亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ssl.xtp

?? 解壓在c盤
?? XTP
字號:
<s1 title="SSL"><s2 title="Should I use JSSE or OpenSSL or Apache/IIS for SSL?"><p>We recommend avoiding JSSE if possible.  It is slower than usingbin/resin's OpenSSL support and does appear to be as stable as Apacheor IIS (or Netscape/Zeus) for SSL support.In addition, JSSE  is far more complicated to configure.  While we've neverreceived any problems with Resin using SSL from Apache or IIS, JSSE issuesare fairly frequent.</p><p>Even if you're using Apache/IIS for SSL support, you can still useResin's standalone web server for non-SSL pages.  Your resin.conf willneed to list both a &lt;http port='80'/> and a &lt;srun port='6802'/>.</p></s2><s2 title="How do I configure Resin with SSL using OpenSSL?"><p>See the <a href='../ref/ssl-quick.xtp'>SSL configuration</a> documentation.</p></s2><s2 title="How do I configure Resin with SSL using JSSE?"><p>Nicholas Lehuen writes:</p><p>Here is a short step-by-step installation guide for SSL on Resin.</p> <p>The purpose : to install SSL support on Resin</p><s3 title='Requirements'><ul><li>The latest Resin 1.2 snapshot (I used the 08/04/2000 snapshot with success)    http://www.caucho.com/download/index.xtp<li>JSSE 1.0.1    http://java.sun.com/products/jsse/<li>Optional : a certificate authority (CA) such as Verisign, Thawte, or your own. Thawte is providing a free test certificate authorityservice which enables you to check the certification process before buying your own certificate. Of course, you can also skip the CA byproviding self-signed public key certificate. This will be explained later.<a href="https://www.thawte.com/cgi/server/test.exe">https://www.thawte.com/cgi/server/test.exe</a></ul></s3> <s3 title="JSSE setup"><ol><li>Follow the installation instructions<a href="http://java.sun.com/products/jsse/install.html">http://java.sun.com/products/jsse/install.html</a><li>Even if Resin has its own provider registration system (we'll see it on next step), I suggest that you statically register the SunJSSEby editing the &lt;java-home>/lib/security/java.security as explained in the installation guide. This will ease the use of keytool.</ol></s3> <s3 title="Keystore initialization"><ol><li>Create a directory named 'keys' somewhere in your Resin installation. I suggest you place it in the Resin home directory.<li>Copy the file &lt;java-home>/lib/security/cacerts into the 'keys' directory<li>Rename the cacerts file as you want. I'll suppose you name it 'private.keystore'.</ol></s3><s3 title="Keystore protection"><p>Your private.keystore file is for the moment a copy of the cacerts keystore, which contains the CA public key certificates (veryimportant for client HTTPS connections). We will insert your own private key in this file, thus it'll have to be password-protected, sothat anyone stealing it will have difficulties in forging certificates on your behalf.</p><ol><li>Go into the 'keys' directory<li>type the following command :keytool -storepasswd -storepass changeit -new YourPasswordHere \        -keystore private.keystore</ol> <p>(the default password for the cacerts keystore is 'changeit')</p> </s3><s3 title="Private key generation"><p>We'll now generate your key pair, which is composed of a private (the one which MUST remain secret !) and a public key. The point here isto use the RSA key pair generator, and NOT the default one, which is DSA. This is were the JSSE security provider is used.