在线精品99_中国九九盗摄偷拍偷看_91免费版在线观看_91.app_91高清视频在线_99热最新网站

rhel6.3下如何使用openssl来生成CA证书并颁发证书

118次阅读
没有评论

共计 8575 个字符,预计需要花费 22 分钟才能阅读完成。

丸趣 TV 小编给大家分享一下 rhel6.3 下如何使用 openssl 来生成 CA 证书并颁发证书,希望大家阅读完这篇文章之后都有所收获,下面让我们一起去探讨吧!

一、配置 OPENSSL
[root@test1 /]# rpm -qa|grep openssl
openssl-1.0.0-20.el6_2.5.i686
[root@test1 /]# cd /etc/pki/tls
[root@test1 tls]# ls
cert.pem  certs  misc  openssl.cnf  private
[root@test1 tls]# vim openssl.cnf
####################################################################
[CA_default]

dir  = /etc/pki/CA  # Where everything is kept (CA 中心的目录)
certs  = $dir/certs  # Where the issued certs are kept (证书保存目录)
crl_dir  = $dir/crl  # Where the issued crl are kept  (被吊销证书的目录)
database  = $dir/index.txt  # database index file.  (证书索引文件)
#unique_subject = no  # Set to no to allow creation of
  # several ctificates with same subject.
new_certs_dir  = $dir/newcerts  # default place for new certs.(经过 CA 中心签名的证书备份目录)

certificate  = $dir/my-ca.crt  # The CA certificate(CA 的公钥文件名)
serial  = $dir/serial  # The current serial number(CA 中心的颁发证书序列号)
crlnumber  = $dir/crlnumber  # the current crl number(已吊销证书序列号)
  # must be commented out to leave a V1 CRL
crl  = $dir/my-ca.crl  # The current CRL(证书吊销列表)
private_key  = $dir/private/my-ca.key # The private key(CA 私钥文件)
RANDFILE  = $dir/private/.rand  # private random number file

x509_extensions = usr_cert  # The extentions to add to the cert

default_days  = 365  # how long to certify for (证书有效期)
default_crl_days= 30  # how long before next CRL
default_md  = default  # use public key default MD
preserve  = no  # keep passed DN ordering

[policy_match]  #此段为证书相关信息选项,其中 match 指定的项,要求被签名证书一定要与 CA 的对应项一致。
countryName = match
stateOrProvinceName = match
organizationName = match
organizationalUnitName = optional
commonName = supplied
emailAddress = optional

#
[req_distinguished_name]
countryName  = Country Name (2 letter code)
countryName_default  = CN (国家代码需要自己修改)
countryName_min  = 2
countryName_max  = 2

stateOrProvinceName  = State or Province Name (full name)
stateOrProvinceName_default  = Hebei (州或省名需要自己修改)

localityName  = Locality Name (eg, city)
localityName_default  = Beijing (地点名称需要自己修改)

0.organizationName  = Organization Name (eg, company)
0.organizationName_default  = Tianli Company  (组织或公司名需要自己修改)

[root@test1 tls]# cd ../CA/
[root@test1 CA]# ls
certs  crl  newcerts  private
注:需要有这几个目录,如果没有可以自己新建
[root@test1 CA]# touch index.txt
[root@test1 CA]# echo 00 serial
[root@test1 CA]# ls
certs  crl  index.txt  newcerts  private  serial

二、创建密钥过程
创建私钥
[root@test1 CA]#(umask 077;openssl genrsa -out private/my-ca.key -des3 2048)
Generating RSA private key, 2048 bit long modulus
……………………………………………………+++
……….+++
e is 65537 (0x10001)
Enter pass phrase for private/my-ca.key:
Verifying – Enter pass phrase for private/my-ca.key:

由私钥生成公钥
[root@test1 CA]#openssl req -new -x509 -key private/my-ca.key -days 365 my-ca.crt
Enter pass phrase for private/my-ca.key:
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter . , the field will be left blank.
—–
Country Name (2 letter code) [CN]:CN
State or Province Name (full name) []:Hebei
Locality Name (eg, city) [Beijing]:Beijing
Organization Name (eg, company) [Default Company Ltd]:Tianli Company
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server s hostname) []:test1
Email Address []:
[root@test1 CA]# ls
certs  crl  index.txt  my-ca.crt  newcerts  private  serial

三、客户端验证 CA 服务
主机端(192.168.1.130) 上:
[root@test1 CA]#yum -y install httpd
[root@test1 CA]#service httpd start
[root@test1 CA]#mkdir -p /var/www/html/yum
[root@test1 CA]#cp my-ca.crt /var/www/html/yum  将 my-ca.crt, 即公钥放到 http 服务器,供其他人下载

