亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ssl_faq.html.en

?? Apache_2.0.59-Openssl_0.9 配置tomcat. Apache_2.0.59-Openssl_0.9 配置tomcat.
?? EN
?? 第 1 頁 / 共 4 頁
字號(hào):
       <br />
    </li>
    </ol>

    <p>Now <code>server.key</code> contains an unencrypted copy of the key.
    If you point your server at this file, it will not prompt you for a
    pass-phrase. HOWEVER, if anyone gets this key they will be able to
    impersonate you on the net. PLEASE make sure that the permissions on this
    file are such that only root or the web server user can read it
    (preferably get your web server to start as root but run as another
    user, and have the key readable only by root).</p>
    
    <p>As an alternative approach you can use the ``<code>SSLPassPhraseDialog
    exec:/path/to/program</code>'' facility. Bear in mind that this is
    neither more nor less secure, of course.</p>


<h3><a name="verify" id="verify">How do I verify that a private key matches its Certificate?</a></h3>
<p>A private key contains a series of numbers. Two of these numbers form
    the "public key", the others are part of the "private key". The "public
    key" bits are included when you generate a CSR, and subsequently form
    part of the associated Certificate.</p>
    <p>To check that the public key in your Certificate matches the public
    portion of your private key, you simply need to compare these numbers. 
    To view the Certificate and the key run the commands:</p>
    
    <p><code><strong>$ openssl x509 -noout -text -in server.crt</strong></code><br />
    <code><strong>$ openssl rsa -noout -text -in server.key</strong></code></p>
    
    <p>The `modulus' and the `public exponent' portions in the key and the
    Certificate must match. As the public exponent is usually 65537
    and it's difficult to visually check that the long modulus numbers
    are the same, you can use the following approach:</p>
    
    <p><code><strong>$ openssl x509 -noout -modulus -in server.crt | openssl md5</strong></code><br />
    <code><strong>$ openssl rsa -noout -modulus -in server.key | openssl md5</strong></code></p>
    
    <p>This leaves you with two rather shorter numbers to compare. It is,
    in theory, possible that these numbers may be the same, without the 
    modulus numbers being the same, but the chances of this are 
    overwhelmingly remote.</p>
    <p>Should you wish to check to which key or certificate a particular 
    CSR belongs you can perform the same calculation on the CSR as 
    follows:</p>
    
    <p><code><strong>$ openssl req -noout -modulus -in server.csr | openssl md5</strong></code></p>


<h3><a name="badcert" id="badcert">Why do connections fail with an "alert 
bad certificate" error?</a></h3>
<p>Errors such as <code>OpenSSL: error:14094412: SSL
    routines:SSL3_READ_BYTES:sslv3 alert bad certificate</code> in the SSL
    logfile, are usually caused a browser which is unable to handle the server
    certificate/private-key. For example, Netscape Navigator 3.x is 
    unable to handle RSA key lengths not equal to 1024 bits.</p>


<h3><a name="keysize" id="keysize">Why does my 2048-bit private key not work?</a></h3>
<p>The private key sizes for SSL must be either 512 or 1024 bits, for compatibility
    with certain web browsers. A keysize of 1024 bits is recommended because
    keys larger than 1024 bits are incompatible with some versions of Netscape
    Navigator and Microsoft Internet Explorer, and with other browsers that
    use RSA's BSAFE cryptography toolkit.</p>


<h3><a name="hashsymlinks" id="hashsymlinks">Why is client authentication broken after upgrading from
SSLeay version 0.8 to 0.9?</a></h3>
<p>The CA certificates under the path you configured with
    <code>SSLCACertificatePath</code> are found by SSLeay through hash
    symlinks. These hash values are generated by the `<code>openssl x509 -noout
    -hash</code>' command. However, the algorithm used to calculate the hash for a
    certificate changed between SSLeay 0.8 and 0.9. You will need to remove
    all old hash symlinks and create new ones after upgrading. Use the
    <code>Makefile</code> provided by <code class="module"><a href="../mod/mod_ssl.html">mod_ssl</a></code>.</p>


