使用自生成的秘钥实现https 加密
1、生成证书
cd /etc/pki/tls/certs/
make www.a.net.crt
umask 77 ; \
/usr/bin/openssl genrsa -aes128 2048 > www.a.net.key
Generating RSA private key, 2048 bit long modulus
...............................................+++
......................................................+++
e is 65537 (0x10001)
Enter pass phrase:
139733477795744:error:28069065:lib(40):UI_set_result:result too small:ui_lib.c:831:You must type in 4 to 1023 characters
Enter pass phrase:
139733477795744:error:28069065:lib(40):UI_set_result:result too small:ui_lib.c:831:You must type in 4 to 1023 characters
Enter pass phrase:
139733477795744:error:28069065:lib(40):UI_set_result:result too small:ui_lib.c:831:You must type in 4 to 1023 characters
Enter pass phrase:
Verifying - Enter pass phrase:
umask 77 ; \
/usr/bin/openssl req -utf8 -new -key www.a.net.key -x509 -days 365 -out www.a.net.crt
Enter pass phrase for www.a.net.key:
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [XX]:CN
State or Province Name (full name) []:beijing
Locality Name (eg, city) [Default City]:beijing
Organization Name (eg, company) [Default Company Ltd]:a.net
Organizational Unit Name (eg, section) []:opt
Common Name (eg, your name or your server's hostname) []:www.a.net
Email Address []:
现在生成的证书是加密的,这样会导致每次重启服务都需要输入密码。
2、将加密的文件解密,并生成新的文件
openssl rsa -in www.a.net.key -out www.a.net.a.net.key
3、新建加密文件存放的文件夹
mkdir /etc/nginx/ssl
4、将刚刚自生成的证书移动到存放加密文件的文件夹下
mv /etc/pki/tls/certs/www.a.net.* /etc/nginx/ssl/
5、将证书和私钥文件都修改为600(默认应该就是)
chmod 600 /etc/nginx/ssl/*
6、新建ssl 文件夹,并生成一个测试的主页面
mkdir /data/ssl
echo /data/ssl/index.html > /data/ssl/index.html
7、修改自己建立的虚拟主机的配置文件
vim /etc/nginx/conf.d/test.conf
server { listen 443 ssl; server_name www.a.net; root /data/ssl/; ssl_certificate /etc/nginx/ssl/www.a.net.crt; ssl_certificate_key /etc/nginx/ssl/www.a.net.key; ssl_session_cache shared:sslcache:20m; ssl_session_timeout 10m; access_log /var/log/nginx/a.net.log443 main; }
8、启动nginx服务
nginx
9、浏览器测试访问,由于是自己搭建的ca,所以系统会提示不安全
10、将http 和https的内容修改为统一(这里采用的是两个虚拟主机)
server { listen 443 ssl; server_name www.a.net; root /data/site1/; ssl_certificate /etc/nginx/ssl/www.a.net.crt; ssl_certificate_key /etc/nginx/ssl/www.a.net.key; ssl_session_cache shared:sslcache:20m; ssl_session_timeout 10m; access_log /var/log/nginx/a.net.log443 main; } server { access_log /var/log/nginx/a.net.log1 main; server_name www.a.net; root /data/site1; gzip on; gzip_comp_level 9; gzip_min_length 64; gzip_vary on; gzip_types text/xml text/css application/javescript; location / {
11、一个虚拟主机监听两个端口
server { listen 443 ssl; listen 80; server_name www.a.net; root /data/site1/; ssl_certificate /etc/nginx/ssl/www.a.net.crt; ssl_certificate_key /etc/nginx/ssl/www.a.net.key; ssl_session_cache shared:sslcache:20m; ssl_session_timeout 10m; access_log /var/log/nginx/a.net.log443 main; }