另外客户端 (192.168.1.117) 上:
[root@test2 Desktop]#openssl genrsa 1024 test2.key
Generating RSA private key, 1024 bit long modulus
…………………++++++
…….++++++
e is 65537 (0x10001)

[root@test2 Desktop]#openssl req -new -key test2.key -out dovecot.csr
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter . , the field will be left blank.
—–
Country Name (2 letter code) [XX]:CN
State or Province Name (full name) []:Hebei
Locality Name (eg, city) [Default City]:Beijing
Organization Name (eg, company) [Default Company Ltd]:Tianli Company
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server s hostname) []:test2
Email Address []:

Please enter the following extra attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:

[root@test2 Desktop]# scp dovecot.csr [email protected]:/root/
[email protected] s password:
dovecot.csr  100%  668  0.7KB/s  00:00 

四、服务端签发 CA 证书
在 CA 认证服务器上
[root@test1 ~]# openssl ca -in dovecot.csr -out dovecot.cst
Using configuration from /etc/pki/tls/openssl.cnf
Enter pass phrase for /etc/pki/CA/private/my-ca.key:
Check that the request matches the signature
Signature ok
Certificate Details:
  Serial Number: 1 (0x1)
  Validity
  Not Before: Jan 22 10:44:36 2013 GMT
  Not After : Jan 22 10:44:36 2014 GMT
  Subject:
  countryName  = CN
  stateOrProvinceName  = Hebei
  organizationName  = Tianli Company
  commonName  = test2
  X509v3 extensions:
  X509v3 Basic Constraints:
  CA:FALSE
  Netscape Comment:
  OpenSSL Generated Certificate
  X509v3 Subject Key Identifier:
  56:69:58:12:67:C7:FC:9E:AC:70:1D:2A:2C:56:A4:E1:61:97:B2:23
  X509v3 Authority Key Identifier:
  keyid:4C:45:25:5F:60:7F:F8:6E:6F:B4:53:C4:FB:BD:A3:C6:82:AE:2A:62

Certificate is to be certified until Jan 22 10:44:36 2014 GMT (365 days)
Sign the certificate? [y/n]:y

1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated
最后签发成功。

补充:在签发证书的过程中容易出现的两个问题
[root@test1 ~]# openssl ca -in dovecot.csr -out dovecot.cst
Using configuration from /etc/pki/tls/openssl.cnf
Enter pass phrase for /etc/pki/CA/private/my-ca.key:
unable to load number from /etc/pki/CA/serial
error while loading serial number
3078239980:error:0D066096:asn1 encoding routines:a2i_ASN1_INTEGER:short line:f_int.c:215:
提示 error while loading serial number,一般是因为 serial 文件中没有赋初值
解决办法
[root@test1 ~]#cd /etc/pki/CA
[root@test1 CA]# echo 00 serial
[root@test1 CA]# cat serial
00

还有一个问题在 CA 签名时,最后出现 failed to update database 错误
[root@test1 ~]#openssl ca -in dovecot.csr -out dovecot.crt
Using configuration from /etc/pki/tls/openssl.cnf
Enter pass phrase for /etc/pki/CA/private/my-ca.key:
Check that the request matches the signature
Signature ok
Certificate Details:
  Serial Number: 2 (0x2)
  Validity
  Not Before: Jan 23 02:23:39 2013 GMT
  Not After : Jan 23 02:23:39 2014 GMT
  Subject:
  countryName  = CN
  stateOrProvinceName  = Hebei
  organizationName  = Tianli Company
  commonName  = test2
  X509v3 extensions:
  X509v3 Basic Constraints:
  CA:FALSE
  Netscape Comment:
  OpenSSL Generated Certificate
  X509v3 Subject Key Identifier:
  96:86:28:B7:ED:2E:96:79:32:88:7E:C3:23:37:02:BC:43:1C:76:87
  X509v3 Authority Key Identifier:
  keyid:4C:45:25:5F:60:7F:F8:6E:6F:B4:53:C4:FB:BD:A3:C6:82:AE:2A:62

Certificate is to be certified until Jan 23 02:23:39 2014 GMT (365 days)
Sign the certificate? [y/n]:y

1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated

Certificate is to be certified until Jan 23 02:17:38 2014 GMT (365 days)
Sign the certificate? [y/n]:y
failed to update database
TXT_DB error number 2
遇到这个错误,只需要清空 /etc/pki/CA/index.txt 的内容再签发就可以成功了。

吊销证书:
[root@test1 ~]# openssl ca -revoke my-ca.crt
Using configuration from /etc/pki/tls/openssl.cnf
Enter pass phrase for /etc/pki/CA/private/my-ca.key:
Adding Entry with serial number B443BCCFCD08C1CD to DB for /C=CN/ST=Hebei/L=Beijing/O=Default Company Ltd/CN=test1
Revoking Certificate B443BCCFCD08C1CD.
Data Base Updated