<h3><a name="pemder" id="pemder">How can I convert a certificate from PEM to DER format?</a></h3>
<p>The default certificate format for SSLeay/OpenSSL is PEM, which is simply
    Base64 encoded DER, with header and footer lines. For some applications
    (e.g. Microsoft Internet Explorer) you need the certificate in plain DER
    format. You can convert a PEM file <code>cert.pem</code> into the
    corresponding DER file <code>cert.der</code> using the following command:
    <code><strong>$ openssl x509 -in cert.pem -out cert.der -outform DER</strong></code></p>


<h3><a name="verisign" id="verisign">Why can't I find the
<code>getca</code> or <code>getverisign</code> programs mentioned by 
Verisign, for installing my Verisign certificate?</a></h3>
<p>Verisign has never provided specific instructions
    for Apache+mod_ssl. The instructions provided are for C2Net's 
    Stronghold (a commercial Apache based server with SSL support).</p> 
    <p>To install your certificate, all you need to do is to save the 
    certificate to a file, and give the name of that file to the 
    <code class="directive"><a href="../mod/mod_ssl.html#sslcertificatefile">SSLCertificateFile</a></code> directive.
    You will also need to give it the key file. For more information, 
    see the <code class="directive"><a href="../mod/mod_ssl.html#sslcertificatekeyfile">SSLCertificateKeyFile</a></code> 
    directive.</p> 


<h3><a name="sgc" id="sgc">Can I use the Server Gated Cryptography (SGC) 
facility (aka Verisign Global ID) with mod_ssl?</a></h3>
<p>Yes. <code class="module"><a href="../mod/mod_ssl.html">mod_ssl</a></code> has included support for the SGC 
    facility since version 2.1. No special configuration is required - 
    just use the Global ID as your server certificate. The 
    <em>step up</em> of the clients is then automatically handled by 
    <code class="module"><a href="../mod/mod_ssl.html">mod_ssl</a></code> at run-time.</p> 


<h3><a name="gid" id="gid">Why do browsers complain that they cannot 
verify my Verisign Global ID server certificate?</a></h3>
<p>Verisign uses an intermediate CA certificate between the root CA 
    certificate (which is installed in the browsers) and the server 
    certificate (which you installed on the server). You should have 
    received this additional CA certificate from Verisign.
    If not, complain to them. Then, configure this certificate with the
    <code class="directive"><a href="../mod/mod_ssl.html#sslcertificatechainfile">SSLCertificateChainFile</a></code> 
    directive. This ensures that the intermediate CA certificate is 
    sent to the browser, filling the gap in the certificate chain.</p>

</div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
<div class="section">
<h2><a name="aboutssl" id="aboutssl">The SSL Protocol</a></h2>
<ul>
<li><a href="#random">Why do I get lots of random SSL protocol 
errors under heavy server load?</a></li>
<li><a href="#load">Why does my webserver have a higher load, now
that it serves SSL encrypted traffic?</a></li>
<li><a href="#establishing">Why do HTTPS connections to my server
sometimes take up to 30 seconds to establish a connection?</a></li>
<li><a href="#ciphers">What SSL Ciphers are supported by mod_ssl?</a></li>
<li><a href="#adh">Why do I get ``no shared cipher'' errors, when
trying to use Anonymous Diffie-Hellman (ADH) ciphers?</a></li>
<li><a href="#sharedciphers">Why do I get a 'no shared ciphers'
error when connecting to my newly installed server?</a></li>
<li><a href="#vhosts">Why can't I use SSL with name-based/non-IP-based 
virtual hosts?</a></li>
<li><a href="#vhosts2">Why is it not possible to use Name-Based Virtual
Hosting to identify different SSL virtual hosts?</a></li>
<li><a href="#lockicon">When I use Basic Authentication over HTTPS
the lock icon in Netscape browsers stays unlocked when the dialog pops up.
Does this mean the username/password is being sent unencrypted?</a></li>
<li><a href="#msie">Why do I get I/O errors when connecting via
HTTPS to an Apache+mod_ssl server with Microsoft Internet Explorer 
(MSIE)?</a></li>
<li><a href="#nn">Why do I get I/O errors, or the message "Netscape has 
encountered bad data from the server", when connecting via
HTTPS to an Apache+mod_ssl server with Netscape Navigator?</a></li>
</ul>