</p> <p>type the following command :</p><example>M:\keys>keytool -genkey -keyalg RSA -alias myserverkeypair \                -storepass YourPasswordHere -keystore private.keystoreWhat is your first and last name?  [Unknown]:  www.myserver.comWhat is the name of your organizational unit?  [Unknown]:  Foo DeptWhat is the name of your organization?  [Unknown]:  BarWhat is the name of your City or Locality?  [Unknown]:  ParisWhat is the name of your State or Province?  [Unknown]:  FranceWhat is the two-letter country code for this unit?  [Unknown]:  FRIs &lt;CN=www.myserver.com, OU=Foo Dept, O=Bar, L=Paris,                ST=France, C=FR> correct?  [no]:  yes Enter key password for &lt;myserverkeypair>        (RETURN if same as keystore password):</example> <p>You MUST mention your HTTP server name as the CN of the certificate (thus the reply to 'first and last name'). Browsers would emitwarnings to your users if you didn't. Any other informations are at your choice, however the process of key pair generation andattributes definitions is very strict for "real-life" cryptography, i.e. Verisign will double-check your identity, address and so on.</p> <p>Another important point : DON'T AFFECT A PASSWORD to your key pair. It must remain the same as the keystore, at least until Resinprovides a means of configuring the key pair password.</p></s3><s3 title="Public Key Certificate (optional)"><p>Request a public key certificate and insert the public key certificate into your keystore.</p><p>For users to trust your server, you'll have to have your public keycertificate (PKC) signed by a Certificate Authority (CA) (Verisign,Thawte, Certplus...). This is done by sending a certificate signaturerequest (CSR) to the CA, coping with all the legal stuff andgetting a signed PKC in return. This step is mandatory for production server, unless you have some means to convince your users that yourPKC is valid without a CA signature, which is possible in intranet environment for example. However, for testing purpose, you can startby using your self-signed PKC without any CA signature. An intermediary solution is to use a test CA so that you can check that your CSRis correctly emitted, that the Certificate Chain is correctly checked, and so on. Thawte provides a test CA at the address mentionedabove.</p><ol><li>Generate a CSR by typing the following command :<example>M:\keys>keytool -certreq -alias myserverkeypair -storepass YourPasswordHere \                -keystore private.keystore-----BEGIN NEW CERTIFICATE REQUEST-----MIIBqjCCARMCAQAwajELMAkGA1UEBhMCRlIxDzANBgNVBAgTBkZyYW5jZTEOMAwGA1UEBxMFUGFy... cut ...KDYZTklbg1NOiXTdXIhPHb3+YOgZ+HoeDTxOx/rRhA==-----END NEW CERTIFICATE REQUEST-----</example> <li>Copy/Paste the CSR into the text box at the following address. Leave all options with their default value.    