>Run the following command, to create <code>server.key</code> and
        <code>server.crt</code> files:<br />
	<code><strong>$ openssl req -new -x509 -nodes -out server.crt 
			-keyout server.key</strong></code><br />
	These can be used as follows in your <code>httpd.conf</code> 
	file:
        <pre>
             SSLCertificateFile    /path/to/this/server.crt
             SSLCertificateKeyFile /path/to/this/server.key
	</pre>
    </li>
    <li>It is important that you are aware that this 
	<code>server.key</code> does <em>not</em> have any passphrase.
	To add a passphrase to the key, you should run the following 
	command, and enter &amp; verify the passphrase as requested.<br />
	<p><code><strong>$ openssl rsa -des3 -in server.key -out 
	server.key.new</strong></code><br />
	<code><strong>$ mv server.key.new server.key</strong></code><br /></p>
	Please backup the <code>server.key</code> file, and the passphrase 
	you entered, in a secure location.
    </li>
    </ol>


<h3><a name="realcert" id="realcert">How do I create a real SSL Certificate?</a></h3>
<p>Here is a step-by-step description:</p>
    <ol>
    <li>Make sure OpenSSL is installed and in your <code>PATH</code>.
    <br />
    <br />
    </li>
    <li>Create a RSA private key for your Apache server
       (will be Triple-DES encrypted and PEM formatted):<br />
       <br />
       <code><strong>$ openssl genrsa -des3 -out server.key 1024</strong></code><br />
       <br />
       Please backup this <code>server.key</code> file and the
       pass-phrase you entered in a secure location.
       You can see the details of this RSA private key by using the command:<br />

       <br />
       <code><strong>$ openssl rsa -noout -text -in server.key</strong></code><br />
       <br />
       If necessary, you can also create a decrypted PEM version (not 
       recommended) of this RSA private key with:<br />
       <br />
       <code><strong>$ openssl rsa -in server.key -out server.key.unsecure</strong></code><br />
       <br />

    </li>
    <li>Create a Certificate Signing Request (CSR) with the server RSA private
       key (output will be PEM formatted):<br />
       <br />
       <code><strong>$ openssl req -new -key server.key -out server.csr</strong></code><br />
       <br />
       Make sure you enter the FQDN ("Fully Qualified Domain Name") of the
       server when OpenSSL prompts you for the "CommonName", i.e. when you
       generate a CSR for a website which will be later accessed via
       <code>https://www.foo.dom/</code>, enter "www.foo.dom" here.
       You can see the details of this CSR by using<br />

       <br />
       <code><strong>$ openssl req -noout -text -in server.csr</strong></code><br />
       <br />
    </li>
    <li>You now have to send this Certificate Signing Request (CSR) to
       a Certifying Authority (CA) to be signed. Once the CSR has been 
       signed, you will have a real Certificate, which can be used by
       Apache. You can have a CSR signed by a commercial CA, or you can 
       create your own CA to sign it.<br />
       Commercial CAs usually ask you to post the CSR into a web form, 
       pay for the signing, and then send a signed Certificate, which 
       you can store in a server.crt file. For more information about 
       commercial CAs see the following locations:<br />
       <br />
       <ol>
       <li>  Verisign<br />
             <a href="http://digitalid.verisign.com/server/apacheNotice.htm">
             http://digitalid.verisign.com/server/apacheNotice.htm
             </a>
       </li>
       <li>  Thawte<br />
         <a href="http://www.thawte.com/">http://www.thawte.com/</a>
       </li>
       <li>  CertiSign Certificadora Digital Ltda.<br />
             <a href="http://www.certisign.com.br">
             http://www.certisign.com.br
             </a>
       </li>
       <li>  IKS GmbH<br />
             <a href="http://www.iks-jena.de/leistungen/ca/">
             http://www.iks-jena.de/leistungen/ca/
             </a>
       </li>
       <li>  Uptime Commerce Ltd.<br />
             <a href="http://www.uptimecommerce.com">
             http://www.uptimecommerce.com
             </a>
       </li>
       <li>  BelSign NV/SA<br />
             <a href="http://www.belsign.be">
             http://www.belsign.be
             </a>
       </li>
       </ol>

       For details on how to create your own CA, and use this to sign
       a CSR, see <a href="#ownca">below</a>.<br />
       
       Once your CSR has been signed, you can see the details of the 
       Certificate as follows:<br />
       <br />
       <code><strong>$ openssl x509 -noout -text -in server.crt</strong></code><br />

    </li>
    <li>You should now have two files: <code>server.key</code> and
    <code>server.crt</code>. These can be used as follows in your
    <code>httpd.conf</code> file:
       <pre>
       SSLCertificateFile    /path/to/this/server.crt
       SSLCertificateKeyFile /path/to/this/server.key
       </pre>
       The <code>server.csr</code> file is no longer needed.
    </li>