<h3><a name="random" id="random">Why do I get lots of random SSL protocol 
errors under heavy server load?</a></h3>
<p>There can be a number of reasons for this, but the main one
    is problems with the SSL session Cache specified by the
    <code class="directive"><a href="../mod/mod_ssl.html#sslsessioncache">SSLSessionCache</a></code> directive. The DBM session
    cache is the most likely source of the problem, so using the SHM session cache (or
    no cache at all) may help.</p>


<h3><a name="load" id="load">Why does my webserver have a higher load, now 
that it serves SSL encrypted traffic?</a></h3>
<p>SSL uses strong cryptographic encryption, which necessitates a lot of
    number crunching. When you request a webpage via HTTPS, everything (even
    the images) is encrypted before it is transferred. So increased HTTPS
    traffic leads to load increases.</p>


<h3><a name="establishing" id="establishing">Why do HTTPS connections to my server 
sometimes take up to 30 seconds to establish a connection?</a></h3>
<p>This is usually caused by a <code>/dev/random</code> device for
    <code class="directive"><a href="../mod/mod_ssl.html#sslrandomseed">SSLRandomSeed</a></code> which blocks the 
    read(2) call until enough entropy is available to service the 
    request. More information is available in the reference
    manual for the <code class="directive"><a href="../mod/mod_ssl.html#sslrandomseed">SSLRandomSeed</a></code>
    directive.</p>


<h3><a name="ciphers" id="ciphers">What SSL Ciphers are supported by mod_ssl?</a></h3>
<p>Usually, any SSL ciphers supported by the version of OpenSSL in use, 
    are also supported by <code class="module"><a href="../mod/mod_ssl.html">mod_ssl</a></code>. Which ciphers are 
    available can depend on the way you built OpenSSL. Typically, at 
    least the following ciphers are supported:</p>
    
    <ol>
    <li>RC4 with MD5</li>
    <li>RC4 with MD5 (export version restricted to 40-bit key)</li>
    <li>RC2 with MD5</li>
    <li>RC2 with MD5 (export version restricted to 40-bit key)</li>
    <li>IDEA with MD5</li>
    <li>DES with MD5</li>
    <li>Triple-DES with MD5</li>
    </ol>
    
    <p>To determine the actual list of ciphers available, you should run 
    the following:</p>
    <div class="example"><p><code>$ openssl ciphers -v</code></p></div>


<h3><a name="adh" id="adh">Why do I get ``no shared cipher'' errors, when 
trying to use Anonymous Diffie-Hellman (ADH) ciphers?</a></h3>
<p>By default, OpenSSL does <em>not</em> allow ADH ciphers, for security
    reasons. Please be sure you are aware of the potential side-effects 
    if you choose to enable these ciphers.</p>
    <p>In order to use Anonymous Diffie-Hellman (ADH) ciphers, you must 
    build OpenSSL with ``<code>-DSSL_ALLOW_ADH</code>'', and then add
    ``<code>ADH</code>'' into your <code class="directive"><a href="../mod/mod_ssl.html#sslciphersuite">SSLCipherSuite</a></code>.</p>


<h3><a name="sharedciphers" id="sharedciphers">Why do I get a 'no shared ciphers' 
error when connecting to my newly installed server?</a></h3>
<p>Either you have made a mistake with your 
    <code class="directive"><a href="../mod/mod_ssl.html#&gt;sslciphersuite">&gt;SSLCipherSuite</a></code>
    directive (compare it with the pre-configured example in
    <code>httpd.conf-dist</code>) or you chose to use DSA/DH
    algorithms instead of RSA when you generated your private key
    and ignored or overlooked the warnings. If you have chosen
    DSA/DH, then your server cannot communicate using RSA-based SSL 
    ciphers (at least until you configure an additional RSA-based
    certificate/key pair). Modern browsers like NS or IE can only 
    communicate over SSL using RSA ciphers. The result is the 
    "no shared ciphers" error. To fix this, regenerate your server 
    certificate/key pair, using the RSA algorithm.</p>