https://www.thawte.com/cgi/server/test.exe <li>You'll get a certificate looking like :<example>-----BEGIN CERTIFICATE-----MIICjzCCAfigAwIBAgIDBp8SMA0GCSqGSIb3DQEBBAUAMIGHMQswCQYDVQQGEwJa... cut .../93Q58iI4fgQ/kc+l8ogpVwh/IJw1Ujmszd19Jf+pxyySMM=-----END CERTIFICATE-----</example><li>Copy/Paste this certificate into a file named 'myserver.cer' . If you have Microsoft Internet Explorer 5.0 (maybe 4.0) installed, youcan open this .cer file and see the certificate as your user will when they ask the security properties of pages served securely by yourserver. A warning should be emitted, stating that you can't trust the certificate as it does not point to a trusted root CA. You can keepgoing with this warning or download and trust the test root CA (available on https://www.thawte.com/servertest.crt ). Be ware though thatthe final user should not and surely won't accept to trust this test root CA. <li>Anyway, to be able to import your signed certificate, you'll have to import the test root CA certificate. Download it and import itusing the following command :<example>M:\keys>keytool -import -alias servertest -storepass YourPasswordHere \                -keystore private.keystore -file servertest.crtOwner: CN=Thawte Test CA Root, OU=TEST, O=Thawte, ST=FOR TESTING, C=ZAIssuer: CN=Thawte Test CA Root, OU=TEST, O=Thawte, ST=FOR TESTING, C=ZASerial number: 0Valid from: Thu Aug 01 02:00:00 CEST 1996 until: Thu Dec 31 22:59:59 CET 2020Certificate fingerprints:         MD5:  5E:E0:0E:1D:17:B7:CA:A5:7D:36:D6:02:DF:4D:26:A4         SHA1: 39:C6:9D:27:AF:DC:EB:47:D6:33:36:6A:B2:05:F1:47:A9:B4:DA:EATrust this certificate? [no]:  yesCertificate was added to keystore</example> <li>Import the certificate and attach it to your server key pair by typing the command :<example>M:\keys>keytool -import -alias myserverkeypair -storepass YourPasswordHere \                -keystore private.keystore -file myserver.cerCertificate reply was installed in keystore</example></ol></s3><s3 title="Key pair verification"><p>Issue the following command :</p><example>M:\keys>keytool -list -v -alias myserverkeypair -storepass YourPasswordHere \                -keystore private.keystoreAlias name: myserverkeypairCreation date: Fri Aug 11 23:07:53 CEST 2000Entry type: keyEntryCertificate chain length: 2Certificate[1]:Owner: CN=www.myserver.com, OU=Foo Dept, O=Bar, L=Paris, ST=France, C=FRIssuer: CN=Thawte Test CA Root, OU=TEST, O=Thawte, ST=FOR TESTING, C=ZASerial number: 69f12Valid from: Fri Aug 11 23:00:07 CEST 2000 until: Mon Sep 11 23:00:07 CEST 2000Certificate fingerprints:         MD5:  41:84:55:8C:A1:85:28:DA:B0:5A:47:D6:5B:D2:ED:41         SHA1: 61:DE:DB:E6:7C:3C:AD:90:63:9B:20:E0:FF:3B:02:3A:60:EB:B4:82Certificate[2]:Owner: CN=Thawte Test CA Root, OU=TEST, O=Thawte, ST=FOR TESTING, C=ZAIssuer: CN=Thawte Test CA Root, OU=TEST, O=Thawte, ST=FOR TESTING, C=ZASerial number: 0Valid from: Thu Aug 01 02:00:00 CEST 1996 until: Thu Dec 31 22:59:59 CET 2020Certificate fingerprints:         MD5:  5E:E0:0E:1D:17:B7:CA:A5:7D:36:D6:02:DF:4D:26:A4         SHA1: 39:C6:9D:27:AF:DC:EB:47:D6:33:36:6A:B2:05:F1:47:A9:B4:DA:EA</example> <p>As you can see the alias myserverkeypair points to a keyEntry type entry, its certificate chain has 2 certificate, the first being yourown certificate, signed by the Thawte Test CA Root, and the other being the Thawte Test CA Root own.</p> </s3><s3 title="Resin configuration (resin.conf)"><p>add the support for the SunJSSE security provider :</p><example>&lt;caucho.com>    &lt;security-provider id='com.sun.net.ssl.internal.ssl.Provider'/> &lt;!