    </ol>


<h3><a name="ownca" id="ownca">How do I create and use my own Certificate Authority (CA)?</a></h3>
    <p>The short answer is to use the <code>CA.sh</code> or <code>CA.pl</code>
    script provided by OpenSSL. Unless you have a good reason not to, 
    you should use these for preference. If you cannot, you can create a
    self-signed Certificate as follows:</p>
    
    <ol>
    <li>Create a RSA private key for your server
       (will be Triple-DES encrypted and PEM formatted):<br />
       <br />
       <code><strong>$ openssl genrsa -des3 -out server.key 1024</strong></code><br />
       <br />
       Please backup this <code>host.key</code> file and the
       pass-phrase you entered in a secure location.
       You can see the details of this RSA private key by using the 
       command:<br />
       <code><strong>$ openssl rsa -noout -text -in server.key</strong></code><br />
       <br />
       If necessary, you can also create a decrypted PEM version (not 
       recommended) of this RSA private key with:<br />
       <br />
       <code><strong>$ openssl rsa -in server.key -out server.key.unsecure</strong></code><br />
       <br />
    </li>
    <li>Create a self-signed Certificate (X509 structure)
       with the RSA key you just created (output will be PEM formatted):<br />
       <br />
       <code><strong>$ openssl req -new -x509 -nodes -sha1 -days 365 
		       -key server.key -out server.crt</strong></code><br />
       <br />
       This signs the server CSR and results in a <code>server.crt</code> file.<br />
       You can see the details of this Certificate using:<br />
       <br />
       <code><strong>$ openssl x509 -noout -text -in server.crt</strong></code><br />
       <br />
    </li>
    </ol>


<h3><a name="passphrase" id="passphrase">How can I change the pass-phrase on my private key file?</a></h3>
<p>You simply have to read it with the old pass-phrase and write it again,
    specifying the new pass-phrase. You can accomplish this with the following
    commands:</p>

    
    <p><code><strong>$ openssl rsa -des3 -in server.key -out server.key.new</strong></code><br />
    <code><strong>$ mv server.key.new server.key</strong></code><br /></p>
    
    <p>The first time you're asked for a PEM pass-phrase, you should
    enter the old pass-phrase. After that, you'll be asked again to 
    enter a pass-phrase - this time, use the new pass-phrase. If you
    are asked to verify the pass-phrase, you'll need to enter the new 
    pass-phrase a second time.</p>


<h3><a name="removepassphrase" id="removepassphrase">How can I get rid of the pass-phrase dialog at Apache startup time?</a></h3>
<p>The reason this dialog pops up at startup and every re-start
    is that the RSA private key inside your server.key file is stored in
    encrypted format for security reasons. The pass-phrase is needed decrypt
    this file, so it can be read and parsed. Removing the pass-phrase 
    removes a layer of security from your server - proceed with caution!</p>
    <ol>
    <li>Remove the encryption from the RSA private key (while
       keeping a backup copy of the original file):<br />
       <br />
       <code><strong>$ cp server.key server.key.org</strong></code><br />
       <code><strong>$ openssl rsa -in server.key.org -out server.key</strong></code><br />

       <br />
    </li>
    <li>Make sure the server.key file is only readable by root:<br />
       <br />
       <code><strong>$ chmod 400 server.key</strong></code><br />