<h3><a name="vhosts" id="vhosts">Why can't I use SSL with name-based/non-IP-based virtual hosts?</a></h3>
<p>The reason is very technical, and a somewhat "chicken and egg" problem. 
    The SSL protocol layer stays below the HTTP protocol layer and 
    encapsulates HTTP. When an SSL connection (HTTPS) is established
    Apache/mod_ssl has to negotiate the SSL protocol parameters with the
    client. For this, mod_ssl has to consult the configuration of the virtual
    server (for instance it has to look for the cipher suite, the server
    certificate, etc.). But in order to go to the correct virtual server
    Apache has to know the <code>Host</code> HTTP header field. To do this, the
    HTTP request header has to be read. This cannot be done before the SSL
    handshake is finished, but the information is needed in order to 
    complete the SSL handshake phase. Bingo!</p>


<h3><a name="vhosts2" id="vhosts2">Why is it not possible to use Name-Based
Virtual Hosting to identify different SSL virtual hosts?</a></h3>
    <p>Name-Based Virtual Hosting is a very popular method of identifying
    different virtual hosts. It allows you to use the same IP address and
    the same port number for many different sites. When people move on to
    SSL, it seems natural to assume that the same method can be used to have
    lots of different SSL virtual hosts on the same server.</p>

    <p>It comes as rather a shock to learn that it is impossible.</p> 

    <p>The reason is that the SSL protocol is a separate layer which
    encapsulates the HTTP protocol. So the SSL session is a separate 
    transaction, that takes place before the HTTP session has begun. 
    The server receives an SSL request on IP address X and port Y 
    (usually 443). Since the SSL request does not contain any Host: 
    field, the server has no way to decide which SSL virtual host to use.
    Usually, it will just use the first one it finds, which matches the 
    port and IP address specified.</p> 

    <p>You can, of course, use Name-Based Virtual Hosting to identify many
    non-SSL virtual hosts (all on port 80, for example) and then 
    have a single SSL virtual host (on port 443). But if you do this,
    you must make sure to put the non-SSL port number on the NameVirtualHost
    directive, e.g.</p> 