-- declare a new HTTP server on port 443 (standard port for HTTPS),      - with SSL enabled --> &lt;http-server>  &lt;app-dir>doc&lt;/app-dir>   &lt;!-- the http port -->  &lt;http port=80/>   &lt;!-- the srun port, read by both JVM and plugin -->  &lt;srun host='localhost' port='6802'/>   &lt;http port=443>    &lt;ssl>true&lt;/ssl>    &lt;key-store-type>jks&lt;/key-store-type>    &lt;key-store-file>file://m:/keys/private.keystore&lt;/key-store-file>    &lt;key-store-password>YourPasswordHere&lt;/key-store-password>  &lt;/http></example></s3><s3 title="Test !"><p>Try connecting to your server with https instead of http !</p> <p>I've been running successfully SSL on Resin with JDK 1.3 on Windows NT 4 SP6 and JDK 1.2.2 on Solaris 7.</p> <p>And the fun begins when mixing HTTPS and WAP... !</p></s3></s2></s1>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91免费版在线看| 精品国偷自产国产一区| 国产精品第四页| 欧美另类z0zxhd电影| 国产不卡在线播放| 亚洲欧洲无码一区二区三区| 久久精品综合网| 国产午夜一区二区三区| 亚洲在线观看免费视频| 日韩美女视频一区二区 | 欧美激情在线免费观看| 欧美成人一区二区三区| 久久久久一区二区三区四区| 国产午夜精品美女毛片视频| 男人操女人的视频在线观看欧美| 日本免费新一区视频| 日本sm残虐另类| 日本高清不卡aⅴ免费网站| 在线精品视频一区二区三四| 欧美日韩高清影院| 久久伊99综合婷婷久久伊| 中文字幕一区av| 国产98色在线|日韩| 欧美精品一区二区久久婷婷 | 国产一区二区三区久久悠悠色av| 另类的小说在线视频另类成人小视频在线 | 国产不卡视频在线观看| 精品美女一区二区| 精品一区二区三区免费| 国产精品亚洲成人| 色老汉一区二区三区| 亚洲人成影院在线观看| 三级影片在线观看欧美日韩一区二区| 丝袜亚洲另类丝袜在线| 在线观看欧美精品| 亚洲一区二区3| 欧美高清视频在线高清观看mv色露露十八| 亚洲综合区在线| 欧美欧美欧美欧美首页| 日韩av高清在线观看| 欧美成人一区二区三区片免费| 九九国产精品视频| 久久免费视频一区| 成人精品免费看| 粉嫩aⅴ一区二区三区四区| 国产校园另类小说区| 成人免费毛片片v| 亚洲一线二线三线视频| 91精品久久久久久久91蜜桃| 国产精品麻豆网站| 玖玖九九国产精品| 日本一区二区三区在线不卡| 亚洲gay无套男同| 成人动漫在线一区| 亚洲一二三级电影| 95精品视频在线| 欧美经典三级视频一区二区三区| 处破女av一区二区| 亚洲成av人在线观看| 精品乱人伦小说| 99久久伊人精品| 美女脱光内衣内裤视频久久网站| 欧美性色综合网| 中文字幕中文字幕一区二区| 欧美性猛片xxxx免费看久爱| 91小视频在线| 香蕉久久夜色精品国产使用方法 | 欧美国产国产综合| 91九色02白丝porn| 国产在线播精品第三| 一区二区三区四区在线| 高清不卡一区二区在线| 亚洲精品成人天堂一二三| 成人精品一区二区三区中文字幕| 亚洲高清三级视频| 欧美激情艳妇裸体舞| 7777精品久久久大香线蕉| 国产成人在线视频播放| 日本一区二区视频在线| 91精选在线观看| 91网站黄www| 国产中文一区二区三区| 久久久久久久久97黄色工厂| 91国产福利在线| 成人aa视频在线观看| 蜜臀91精品一区二区三区| 一区二区三区日韩在线观看| 久久久一区二区| 91精品国产高清一区二区三区 | 在线视频一区二区三| 国产综合成人久久大片91| 午夜电影一区二区三区| 欧美日本免费一区二区三区| 国产aⅴ综合色| 免费成人性网站| 爽好久久久欧美精品| 亚洲青青青在线视频| 国产欧美日韩一区二区三区在线观看| 5566中文字幕一区二区电影| 欧美午夜精品理论片a级按摩| 波多野结衣91| 亚洲一区二区在线视频| 中文字幕中文字幕一区二区| 国产日韩av一区| 国产日产欧美一区二区视频| 精品剧情v国产在线观看在线| 欧美精品一二三区| 欧美色精品在线视频| 久久国产免费看| 日本伊人色综合网| 日韩av电影天堂| 欧美aaaaa成人免费观看视频| 亚洲成人激情av| 日韩精品成人一区二区在线| 丝袜诱惑制服诱惑色一区在线观看| 一区av在线播放| 亚洲国产综合91精品麻豆| 性做久久久久久免费观看欧美| 亚洲一区二区美女| 日韩和欧美一区二区| 麻豆精品一区二区综合av| 麻豆精品一区二区av白丝在线| 久久国产日韩欧美精品| 国产一区二区91| 成人性视频网站| 91色视频在线| 欧美撒尿777hd撒尿| 欧美一激情一区二区三区| 波多野结衣中文一区| 91视频国产资源| 欧美疯狂做受xxxx富婆| 精品久久久久久久久久久久久久久 | 国产成人av一区二区| 成人午夜视频在线观看| 99国产精品久| 欧美精品在线观看播放| 精品福利视频一区二区三区| 国产免费观看久久| 一区二区三区91| 日本中文字幕一区二区视频| 国产精品69久久久久水密桃| 不卡在线观看av| 欧美三级视频在线观看| 欧美变态口味重另类| 欧美激情一区三区| 亚洲成人av电影| 国产一区二区在线影院| 成人免费毛片嘿嘿连载视频| 精品视频免费看| 久久午夜羞羞影院免费观看| 亚洲色图视频网站| 青青草成人在线观看| 成人黄色大片在线观看| 欧美一区二区三区系列电影| 国产精品伦理一区二区| 视频一区免费在线观看| 成人黄色电影在线| 日韩一卡二卡三卡四卡| 亚洲精品免费看| 国产在线一区观看| 欧美日韩精品一区二区三区四区 | 国产超碰在线一区| 欧美人牲a欧美精品| 中文字幕av一区二区三区| 亚洲国产一区二区在线播放| 另类的小说在线视频另类成人小视频在线 | **性色生活片久久毛片| 韩国精品主播一区二区在线观看 | 日本三级韩国三级欧美三级| 成人免费毛片嘿嘿连载视频| 日韩午夜av一区| 有坂深雪av一区二区精品| 国产在线精品一区二区| 欧美三级在线播放| 亚洲欧洲精品一区二区精品久久久| 久久国产剧场电影| 欧美熟乱第一页| 中文字幕一区二区三区四区不卡| 美女看a上一区| 欧美性猛交xxxxxx富婆| 中文字幕五月欧美| 国产精品99久| 久久久久久免费网| 久久69国产一区二区蜜臀| 欧美日韩国产精品自在自线| 亚洲天堂2016| 波多野结衣视频一区| 国产亚洲精品精华液| 极品少妇一区二区| 日韩欧美一区二区在线视频| 欧美精品在欧美一区二区少妇| 亚洲欧美一区二区三区极速播放 | 亚洲色图一区二区三区| 成人网页在线观看| 国产丝袜欧美中文另类| 国产乱码精品1区2区3区| 久久影院午夜论| 国产福利精品导航| 国产精品人成在线观看免费| 成人一区二区视频|