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲一区二区三区视频在线| 91色乱码一区二区三区| 国产成人欧美日韩在线电影| 91黄视频在线| 久久青草欧美一区二区三区| 亚洲一区二区五区| 成人国产精品视频| 日韩一区二区影院| 亚洲国产精品一区二区www在线| 成人性生交大片免费看视频在线| 3d成人动漫网站| 夜夜操天天操亚洲| 福利一区福利二区| 精品91自产拍在线观看一区| 亚洲成人一区在线| 91网站在线播放| 亚洲欧洲成人av每日更新| 国产精品综合视频| 日韩精品一区二区三区视频在线观看| 亚洲在线观看免费| 欧美丝袜自拍制服另类| 国产精品国产自产拍高清av| 国产精品99久久不卡二区| 日韩美女视频在线| 三级亚洲高清视频| 6080yy午夜一二三区久久| 亚洲国产精品久久艾草纯爱| 91极品视觉盛宴| 亚洲国产aⅴ天堂久久| 在线视频欧美精品| 夜夜揉揉日日人人青青一国产精品| 色综合久久久久综合体桃花网| 国产精品成人一区二区艾草| av在线免费不卡| 亚洲日本在线a| 色94色欧美sute亚洲线路一ni| 亚洲蜜臀av乱码久久精品蜜桃| 成人免费毛片app| 亚洲视频小说图片| 日本韩国欧美在线| 亚洲最大成人网4388xx| 欧美日韩在线播放一区| 三级一区在线视频先锋 | 91猫先生在线| 亚洲激情自拍视频| 欧美人牲a欧美精品| 日韩黄色在线观看| 久久综合中文字幕| 成人免费毛片高清视频| 亚洲综合色视频| 日韩一区二区三区在线视频| 国产一区二区精品久久| 欧美极品aⅴ影院| 色哟哟精品一区| 免费精品99久久国产综合精品| 精品三级在线观看| proumb性欧美在线观看| 亚洲精品日韩一| 欧美老女人在线| 国产精品亚洲一区二区三区妖精| 国产精品传媒入口麻豆| 欧美精选一区二区| 国产成人综合视频| 亚洲国产一区二区视频| 久久久91精品国产一区二区精品| 91原创在线视频| 免费黄网站欧美| 中文字幕亚洲在| 日韩一区二区三区视频| 成人黄色电影在线 | 成人看片黄a免费看在线| 综合分类小说区另类春色亚洲小说欧美| 色婷婷av一区二区三区大白胸| 天天av天天翘天天综合网| 久久久久久久综合狠狠综合| 色综合久久66| 国产在线一区观看| 亚洲高清在线视频| 国产精品久久久久久久岛一牛影视| 欧美午夜免费电影| 成人av资源下载| 久久国产精品99精品国产| 亚洲乱码国产乱码精品精可以看| 欧美成人r级一区二区三区| 91社区在线播放| 懂色av一区二区三区免费观看| 日韩精品一级中文字幕精品视频免费观看 | 国产一区二区在线看| 一区二区三区中文在线观看| 精品国产1区二区| 欧美日韩成人一区| caoporn国产一区二区| 国模大尺度一区二区三区| 午夜精品在线看| 亚洲卡通欧美制服中文| 中文字幕一区二区三区在线不卡 | 成人免费视频网站在线观看| 精品一区二区三区免费观看| 亚洲第一久久影院| 亚洲欧美视频在线观看视频| 国产精品沙发午睡系列990531| 欧美成人a在线| 欧美一区二区精品久久911| 欧美日韩色综合| 欧美专区亚洲专区| 色综合久久中文综合久久牛| 91在线视频在线| a亚洲天堂av| 97精品久久久久中文字幕| 国产传媒欧美日韩成人| 国产久卡久卡久卡久卡视频精品| 精品一区二区三区在线播放| 理论片日本一区| 美国三级日本三级久久99| 久久精品国产一区二区| 激情综合亚洲精品| 老司机精品视频线观看86| 美女视频免费一区| 精品一区二区三区视频| 国产一区啦啦啦在线观看| 国产成人精品免费视频网站| 国产成人精品综合在线观看| 国产91清纯白嫩初高中在线观看| 国产精品69久久久久水密桃| 国产综合色精品一区二区三区| 国产精品自在在线| 不卡视频免费播放| 99在线精品观看| 在线观看视频一区二区| 欧美乱妇15p| 欧美成人激情免费网| 欧美tickling挠脚心丨vk| 久久精品免费在线观看| 亚洲天堂免费看| 午夜天堂影视香蕉久久| 久久精品国产亚洲一区二区三区| 国产精品一区二区三区乱码| 91老司机福利 在线| 色天使久久综合网天天| 91精品国产综合久久香蕉的特点 | 亚洲精品五月天| 日韩中文字幕亚洲一区二区va在线 | 亚洲综合成人在线视频| 另类成人小视频在线| 成人av网站免费| 欧美另类z0zxhd电影| 精品国产一区二区精华| 国产精品女上位| 五月综合激情网| 国产一区二区免费视频| 色婷婷精品久久二区二区蜜臂av | 国产成人免费高清| 91精品福利在线| 久久日一线二线三线suv| 亚洲欧洲综合另类| 麻豆视频一区二区| 色婷婷精品大在线视频| 久久无码av三级| 亚洲国产欧美在线| 高清不卡一区二区| 欧美一区二区三区爱爱| 亚洲欧洲美洲综合色网| 久久国产欧美日韩精品| 欧美性xxxxx极品少妇| 久久亚洲影视婷婷| 亚洲成av人片一区二区梦乃| 成人一区二区视频| 欧美一区二区黄| 一区二区三区在线观看视频| 国产精品456露脸| 777久久久精品| 亚洲乱码国产乱码精品精的特点| 国产综合久久久久久鬼色| 欧美日韩美女一区二区| 中文字幕在线不卡一区| 国产精品自产自拍| 欧美一区二区三区四区在线观看| 亚洲欧美日韩国产一区二区三区| 国产一区二区电影| 91精品国产综合久久香蕉的特点 | 从欧美一区二区三区| 欧美一区三区四区| 亚洲高清免费观看 | 丝袜亚洲另类欧美综合| 一本一道久久a久久精品综合蜜臀| 精品国产成人系列| 日本vs亚洲vs韩国一区三区| 91黄视频在线| 亚洲综合无码一区二区| 91免费观看在线| 亚洲欧美怡红院| 91在线观看污| 中文字幕中文字幕在线一区| 福利91精品一区二区三区| 久久亚洲免费视频| 狠狠色综合播放一区二区| 日韩视频免费观看高清完整版 | 国产精品一区在线观看乱码| 日韩午夜在线观看视频| 蜜臀久久久久久久|