生成吊销证书列表
[root@test1 ~]# openssl ca -gencrl -out my-ca.crl
Using configuration from /etc/pki/tls/openssl.cnf
Enter pass phrase for /etc/pki/CA/private/my-ca.key:
unable to load number from /etc/pki/CA/crlnumber
error while loading CRL number
3079087852:error:0D066096:asn1 encoding routines:a2i_ASN1_INTEGER:short line:f_int.c:215:
出现 error while loading CRL number,解决办法给 crlnumber 赋值
[root@test1 ~]# echo 00 /etc/pki/CA/crlnumber
[root@test1 ~]# openssl ca -gencrl -out my-ca.crl
Using configuration from /etc/pki/tls/openssl.cnf
Enter pass phrase for /etc/pki/CA/private/my-ca.key:
[root@test1 ~]# ls
anaconda-ks.cfg  dovecot.csr  install.log  my-ca.crl  Public
dead.letter  dovecot.cst  install.log.syslog  my-ca.crt  Templates
Desktop  dovecot.pem  Music test2.key
Documents  Downloads Pictures  Videos
[root@test1 ~]# cat my-ca.crl
—–BEGIN X509 CRL—–
MIIB1DCBvQIBATANBgkqhkiG9w0BAQUFADBdMQswCQYDVQQGEwJDTjEOMAwGA1UE
CAwFSGViZWkxEDAOBgNVBAcMB0JlaWppbmcxHDAaBgNVBAoME0RlZmF1bHQgQ29t
cGFueSBMdGQxDjAMBgNVBAMMBXRlc3QxFw0xMzAxMjQwMzMyMzRaFw0xMzAyMjMw
MzMyMzRaMBwwGgIJALRDvM/NCMHNFw0xMzAxMjQwMzIzMDVaoA4wDDAKBgNVHRQE
AwIBADANBgkqhkiG9w0BAQUFAAOCAQEAhUevJlfn+W4VpX2SWn1RA9Y+qqEHB9i1
9rPSBDpC+NUpiKhF09n1eZRGqbInGQ+KVGxWF7iRAQ/znVV06wJiRU1i1/os3f9E
s2PiYYx8fltLOmaR027BhOB1ZO2mQmF/rvl+Soox+XH/YXD9T6wyD9STwm9jzFnD
iY86D+dgCRFCa3GWJyCFV1jr+79gY4q9rNV5Cmpozyxtz+szVgk8D+03X52KSg35
Ow7eCwK9W0rToq31+nR9+EQ3Cx7dUNrXftfzTCbFFhr87/b4w7iH+G9/3hfv91rt
zLuEriAlumiLVNAVk4gU0VJImAbArCOewaNmarzG8N8U9KYAcAWITw==
—–END X509 CRL—–

看完了这篇文章,相信你对“rhel6.3 下如何使用 openssl 来生成 CA 证书并颁发证书”有了一定的了解,如果想了解更多相关知识,欢迎关注丸趣 TV 行业资讯频道,感谢各位的阅读!

正文完
 
丸趣
版权声明:本站原创文章,由 丸趣 2023-08-25发表,共计8575字。
转载说明:除特殊说明外本站除技术相关以外文章皆由网络搜集发布,转载请注明出处。
评论(没有评论)
主站蜘蛛池模板: 国产成人免费av片在线观看 | 亚洲国产欧美日韩一区二区三区 | 国产成人精品男人免费 | 国产综合精品在线 | 久久精品视频播放 | 一级特黄aa毛片免费观看 | 一个人在线观看免费视频www | 亚洲精品国产一区黑色丝袜 | 久久精品免费播放 | 国产精品久久久久一区二区 | 亚洲日韩精品欧美一区二区一 | 欧美xxxx黑人又粗又长精品 | 欧美激情综合五月色丁香 | 欧美一级视屏 | 视频三区精品中文字幕 | 日韩免费无码一区二区三区 | 五月六月伊人狠狠丁香网 | 国产精品亚洲αv天堂无码 国产精品亚洲а∨天堂2021 | 四虎影视库永久在线地址 | 中文字幕欧美日韩高清 | 亚洲一级黄色片 | 午夜视频福利 | 秋霞韩国最新理论片 | 国产一区二区三区免费 | 亚洲国产精品久久一线不卡 | 岳好紧好湿夹太紧了好爽 | 久久久久久伊人高潮影院 | 精品国产一区二区三区香蕉 | 四虎成人精品免费影院 | 深夜a级毛片 | 收集最新中文国产中文字幕 | 欧美中文在线 | 亚洲一片 | 99热久久这里只有精品在 | 国产欧美网站 | 777久久 | 国产精品igao视频网 | 久久国内视频 | 日本久久高清一区二区三区毛片 | 精品国产精品国产偷麻豆 | 国模大胆一区二区三区 |