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲综合色自拍一区| 亚洲香蕉伊在人在线观| 色哦色哦哦色天天综合| 老色鬼精品视频在线观看播放| 久久久精品天堂| 欧美日韩中文精品| aaa国产一区| 免费看欧美美女黄的网站| 亚洲精品视频在线观看网站| 久久久久久久久99精品| 欧美另类高清zo欧美| 99国产精品一区| 精品在线一区二区三区| 婷婷中文字幕综合| 亚洲精品自拍动漫在线| 欧美激情综合在线| 欧美一二三在线| 欧美中文字幕久久| 91在线精品一区二区| 国产白丝精品91爽爽久久| 日本91福利区| 日韩精品一二三| 亚洲高清免费一级二级三级| 亚洲欧美在线视频观看| 中文字幕二三区不卡| 久久久久久久久久久久电影| 欧美mv日韩mv亚洲| 欧美一级电影网站| 91精品国产欧美一区二区成人 | 亚洲国产综合视频在线观看| 中文字幕欧美一区| 国产亚洲精品资源在线26u| 欧美电影免费观看高清完整版在线观看 | 99久久99久久精品免费看蜜桃| 国产麻豆成人传媒免费观看| 久久精品免费观看| 久久99精品国产.久久久久久| 日本欧美一区二区在线观看| 日本最新不卡在线| 男女视频一区二区| 久久国产福利国产秒拍| 精品一区二区在线播放| 激情久久五月天| 国产美女在线精品| 大尺度一区二区| 高清在线成人网| 成人动漫av在线| 91婷婷韩国欧美一区二区| 91色porny在线视频| 色av一区二区| 欧美影片第一页| 欧美日本一区二区三区四区| 欧美精品丝袜久久久中文字幕| 欧美日韩国产三级| 日韩欧美一级二级三级| 精品成人a区在线观看| 国产日韩精品视频一区| 中文字幕亚洲精品在线观看 | 亚洲人成小说网站色在线| 亚洲人成网站在线| 五月天亚洲婷婷| 精一区二区三区| 丰满亚洲少妇av| 91网站视频在线观看| 欧美日韩中文字幕精品| 精品国产sm最大网站免费看| 国产女主播在线一区二区| 亚洲精品中文字幕乱码三区 | 久久不见久久见免费视频7 | 国产精品一区一区| 91色|porny| 日韩三级电影网址| 国产精品视频一二| 亚洲一区二区欧美| 韩国av一区二区三区| 91色porny| 日韩欧美国产精品一区| 国产精品毛片高清在线完整版| 亚洲在线观看免费| 久久99日本精品| av综合在线播放| 91精品婷婷国产综合久久性色 | 久久精品免费观看| 99精品久久免费看蜜臀剧情介绍 | 国产精品久久久久久久久果冻传媒| 亚洲一卡二卡三卡四卡五卡| 久草热8精品视频在线观看| 91亚洲精品一区二区乱码| 日韩一区二区三区免费看| 国产精品欧美久久久久一区二区 | 乱中年女人伦av一区二区| va亚洲va日韩不卡在线观看| 91精品国产综合久久香蕉麻豆| 国产精品入口麻豆原神| 美美哒免费高清在线观看视频一区二区 | 91视视频在线观看入口直接观看www | 综合激情网...| 麻豆精品一二三| 色天天综合色天天久久| 国产午夜亚洲精品理论片色戒| 午夜欧美2019年伦理| av在线播放成人| 久久蜜桃av一区精品变态类天堂 | 亚洲成av人片在线| 高清不卡一二三区| 日韩午夜精品视频| 亚洲宅男天堂在线观看无病毒| 国产精品一区二区免费不卡 | 亚洲黄色在线视频| 国产精品亚洲午夜一区二区三区 | 欧美精品一区二区三| 亚洲影视在线观看| www.欧美精品一二区| 国产蜜臀av在线一区二区三区| 国产一区欧美日韩| 在线电影院国产精品| 一区二区三区四区在线免费观看| 国产精品中文字幕日韩精品| 5月丁香婷婷综合| 亚洲综合成人在线视频| 色综合色综合色综合色综合色综合| 久久久精品综合| 国产精品亚洲人在线观看| 欧美一区二区三区成人| 婷婷久久综合九色国产成人| 在线观看国产一区二区| 亚洲欧美福利一区二区| 不卡的电影网站| 国产精品污www在线观看| 国产一区二区成人久久免费影院| 日韩三级免费观看| 久99久精品视频免费观看| 欧美一区二区在线播放| 日本不卡高清视频| 日韩视频在线一区二区| 麻豆精品国产91久久久久久| 3d动漫精品啪啪1区2区免费| 亚洲成a人片在线不卡一二三区| 91福利在线播放| 亚洲妇熟xx妇色黄| 欧美肥大bbwbbw高潮| 日韩电影免费一区| 欧美成人精品福利| 国产一区在线不卡| 国产网站一区二区| 成人理论电影网| 亚洲三级视频在线观看| 日本电影欧美片| 婷婷中文字幕综合| 久久综合色天天久久综合图片| 国产精品一区久久久久| 欧美国产丝袜视频| 91美女视频网站| 偷偷要91色婷婷| 精品免费一区二区三区| 国产宾馆实践打屁股91| 亚洲私人影院在线观看| 欧美午夜精品理论片a级按摩| 亚洲成av人片在线观看无码| 欧美大片顶级少妇| 国产91精品入口| 亚洲品质自拍视频| 91麻豆精品国产无毒不卡在线观看| 狠狠网亚洲精品| 日韩美女视频19| 欧美高清视频www夜色资源网| 久久成人免费网站| 亚洲色图欧美偷拍| 在线电影国产精品| 风间由美一区二区三区在线观看 | 亚洲少妇30p| 欧美日韩国产乱码电影| 韩国欧美国产1区| 亚洲三级免费电影| 欧美一级xxx| 99热精品国产| 日韩成人伦理电影在线观看| 久久久亚洲精华液精华液精华液| 91色婷婷久久久久合中文| 男女男精品网站| 自拍偷拍国产亚洲| 欧美成人性福生活免费看| 99re热这里只有精品免费视频| 日韩精品一二区| 国产精品久久久久久久浪潮网站| 欧美揉bbbbb揉bbbbb| 成人午夜电影网站| 日本中文一区二区三区| 国产精品九色蝌蚪自拍| 欧美一个色资源| 色噜噜夜夜夜综合网| 国产一区二区视频在线播放| 亚洲一区二区视频在线| 国产午夜精品一区二区三区视频 | 欧美喷水一区二区| 成人中文字幕电影| 欧美96一区二区免费视频| 一区二区三区小说| 国产精品福利一区| 欧美va亚洲va|